financetom
Technology
financetom
/
Technology
/
Prime Factors Recognized in the Gartner® Hype Cycle™ for Data Security Technologies, 2025
News World Market Environment Technology Personal Finance Politics Retail Business Economy Cryptocurrency Forex Stocks Market Commodities
Prime Factors Recognized in the Gartner® Hype Cycle™ for Data Security Technologies, 2025
Sep 30, 2025 7:07 AM

EUGENE, Ore., Sept. 30, 2025 /PRNewswire/ -- Prime Factors, a leader in application-level data protection, has been recognized as a Sample Vendor in the Gartner Hype Cycle for Data Security Technologies, 2025.

Gartner states, "Security and risk management leaders are prioritizing data security efforts amid emerging challenges from AI, geopolitical instability and quantum computing. AI trust, risk and security management, crypto-agility, and data access governance, among other innovations, can help mitigate data security risks from these drivers." According to Gartner, "Crypto-agility is the capability to transparently swap out encryption algorithms and related artifacts in an application, replacing them with different and, presumably, safer algorithms."

Gartner cautions, "Looking ahead, as quantum computing threats transition from theoretical concerns to practical realities, SRM leaders will need to prioritize crypto-agility and the implementation of postquantum cryptographic controls," adding that "Furthermore, with the looming introduction of widespread quantum computing, asymmetric cryptography algorithms are no longer safe. SRM leaders should pay close attention to crypto-agility, postquantum cryptography and quantum key distribution. This includes transitioning to quantum-safe algorithms, as the urgency to replace vulnerable cryptographic algorithms will only intensify as we approach the end of the decade." Gartner explains, "SRM leaders must carefully evaluate and select the appropriate data security technologies to align with their organizations' objectives. Doing so is crucial to mitigating regulatory risks and protecting the organization from potential reputational damage caused by ineffective data security programs."

"As new threats continue to emerge, organizations must take a proactive approach to their cryptography, one that prioritizes flexibility and adaptability over time," said Juan Asenjo, Director of Product Management at Prime Factors. "While the concept of crypto-agility focuses on transitioning to quantum-resistant algorithms, a broader approach delivers even greater value. A true crypto-agile architecture employs the concept of 'data protection agility,' which entails implementing techniques and solutions that enable seamless change to how data is secured with minimal application re-work. Abstracting security from applications and centralizing policy management with distributed enforcement is what helps makes this possible."

Gartner states common implementation challenges, however, explaining, "Crypto-agility is fundamentally a developer-driven effort, but developers often lack architectures, patterns, libraries and other artifacts needed to successfully implement crypto-agile applications." They go on to say, "Many organizations lack the expertise needed to lead this kind of cryptographic hygiene, delaying action and becoming blind to risks," further warning, "Most organizations don't know how cryptography functions within their operations, where keys and algorithms are used, or how secrets are stored and managed. Swapping them out for new algorithms will be challenging."

"We believe, this is where Prime Factors' innovative data security technology comes into play," said Asenjo. "We set out to build a solution that could make protecting data both now and in the future possible and attainable for enterprises, enabling them to better manage their data security architecture and avoid costly application re-development when changes arise. Prime Factors' data security platform, EncryptRIGHT, simplifies application-level data protection by combining centralized policy management with distributed enforcement, leveraging a broad spectrum of techniques like encryption, tokenization, and data masking. Adopting a policy-driven model not only streamlines implementation and reduces inconsistencies but also simplifies crypto-agility implementation so that organizations can seamlessly evolve their security measures."

Gartner clients can access the full report here.

*Gartner, "Hype Cycle for Data Security Technologies", Andrew Bales, July 10, 2025.

Gartner Disclaimer

GARTNER and Hype Cycle are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Prime Factors

Prime Factors is a global leader in applied data protection software, helping to secure an open and collaborative digital world. Data has never been more plentiful or more valuable, and the protection of sensitive data has never been more complex. With a focus on application-level data protection, software solutions from Prime Factors help to simplify the complexities associated with protecting sensitive information where it is most at risk. For 40 years, Prime Factors has served more than 1,000 customers across six continents in a variety of industries, including 80% of the top financial institutions in North America, with cryptographic software solutions for payments, information exchange, and general data protection. www.primefactors.com Follow us on LinkedIn or X.

About EncryptRIGHT®

Leveraging a Data Security Governance approach, EncryptRIGHT defines and enforces how data is protected, who can access secure data, and what form the data takes when access is granted. In a single code base, EncryptRIGHT combines a variety of different security techniques, including encryption, hashing, digital signing, redaction masking, tokenization, and dynamic data masking, along with role-based access controls, and audit logging and reporting, to robustly define and enforce data privacy. By abstracting data protection policies from application programming, EncryptRIGHT delivers application-native data protection in just a few lines of code – significantly simplifying the enforcement of data protection in a way that drastically reduces implementation times, while enforcing a complete separation of duties between information security and application programming. EncryptRIGHT delivers application-level data protection, simplified.

View original content to download multimedia:https://www.prnewswire.com/news-releases/prime-factors-recognized-in-the-gartner-hype-cycle-for-data-security-technologies-2025-302569544.html

SOURCE Prime Factors

Comments
Welcome to financetom comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
Related Articles >
Analysis-Apple antitrust suit mirrors strategy that beat Microsoft, but tech industry has changed
Analysis-Apple antitrust suit mirrors strategy that beat Microsoft, but tech industry has changed
Mar 22, 2024
(Reuters) - The U.S. government's antitrust lawsuit against Apple ( AAPL ) draws on the watershed 1998 case that broke Microsoft's ( MSFT ) stranglehold on desktop software, but that may prove to be an imperfect blueprint for addressing smartphone competition. The market for the iPhone today looks very different from the near-monopoly enjoyed by Microsoft's ( MSFT ) Windows...
Japan braces for life with interest rates after historic change
Japan braces for life with interest rates after historic change
Mar 21, 2024
TOKYO (Reuters) - In the coming years, Satoaki Kanoh needs to replace almost a dozen ageing machines at his Tokyo-based maker of acrylic panels, a major undertaking that he worries will become even more expensive. Ideally, I'd like to do one a year. But I don't have that much money, Kanoh said of the customised pieces of machinery that cost...
AIOZ Network Partners With Alibaba Cloud to Boost AI, Storage and Streaming Services
AIOZ Network Partners With Alibaba Cloud to Boost AI, Storage and Streaming Services
Mar 22, 2024
The two companies will establish a DePIN alliance in south-east Asia.AIOZ's native token is currently trading flat after the announcement, it is up by more than 200% in 30 days.AIOZ Network will use Alibaba Cloud to improve Web 3, AI, storage and streaming services.Decentralized infrastructure network (DePIN) AIOZ Network has become the leading blockchain partner in Alibaba Cloud’s Innovation Accelerator...
Japan braces for life with interest rates after historic change
Japan braces for life with interest rates after historic change
Mar 21, 2024
TOKYO, March 22 (Reuters) - In the coming years, Satoaki Kanoh needs to replace almost a dozen ageing machines at his Tokyo-based maker of acrylic panels, a major undertaking that he worries will become even more expensive. Ideally, I'd like to do one a year. But I don't have that much money, Kanoh said of the customised pieces of machinery...
Copyright 2023-2026 - www.financetom.com All Rights Reserved