BlogsContact Us
USAEN
USAENJapanJP
Login
North AmericaEuropean UnionUnited KingdomAsia PacificAustraliaSaudi Arabia
Fortanix Logo
  • Platform
    Fortanix Armor
    The Fortanix enterprise-grade security and platform helps you safeguard sensitive information.
    • Armet AIArmet AI
    • Data Security Manager™Data Security Manager™
      Data Security Manager™
      Explore All
      Key Management Service (KMS)Hardware Security Module (HSM)Secure Business LogicFile System EncryptionTransparent Database EncryptionAWS KMS External Key Store (XKS) with Fortanix DSMBring Your Own Key (BYOK)Data TokenizationGoogle External Key Manager (EKM)Secrets ManagementCode SigningDSM AcceleratorUnified Key Management Across Hybrid and Multicloud Environments
    • Key InsightKey Insight
    • Confidential Computing ManagerConfidential Computing Manager
    One Platform. Complete Data Security.
    Learn More
  • Solutions
    Solutions
    Fortanix delivers deterministic security solutions for your most valuable digital assets using Runtime Encryption®.
    • By Use CaseBy Use Case
      By Use Case
      Explore All Use Cases
      HSM ModernizationLegacy to Cloud Infrastructure MigrationRegulatory CompliancePost Quantum CryptographySecure, Data-Driven Innovation
    • By IndustryBy Industry
      By Industry
      See All Solutions By Industry
      HealthcareBanking and Financial ServicesTechManufacturingFederal Government
    • By ComplianceBy Compliance
      By Compliance
      See All Solutions By Compliance
      GDPRAPRA Prudential Standards CPS 234SCHREMS IIPhilippines Data Privacy ActDigital Operational Resilience ActHIPAASOXGLBASEBIPCI DSSEssential Cybersecurity Controls (ECC)
    • By IntegrationsBy Integrations
      By Integrations
      See All Solutions By Integrations
      AppviewXAWSBigIDGoogle Cloud PlatformGoogle WorkspaceKeyfactorServiceNowSnowflakeVMWare
    • By RoleBy Role
      By Role
      See All Solutions By Role
      CxOSSecurity TeamsData TeamsAppDev Teams
    One Platform. Complete Data Security.
    Explore All
  • Customers
    Customers
    Learn how some of our customers are using Fortanix Products and their success stories
    • Success StoriesSuccess Stories
    Featured Case Study
    blackbaud case study
    How Blackbaud Can Strengthen Data Security and Compliance with Fortanix Key InsightClickPurple Arrow
  • Resources
    Resources
    Explore expert research reports, whitepapers, videos, and guides—all in one place to help you solve your toughest data security.
    • All ResourcesAll Resources
      All Resources
      Explore All
      WhitepapersDatasheetsSolution BriefseBooksReportCase StudiesVideo/AudioInfographicsOn-Demand WebinarsChecklists
    • Confidential Computing Confidential Computing
    • Intel® SGX Intel® SGX
    • Runtime Encryption® Technology Runtime Encryption® Technology
    Featured Resources
    Armet AI TB
    post quantum readiness thumbnail
  • Support
    Support
    Find User Guides, Examples, API and CLI Reference Material, Tutorials, and more.
    • Customer SupportCustomer Support
      Customer Support
      Explore All
      DocumentationRequestsDownloadsREST API DocumentationFAQs
    • Technical Support ProgramTechnical Support Program
    • Professional ServicesProfessional Services
    One Platform. Complete Data Security.
    Learn More
  • Company
    Company
    We put software and hardware security into billions of devices. 100+ security patents. 30+ papers in top conferences.
    • About UsAbout Us
    • PartnersPartners
    • Press ReleasePress Release
    • In The NewsIn The News
    • CareersCareers
    • EventsEvents
    • WebinarsWebinars
    • Awards And RecognitionAwards And Recognition
    • NewslettersNewsletters
    Protecting Data. Powering Trust.
    awards
BlogsContact Us
DemoTry Us
DemoTry Us
USA
USAENJapanJP

Multi-cloud Data Security Trends Noted in Gartner Hype Cycle for Cloud Security, 2020

Report Encompasses Innovations and Technologies that Improve Security, Governance and Reliability of Public and Private Cloud Computing
MOUNTAIN VIEW, California, September 2, 2020

Fortanix® Inc., the Runtime Encryption® company, today announced that the Gartner Hype Cycle for Cloud Security, 2020 has identified emerging data security trends that aim to help businesses protect sensitive information as they migrate sensitive data and applications to the public cloud. The comprehensive report defines, tracks adoption, and discusses the business impact of critical data security categories, including multicloud key management as a service (KMaaS), confidential computing, and hardware-based security gaining adoption in cloud environments.

According to Gartner, “The need for multicloud KMaaS is increasing as organizations grow their deployments of hybrid and multi-cloud services and the need for consistent KM across these environments increases. Native cloud service platform KM offerings do not directly support hybrid or multi-cloud KM. Given the growth of cloud adoption, coupled with concerns over data residency, data protection and privacy, it is expected that multicloud KMaaS adoption will continue to grow.”1

Eighty-one percent of organizations are using more than one public cloud provider2 and 71 percent of data in public cloud is sensitive. Privacy regulations are proliferating and requiring more encryption and tokenization of personally identifiable information (PII). But categories of technology are emerging that help protect sensitive data in the cloud, meet privacy regulations, and enable secure migration to the cloud for private data, accelerating digital transformation.

