Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Top 5 use cases for PKI

84% 82%
70%
60%
51%

TLS/SSL Public Enterprise VPN Email


cloud-based user
applications authentication

2020
GLOBAL PKI AND IoT TRENDS STUDY
PKI usage explodes for cloud applications and
user authentication

84% 2019
79%
82%
2020
70% 69%

60%
55% 54%
51% 51%

TLS/SSL Public Enterprise VPN Email


cloud-based user
applications authentication

2020
GLOBAL PKI AND IoT TRENDS STUDY
Top GROWING use cases for PKI since 2019

UP
+27% UP
+19%

82% 70%
Public cloud-based Enterprise user
applications authentication

2020
GLOBAL PKI AND IoT TRENDS STUDY
Top 3 challenges to enabling applications to use PKI

UP
Lack of knowledge/
visibility of their PKI’s
+16% 52%
FROM 2019
security capabilities

UP
No ability to change +5% 51%
legacy applications FROM 2019

Existing PKI is incapable of DOWN


51%
supporting new applications -5%
FROM 2019

2020
GLOBAL PKI AND IoT TRENDS STUDY
How many applications use your PKI?

8.3
AVERAGE

1 or 2 3 or 4 5 or 6 7 or 8 9 or 10 11 or 12 13 or more
4% 12% 19% 19% 17% 15% 14%

2020
GLOBAL PKI AND IoT TRENDS STUDY
Top areas of change in PKI since 2019

UP UP
+10% +12%

49% 52%
External mandates New applications
and standards such as the IoT

2020
GLOBAL PKI AND IoT TRENDS STUDY
Average number of certificates issued and acquired

2015 31,409

2016 35,534

2017 35,488

2018 38,631
+43%
Increase
2019 to
2020
2019 39,197

2020 56,192

2020
GLOBAL PKI AND IoT TRENDS STUDY
Diversified PKI deployment

Internal CA 60%
Externally hosted private
CA – managed service 43%

Public CA service 32%


Private CA running
22%
in a public cloud
Business partner
provided service
15%
Government
provided service
11%

2020
GLOBAL PKI AND IoT TRENDS STUDY
The most important PKI capabilities for IoT in 2020

Scalability to millions
of certificates
46%

Online revocation 37%

Support for Elliptic 31%


Curve Cryptography

Support for FIPS 140-2 Level 3 30%


HSMs for Root and Issuing CAs

Ability to sign firmware


for IoT devices 28%

2020
GLOBAL PKI AND IoT TRENDS STUDY
HSM (hardware security module) use in PKI

47%
42%
36%
30%

22%

12%

Offline Issuing Online Policy Registration OCSP


root CA root CA Authority responder

2020
GLOBAL PKI AND IoT TRENDS STUDY
Top 3 security controls for PKI

57% 49% 42%


Multi-factor authentication Physically secure Documented formal
for administrators location security practices

2020
GLOBAL PKI AND IoT TRENDS STUDY
Most significant IoT threats

Altering the function of the 68%


device (e.g., by loading malware)

Controlling the device remotely 54%

Using the device as


39%
a network entry point

Capturing data from the device 39%

2020
GLOBAL PKI AND IoT TRENDS STUDY
Most important IoT security capabilities
1=not important to 5=very important

3.3
3.2

3.0
2.9
2.8

Device Monitoring Device Protecting Delivery of


discovery device authentication confidentiality patches and
behavior and integrity updates to
of device data devices

2020
GLOBAL PKI AND IoT TRENDS STUDY

You might also like