Gartner is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Key takeaways from the report

  • Tick Leverage data security governance - Leverage data security governance and set objectives for cryptographic technologies managed by EKM.
  • Tick Use diverse cryptographic methods - It is imperative for SRM leaders to utilize enterprise key management (EKM) to establish robust data security encompassing diverse cryptographic methods that includes encryption, tokenization, and privacy-enhanced computation.
  • Tick Establish key life cycle management policies - Manage risk by ensuring that EKM policies are deployed consistently across all data locations and that KM systems are backed up.
  • Tick Prepare your EKM for crypto-agility - Plan for cryptographic agility to cope with future changes to cryptographic algorithms and key lengths.
image

Strategic Planning Assumptions

Rise in EKM Adoption

Multicloud KMaaS Adoption
As per Gartner “by 2026, 40% of organizations will deploy enterprise key management to replace multiple independent vendor and cloud-native cryptography solutions.”

3 forces triggering EKM adoption

3forces
Growing data breaches, ransom attacks and privacy laws highlight the urgent need to operationalize effective EKM

Learn more about Gartner findings

Wide array of Key management choices

SRM leaders struggle with decisions on why and how to invest in key management (KM) systems, due to the wide variety of choices for KM systems.

BYOK/HYOK integration for Cloud-native Key management

Cloud services offer native cryptography and key management that are independent and require custom-made integrations through bring your own key (BYOK) and hold your own key (HYOK) processes.

Consistent policy management is critical

Growing data breaches, ransom attacks and privacy laws highlight the urgent need to develop consistent data protection policies through enterprise key management (EKM) and operationalize cryptography more effectively.

Trusted by