{"id":119048,"date":"2022-11-21T08:00:00","date_gmt":"2022-11-21T07:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=119048"},"modified":"2022-11-22T07:22:48","modified_gmt":"2022-11-22T06:22:48","slug":"global-encryption-trends-2022","status":"publish","type":"post","link":"https:\/\/e3mag.com\/de\/global-encryption-trends-2022\/","title":{"rendered":"Global Encryption Trends 2022"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Multi-Cloud Modelle<\/h2>\n\n\n\n<p>Als Treiber hierf\u00fcr wurde der Wunsch nach einer st\u00e4rkeren Kontrolle von Daten genannt, die \u00fcber mehrere Cloud-Umgebungen verteilt sind. Diese Erkenntnisse brachte die aktuelle Entrust Global Encryption Trends Study hervor. Die von Entrust in Auftrag gegebene und vom Ponemon Institute durchgef\u00fchrte Studie analysiert die verschiedenen Herausforderungen und Ma\u00dfnahmen von Unternehmen im Kampf gegen Cybersecurity-Bedrohungen. <\/p>\n\n\n\n<p>Laut Studie wird vor allem Datenschutz ernster genommen. Die Umfragen belegten \u00fcber die vergangenen Jahre hinweg bereits einen stetigen Anstieg beim Einsatz unternehmensweiter Verschl\u00fcsselung. Dieses Jahr gab es jedoch einen drastischen Sprung zu verzeichnen: Der Anteil der IT-Experten, deren Unternehmen \u00fcber eine konsequent angewandte Verschl\u00fcsselungsrichtlinie verf\u00fcgt, stieg von 50 auf 62 Prozent. Ein weiterer positiver Befund des Berichts sind verminderte Schwierigkeiten bei der Umsetzung von Verschl\u00fcsselungsstrategien, insbesondere beim Auffinden der Daten (55 Prozent gegen\u00fcber 65 Prozent 2021) und deren Klassifizierung (27 Prozent gegen\u00fcber 34 Prozent). <\/p><div class=\"great-fullsize-content-de\" style=\"float: left;\" id=\"great-2057979825\"><div id=\"great-3211484497\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div><\/div>\n\n\n\n<p>Die Ergebnisse belegen deutlich, dass Unternehmen die Sicherheitsprobleme nicht nur erkannt, sondern auch in Angriff genommen haben. Aber sie offenbaren auch L\u00fccken bei der Implementierung von Verschl\u00fcsselungsl\u00f6sungen innerhalb bestimmter sensibler Kategorien. So geben beispielsweise jeweils nur 34 Prozent der Befragten an, Datacontainer oder IoP-Plattformen umfassend zu verschl\u00fcsseln, bei Big-Data-Repositories sind es nur 31 Prozent. \u00c4hnlich verh\u00e4lt es sich mit Hardware-Sicherheitsmodulen (HSMs). Diese werden zwar von 63 Prozent aller Befragten weltweit als wichtiger Bestandteil einer Verschl\u00fcsselungs- und Schl\u00fcsselverwaltungsstrategie eingestuft, die H\u00e4lfte gibt jedoch an, noch nicht \u00fcber HSMs zu verf\u00fcgen. Somit liegt noch ein weiter Weg vor den Unternehmen.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eine konsistente Verschl\u00fcsselungsstrategie wird immer wichtiger.<\/p>\n","protected":false},"author":38,"featured_media":119050,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"0","footnotes":""},"categories":[5,41842],"tags":[20346,41871],"coauthors":[19920],"class_list":["post-119048","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-management","category-mag-22-10","tag-cybersecurity","tag-mag-22-10","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH.jpg",1200,540,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH-80x80.jpg",80,80,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH.jpg",1200,540,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH-1168x526.jpg",1168,526,true],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH.jpg",1200,540,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH.jpg",1200,540,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH.jpg",1200,540,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH.jpg",1200,540,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH.jpg",1200,540,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH.jpg",1200,540,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH.jpg",1200,540,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/10\/shutterstock_2141978517_Ar_TH-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Eine konsistente Verschl\u00fcsselungsstrategie wird immer wichtiger.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/de\/category\/it-management\/\" rel=\"category tag\">IT-Management<\/a>, <a href=\"https:\/\/e3mag.com\/de\/category\/mag-22-10\/\" rel=\"category tag\">Mag 22-10<\/a>","author_info_v2":{"name":"E-3 Magazin","url":"https:\/\/e3mag.com\/de\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/119048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/comments?post=119048"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/119048\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/media\/119050"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/media?parent=119048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/categories?post=119048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/tags?post=119048"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/coauthors?post=119048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}