We have organized the report according to the following themes:
- Strategy and adoption of encryption
- Threats, main drivers and priorities
- Deployment choices
- Encryption features considered most important
- Attitudes about key management
- Importance of hardware security modules (HSMs)
- Cloud encryption