According to Gartner, “Confidential computing potentially removes the remaining barrier to cloud adoption for highly regulated businesses or any organization concerned about unauthorized third-party access to data in use in the public cloud. It’s likely that auditors and regulators will demand, for certain data types, increased protection including high barriers to provider and government access. Confidential computing can provide such protection now.” 1

Today, data is often encrypted at rest in storage and in transit across the network, but not while in use by applications. Cybercriminals, insiders, and nation-states who gain access to the compute infrastructure can access sensitive data through the memory of servers in cloud environments. Confidential computing provides the strongest protection of data and code by running applications in secure enclaves that are isolated and encrypted using hardware-based security.

According to Gartner, “If an operating system is compromised, its security controls can be disabled and sensitive data in memory stolen; Hardware-based security can prevent this. Hardware-based security uses chip-level techniques for the protection of critical security controls and processes in host systems independent of OS integrity. Typical control isolation includes encryption key handling, secrets protection, secure I/O, process monitoring and unencrypted memory handling.” 1

Fortanix delivers Multicloud KMaaS, confidential computing, and hardware-based data security solutions that help businesses migrate their sensitive data to the public cloud, enabling digital transformation, protecting customer privacy, and preventing data breaches.

“Fortanix is accelerating the adoption of these key data security technologies by simplifying cloud integration and providing a platform to address a broad set of cloud data security challenges,” said David Greene, Fortanix CRO. “At the current rate of data growth, it is challenging to secure all sensitive cloud data without a multicloud data security strategy and security controls that span multiple clouds.”

For more information, see a copy of the Hype Cycle for Cloud Security, 2020 at
https://resources.fortanix.com/gartner-hype-cycle-for-cloud-data-security-2020

More Resources

  • Multicloud Data Security: Cloud Security Landscape Whitepaper
  • Fortanix Confidential Computing Manager
  • Confidential Computing: Hardware-based Trusted Execution for Applications and Data Whitepaper

1 Gartner, Inc. “Hype Cycle for Cloud Security, 2020” by Steve Riley, et al. July 17, 2020.

2 Gartner, Inc. “IT Leaders’ Strategy Deck: Multicloud and Hybrid Cloud”, Infrastructure and Operations Research Team, Jan. 15, 2020.
* According to Gartner, most enterprises already use more than one cloud provider. This is based on average, respondents report working with 2-3 public cloud providers and two types of cloud, and the total study n = 1,200 organizations.

About Fortanix

Fortanix unlocks the power of organizations’ most valuable data by securing it throughout its lifecycle, on premises and in the cloud. Fortanix provides unique deterministic security by encrypting applications and data everywhere – at rest, in motion, and in use with its Runtime Encryption® technology built upon Intel® SGX. Fortanix secures F100 customers worldwide and powers IBM Data Shield and Equinix SmartKey™ HSM-as-a-service. Fortanix is venture backed and headquartered in Mountain View, Calif. For more information, see https://fortanix.com/

Fortanix and Runtime Encryption are registered trademarks of Fortanix, Inc. Fortanix Data Security Manager is a trademark of Fortanix, Inc. All other marks and names mentioned herein may be trademarks of their respective companies.
FIPS 140-1 and FIPS 140-2 TM: A Certification Mark of NIST, which does not imply product endorsement by NIST, the U.S. or Canadian Governments

Share this post:

Platform

Fortanix Armor

Armet AI

NEW

Key Insight

Data Security Manager

Confidential Computing Manager

Open Source Platform

Enclave Development Platform®

Solutions

Use Cases

Legacy to Cloud Infrastructure Migration

Regulatory Compliance

Post-Quantum Readiness

Secure, Data-Driven Innovation

Industry

Healthcare

Banking & Financial Services

Fintech

Manufacturing

Federal Government

Company

About Us

Partners

Careers

Confidential Computing

University

Blog

FAQ

Contact Us

Awards

Events

Webinars

Press

News

Services

Media Kit

Newsletters

Customers

Resources

Support

Fortanix-logo

4.6

star-ratingsgartner-logo

As of August 2025

Request a Demo
SOC-2 Type-2ISO 27001FIPSGartner LogoPCI DSS Compliant

US

Europe

India

Singapore

3910 Freedom Circle, Suite 104,
Santa Clara CA 95054

+1 408-214 - 4760|info@fortanix.com

High Tech Campus 5,
5656 AE Eindhoven, The Netherlands

+31850608282

UrbanVault 460,First Floor,C S TOWERS,17th Cross Rd, 4th Sector,HSR Layout, Bengaluru,Karnataka 560102

+91 080-41749241

T30 Cecil St. #19-08 Prudential Tower,Singapore 049712

Trust Center

Privacy Policy

Legal

Terms of Service

Fortanix Copyright 2025. All Right reserved