Announcing the Public Preview of Armet AI. Learn more

x
BlogContact Us
Login
North AmericaEuropean UnionUnited KingdomAsia PacificAustraliaSaudi Arabia
fortanix logo white version
  • Platform
    • Fortanix Armor
    • Armet AINEW
    • Data Security Manager™
    • Key Insight
    • Confidential Computing Manager
    gartner tbGartner® Report: How to Improve Data Security with Cloud Key Management
    Buyers Guide to Enterprise Key ManagementBuyers Guide to Enterprise Key Management
  • Solutions
    • use case
      By Use Case
    • Industry
      By Industry
    • compliance
      By Compliance
    • Integrations
      By Integrations
    • persona
      By Role
    By Use CaseLegacy to Cloud Infrastructure MigrationRegulatory CompliancePost-Quantum ReadinessSecure, Data-Driven Innovation
    See All Solutions By Use Case

    By Industry

    HealthcareBanking and Financial ServicesTechManufacturingFederal Government
    See All Solutions By Industry

    By Compliance

    GDPRAPRA Prudential Standards CPS 234SCHREMS IIPhilippines Data Privacy ActDigital Operational Resilience Act
    HIPAASOXGLBAThe Securities and Exchange Board of India (SEBI)PCI DSSEssential Cybersecurity Controls (ECC)
    See All Solutions By Compliance

    By Integrations

    AppviewXAWSBig IDGoogle Cloud PlatformGoogle Workspace
    KeyfactorServiceNowSnowflakeVMWare
    See All Solutions By Integrations

    By Role

    CxOSSecurity TeamsData TeamsAppDev Teams
    See All Solutions By Role
    Google Cloud Ebook
    Google Cloud Ebook
    HSM Modernization
    HSM Modernization
    Buyers Guide for EKM
    Buyers Guide for EKM
    Google Cloud Ebook
    Google Cloud Ebook
    HSM Modernization
    HSM Modernization
    Buyers Guide for EKM
    Buyers Guide for EKM
    Google Cloud Ebook
    Google Cloud Ebook
  • Customers
  • Resources
    • All Resources
      All ResourcesWhitepapers, Ebooks, Datasheets, Solution briefs and more.
    • ccm Confidential Computing
      Confidential Computing Organizations can now protect data and applications
    •  Intel® SGX
      Intel® SGX Intel® SGX allows applications to run securely
    • Runtime Encryption
      Runtime Encryption® Technology Transparently protects your sensitive applications and data in use

    All Resources

    WhitepapersDatasheetsSolution BriefsEbooksReportsCase StudiesVideo/AudioInfographicsOn-Demand WebinarsChecklists
    Buyers Guide for EKM
    Buyers Guide for EKM
    Google Cloud Ebook
    Google Cloud Ebook
  • Support
    • Customer Support
      Customer Support Fortanix delivers deterministic security solutions for your most valuable digital assets using Runtime Encryption®.

    Customer Support

    DocumentationRequestsDownloadsREST API DocumentationFAQs

    Technical Support Program

    tsp

    Professional Services

    cs

  • Company
    • About Us
    • Partners
    • Press Releases
    • In The News
    • Careers
    • Events
    • Webinars
    • Awards And Recognition
    • Newsletters
    blog thumb
  • Confidential Computing
  • Blog
  • News
  • University
  • Trust Center
  • Login
  • Contact Us
USAEN
USAENjapanJP
DemoTry Us

Multi-cloud Data Security Trends Noted in Gartner Hype Cycle for Cloud Security, 2020

Report Encompasses Innovations and Technologies that Improve Security, Governance and Reliability of Public and Private Cloud Computing
MOUNTAIN VIEW, California, September 2, 2020

Fortanix® Inc., the Runtime Encryption® company, today announced that the Gartner Hype Cycle for Cloud Security, 2020 has identified emerging data security trends that aim to help businesses protect sensitive information as they migrate sensitive data and applications to the public cloud. The comprehensive report defines, tracks adoption, and discusses the business impact of critical data security categories, including multicloud key management as a service (KMaaS), confidential computing, and hardware-based security gaining adoption in cloud environments.

According to Gartner, “The need for multicloud KMaaS is increasing as organizations grow their deployments of hybrid and multi-cloud services and the need for consistent KM across these environments increases. Native cloud service platform KM offerings do not directly support hybrid or multi-cloud KM. Given the growth of cloud adoption, coupled with concerns over data residency, data protection and privacy, it is expected that multicloud KMaaS adoption will continue to grow.”1

Eighty-one percent of organizations are using more than one public cloud provider2 and 71 percent of data in public cloud is sensitive. Privacy regulations are proliferating and requiring more encryption and tokenization of personally identifiable information (PII). But categories of technology are emerging that help protect sensitive data in the cloud, meet privacy regulations, and enable secure migration to the cloud for private data, accelerating digital transformation.

