Confidential ComputingUniversityTrust CenterBlogContact Us
Login
North AmericaEuropean UnionUnited KingdomAsia PacificAustralia
Fortanix LogoFortanix Logo
  • Platform
    • Security Platform
      Data Security Manager™SaaS | On Premises
    • OpenSource Platform
      Enclave Development Platform®
    Encryption And TokenizationHardware Security Module (HSM)HSM GatewayKey Management Service (KMS)TokenizationDSM Accelerator
    Confidential ComputingConfidential AIConfidential Computing ManagerSecure Business Logic
    Cloud Data SecurityCloud Data ControlSecret Management
    header image asset hsm
  • Solutions
    • use case
      By Use Case
    • Industry
      By Industry
    • compliance
      By Compliance
    • Integrations
      By Integrations
    Enterprise Key Management AWS KMS External Key Store (XKS)Google External Key ManagerBring Your Own Key (BYOK)HSM ModernizationMulticloud Key Management
    Data Masking and Tokenization TokenizationTransparent Database Encryption
    Secure DevOps Code SigningSecrets Management

    By Industry

    Data Security For HealthcareData Security For Banking and Financial ServicesData Security For FintechSecure ManufacturingWeb 3.0

    By Compliance

    GDPRARPA Prudential Standards CPS 234SCHREMS IIPhilippines Data Privacy Act
    HIPAASOXGLBAThe Securities and Exchange Board of India (SEBI)

    By Integrations

    AppviewXAWSAzureBosch AIShieldGoogle Cloud PlatformGoogle Workspace
    ImpervaKeyfactorServiceNowSnowflakeVMWare
    Google Cloud Ebook
    Google Cloud Ebook
    HSM Modernization
    Whitepaper: HSM Modernization
    Buyers Guide
    Buyers Guide
    Google Cloud Ebook
    Google Cloud Ebook
    HSM Modernization
    Whitepaper: HSM Modernization
    Buyers Guide
    Buyers Guide
    Google Cloud Ebook
    Google Cloud Ebook
  • Customers
  • Resources
    • All Resources
      All ResourcesWhitepapers, Ebooks, Datasheets, Solution briefs and more.
    • ccm Confidential Computing
      Confidential Computing Organizations can now protect data and applications
    •  Intel® SGX
      Intel® SGX Intel® SGX allows applications to run securely
    • Runtime Encryption
      Runtime Encryption® Technology Transparently protects your sensitive applications and data in use

    All Resources

    WhitepapersDatasheetsSolution BriefsEbooksReportsCase StudiesVideo/Audio
    Buyers Guide
    Buyers Guide
    Google Cloud Ebook
    Google Cloud Ebook
  • Support
    • Customer Support
      Customer Support Portal Fortanix delivers deterministic security solutions for your most valuable digital assets using Runtime Encryption®.
    • Need Help?
      We are here to help you.

      Interested in learning more about how Fortanix can help you in protecting your sensitive applications and data in any untrusted environments such as the public cloud and remote cloud?

      General Enquiries

      info@fortanix.com

      Sales

      sales@fortanix.com
      SUBMIT REQUEST

    Customer Support Portal

    DocumentationRequestsDownloadsREST API DocumentationFAQs

    Technical Support Program

    tsp

    Customer Success Services

    cs

    Fortanix Services for SaaS

    Fortanix Customer Success Services

    cs saas

    Fortanix Support Program

    tsp saas
  • Company
    • About Us
    • Partners
    • Press Releases
    • In The News
    • Careers
    • Events
    • Webinars
    • Awards And Recognition
    • Newsletters
    blog thumbBLOG
  • Confidential Computing
  • Blog
  • News
  • University
  • Login
  • Contact Us
REQUEST A DEMOTry Us

Multi-cloud Data Security Trends Noted in Gartner Hype Cycle for Cloud Security, 2020

Report Encompasses Innovations and Technologies that Improve Security, Governance and Reliability of Public and Private Cloud Computing
MOUNTAIN VIEW, California, September 2, 2020

Fortanix® Inc., the Runtime Encryption® company, today announced that the Gartner Hype Cycle for Cloud Security, 2020 has identified emerging data security trends that aim to help businesses protect sensitive information as they migrate sensitive data and applications to the public cloud. The comprehensive report defines, tracks adoption, and discusses the business impact of critical data security categories, including multicloud key management as a service (KMaaS), confidential computing, and hardware-based security gaining adoption in cloud environments.

According to Gartner, “The need for multicloud KMaaS is increasing as organizations grow their deployments of hybrid and multi-cloud services and the need for consistent KM across these environments increases. Native cloud service platform KM offerings do not directly support hybrid or multi-cloud KM. Given the growth of cloud adoption, coupled with concerns over data residency, data protection and privacy, it is expected that multicloud KMaaS adoption will continue to grow.”1

Eighty-one percent of organizations are using more than one public cloud provider2 and 71 percent of data in public cloud is sensitive. Privacy regulations are proliferating and requiring more encryption and tokenization of personally identifiable information (PII). But categories of technology are emerging that help protect sensitive data in the cloud, meet privacy regulations, and enable secure migration to the cloud for private data, accelerating digital transformation.

