Securing and protecting enterprise data is at the center of the modern security plan. There are many considerations for organizations that aim to move critical workloads and data stores to the cloud, and understanding how business-critical data will be accessed, stored and secured is a paramount concern.

Organizations are also facing significant increases in regulations around data classification and data privacy. Regulators enforcing the European Union’s General Data Protection Regulation and the California Consumer Privacy Act are issuing fines, and courts are issuing decisions. The scope of how data privacy is regulated (and the impact that will have on organizations big and small) will add complexity to a crowded regulatory framework.

In an exclusive research study conducted for IBM, Enterprise Management Associates (EMA) recently polled over 200 technical leaders and practitioners from organizations of 500 employees or more. They represented industries from 10 different verticals, providing a cross-section of organizations impacted by data privacy and security in different ways.

Register for the report

Some key takeaways from the study include:

  • Data Security: Nearly all of those surveyed (95.1%) indicated that data security is a critical or very important factor in their organization, and 74% have integrated data security and privacy as part of their organization’s overall security strategy.
  • Data Privacy: 82% of those surveyed are currently evaluating data privacy solutions, and almost three-quarters (74%) believe that their strategy regarding data privacy is a major differentiator in the marketplace.
  • Zero Trust: 73% of organizations are investigating or planning to launch a zero trust project. Of that group, nearly all (94%) stated that data privacy is a primary driver for starting their zero trust project. Also, 96% are looking for a zero trust vendor with a complete, comprehensive solution, and 94% believe it is important to work with an experienced, established zero trust leader.
  • Security Tools: 64% report that two or more of their tools are at least somewhat redundant, and 75% currently use three or more tools to secure their hybrid multicloud environments.
  • Security Silos: While 56% of respondents said that they are working to break down barriers between their security teams and other divisions within the organization, 36% indicated that security teams sometimes, rarely or never work with other technical teams for problem resolution.

As organizations turn to security vendors to understand data privacy regulations and for guidance on their zero trust projects and solutions, it is critical for vendors to understand the challenges facing the enterprise and how they can best provide solutions and tools to address those challenges. The enterprise is looking to experienced vendors with a proven track record of zero trust implementations that are able to address and assist with all aspects of a zero trust project, instead of one-off features.

IBM is a leader in zero trust, and its data security solutions are unmatched in the industry. With IBM Security Guardium Insights, organizations can adapt and scale as their hybrid cloud environments evolve, centralizing data security and privacy management, reducing compliance efforts and understanding user access and permissions across multiple data and infrastructure sources to support a zero trust approach.

For more information about this survey and Guardium Insights, visit www.ibm.com/products/guardium-insights to learn about the IBM approach to data security and privacy, as well as its best-in-class zero trust solution. To learn more about EMA’s findings in this survey, register for the interactive report eBook.

More from Zero Trust

Effectively Enforce a Least Privilege Strategy

Every security officer wants to minimize their attack surface. One of the best ways to do this is by implementing a least privilege strategy. One report revealed that data breaches from insiders could cost as much as 20% of annual revenue. Also, at least one in three reported data breaches involve an insider. Over 78% of insider data breaches involve unintentional data loss or exposure. Least privilege protocols can help prevent these kinds of blunders. Clearly, proper management of access…

What CISOs Want to See From NIST’s Impending Zero Trust Guidelines

Cybersecurity at U.S. federal agencies has been running behind the times for years. It took an executive order by President Joe Biden to kickstart a fix across the agencies. The government initiative also serves as a wake-up call to enterprises lagging in getting zero trust up and running. Several organizations, including the Office of Management and Budget (OMB), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Institute of Standards and Technology (NIST) responded to the president’s order with detailed…

Cost of a Data Breach: Infrastructure

During the pandemic, businesses and consumers saw firsthand what happens when infrastructure fails. In 2019, the global critical infrastructure protection (CIP) market size was valued at $96.30 billion. It is predicted to grow to $154.59 billion by 2027, with a CAGR of 6.2%. On top of that, each time an organization in a critical sector is the victim of any type of cybersecurity incident resulting in data loss, the event counts as a critical infrastructure data breach. Let's take a…

Companies Without Zero Trust Could Lose $1M More During a Data Breach

In recent years, the mindset for cybersecurity has shifted. It isn't a matter of if a company has a breach, but rather when a company has a breach. With the increase in cybersecurity incidents, most if not all companies will be victims of a data breach at some point. However, the latest research shows that organizations using zero trust can save more than $1 million during a breach.  Record High Costs for Data Breaches According to the 2022 IBM Cost of…