According to Gartner, “Confidential computing potentially removes the remaining barrier to cloud adoption for highly regulated businesses or any organization concerned about unauthorized third-party access to data in use in the public cloud. It’s likely that auditors and regulators will demand, for certain data types, increased protection including high barriers to provider and government access. Confidential computing can provide such protection now.” 1

Today, data is often encrypted at rest in storage and in transit across the network, but not while in use by applications. Cybercriminals, insiders, and nation-states who gain access to the compute infrastructure can access sensitive data through the memory of servers in cloud environments. Confidential computing provides the strongest protection of data and code by running applications in secure enclaves that are isolated and encrypted using hardware-based security.

According to Gartner, “If an operating system is compromised, its security controls can be disabled and sensitive data in memory stolen; Hardware-based security can prevent this. Hardware-based security uses chip-level techniques for the protection of critical security controls and processes in host systems independent of OS integrity. Typical control isolation includes encryption key handling, secrets protection, secure I/O, process monitoring and unencrypted memory handling.” 1

Fortanix delivers Multicloud KMaaS, confidential computing, and hardware-based data security solutions that help businesses migrate their sensitive data to the public cloud, enabling digital transformation, protecting customer privacy, and preventing data breaches.

“Fortanix is accelerating the adoption of these key data security technologies by simplifying cloud integration and providing a platform to address a broad set of cloud data security challenges,” said David Greene, Fortanix CRO. “At the current rate of data growth, it is challenging to secure all sensitive cloud data without a multicloud data security strategy and security controls that span multiple clouds.”

For more information, see a copy of the Hype Cycle for Cloud Security, 2020 at
https://resources.fortanix.com/gartner-hype-cycle-for-cloud-data-security-2020

More Resources

  • Multicloud Data Security: Cloud Security Landscape Whitepaper
  • Fortanix Confidential Computing Manager
  • Confidential Computing: Hardware-based Trusted Execution for Applications and Data Whitepaper

1 Gartner, Inc. “Hype Cycle for Cloud Security, 2020” by Steve Riley, et al. July 17, 2020.

2 Gartner, Inc. “IT Leaders’ Strategy Deck: Multicloud and Hybrid Cloud”, Infrastructure and Operations Research Team, Jan. 15, 2020.
* According to Gartner, most enterprises already use more than one cloud provider. This is based on average, respondents report working with 2-3 public cloud providers and two types of cloud, and the total study n = 1,200 organizations.

About Fortanix

Fortanix unlocks the power of organizations’ most valuable data by securing it throughout its lifecycle, on premises and in the cloud. Fortanix provides unique deterministic security by encrypting applications and data everywhere – at rest, in motion, and in use with its Runtime Encryption® technology built upon Intel® SGX. Fortanix secures F100 customers worldwide and powers IBM Data Shield and Equinix SmartKey™ HSM-as-a-service. Fortanix is venture backed and headquartered in Mountain View, Calif. For more information, see https://fortanix.com/

Fortanix and Runtime Encryption are registered trademarks of Fortanix, Inc. Fortanix Data Security Manager is a trademark of Fortanix, Inc. All other marks and names mentioned herein may be trademarks of their respective companies.
FIPS 140-1 and FIPS 140-2 TM: A Certification Mark of NIST, which does not imply product endorsement by NIST, the U.S. or Canadian Governments

Share this post:

Platform

Fortanix Armor

Armet AI

NEW

Key Insight

Data Security Manager

Confidential Computing Manager

Open Source Platform

Enclave Development Platform®

Solutions

Use Cases

Legacy to Cloud Infrastructure Migration

Regulatory Compliance

Post-Quantum Readiness

Secure, Data-Driven Innovation

Industry

Healthcare

Banking & Financial Services

Fintech

Manufacturing

Federal Government

Company

About Us

Partners

Careers

Confidential Computing

University

Blog

FAQ

Contact Us

Awards

Events

Press

News

Services

Media Kit

Newsletters

Customers

Resources

Support

Fortanix-logo

4.6

star-ratingsgartner-logo

As of August 2025

Request a Demo
SOC-2 Type-2ISO 27001FIPSGartner LogoPCI DSS Compliant

US

Europe

India

Singapore

3910 Freedom Circle, Suite 104,
Santa Clara CA 95054

+1 408-214 - 4760|info@fortanix.com

High Tech Campus 5,
5656 AE Eindhoven, The Netherlands

+31850608282

UrbanVault 460,First Floor,C S TOWERS,17th Cross Rd, 4th Sector,HSR Layout, Bengaluru,Karnataka 560102

+91 080-41749241

T30 Cecil St. #19-08 Prudential Tower,Singapore 049712

Trust Centre

Privacy Policy

Legal

Terms of Service

Fortanix Copyright 2025. All Right reserved