According to Gartner, “Confidential computing potentially removes the remaining barrier to cloud adoption for highly regulated businesses or any organization concerned about unauthorized third-party access to data in use in the public cloud. It’s likely that auditors and regulators will demand, for certain data types, increased protection including high barriers to provider and government access. Confidential computing can provide such protection now.” 1

Today, data is often encrypted at rest in storage and in transit across the network, but not while in use by applications. Cybercriminals, insiders, and nation-states who gain access to the compute infrastructure can access sensitive data through the memory of servers in cloud environments. Confidential computing provides the strongest protection of data and code by running applications in secure enclaves that are isolated and encrypted using hardware-based security.

According to Gartner, “If an operating system is compromised, its security controls can be disabled and sensitive data in memory stolen; Hardware-based security can prevent this. Hardware-based security uses chip-level techniques for the protection of critical security controls and processes in host systems independent of OS integrity. Typical control isolation includes encryption key handling, secrets protection, secure I/O, process monitoring and unencrypted memory handling.” 1

Fortanix delivers Multicloud KMaaS, confidential computing, and hardware-based data security solutions that help businesses migrate their sensitive data to the public cloud, enabling digital transformation, protecting customer privacy, and preventing data breaches.

“Fortanix is accelerating the adoption of these key data security technologies by simplifying cloud integration and providing a platform to address a broad set of cloud data security challenges,” said David Greene, Fortanix CRO. “At the current rate of data growth, it is challenging to secure all sensitive cloud data without a multicloud data security strategy and security controls that span multiple clouds.”

For more information, see a copy of the Hype Cycle for Cloud Security, 2020 at
https://resources.fortanix.com/gartner-hype-cycle-for-cloud-data-security-2020

More Resources

  • Multicloud Data Security: Cloud Security Landscape Whitepaper
  • Fortanix Confidential Computing Manager
  • Confidential Computing: Hardware-based Trusted Execution for Applications and Data Whitepaper

1 Gartner, Inc. “Hype Cycle for Cloud Security, 2020” by Steve Riley, et al. July 17, 2020.

2 Gartner, Inc. “IT Leaders’ Strategy Deck: Multicloud and Hybrid Cloud”, Infrastructure and Operations Research Team, Jan. 15, 2020.
* According to Gartner, most enterprises already use more than one cloud provider. This is based on average, respondents report working with 2-3 public cloud providers and two types of cloud, and the total study n = 1,200 organizations.

About Fortanix

Fortanix unlocks the power of organizations’ most valuable data by securing it throughout its lifecycle, on premises and in the cloud. Fortanix provides unique deterministic security by encrypting applications and data everywhere – at rest, in motion, and in use with its Runtime Encryption® technology built upon Intel® SGX. Fortanix secures F100 customers worldwide and powers IBM Data Shield and Equinix SmartKey™ HSM-as-a-service. Fortanix is venture backed and headquartered in Mountain View, Calif. For more information, see https://fortanix.com/

Fortanix and Runtime Encryption are registered trademarks of Fortanix, Inc. Fortanix Data Security Manager is a trademark of Fortanix, Inc. All other marks and names mentioned herein may be trademarks of their respective companies.
FIPS 140-1 and FIPS 140-2 TM: A Certification Mark of NIST, which does not imply product endorsement by NIST, the U.S. or Canadian Governments

Share this press release:
logo
world map logoUSEuropeIndiaSingapore
address pointer3910 Freedom Circle,
Suite 104, Santa Clara
CA 95054
+1 (650) 943-2484 | info@fortanix.com
address pointer2nd Floor Hustlehub Tech Park building 1,
36/5,Somasundarapalya Main Rd,
Adjacent 27th Main Road, Haralukunte Village,
Sector 2, HSR Layout,
Bengaluru, Karnataka 560102
address pointerHigh Tech Campus 5
5656 AE Eindhoven
The Netherlands
+31850608282
address pointer30 Cecil St. #19-08 Prudential Tower
Singapore 049712
  • Platform
    • Data Security Manager™
    • Enclave Development Platform (Open Source)®
  • Solutions
  • Resources
  • Customers
  • Partners
  • Services
  • Support
  • FAQ
  • Company
    • About Us
    • Webinars
    • Events
    • News
    • Press Releases
    • Careers
    • Media Kit
    • Awards
    • Newsletters
  • Certification Program
  • Blog
  • Contact
Subscribe to newsletter
Want to be the first to know about new cool features?
Subscribe to Fortanix e-mail list

(Couple of emails per month, we promise).

Fortanix © 2023 All Rights Reserved
Legal Agreements.