What is the best approach to ensure secure data transfer in the cloud?
Implementing end-to-end encryption24%
Regularly monitoring for threats57%
Setting strict access control rules7%
All of the above10%
376 PARTICIPANTS
Implementing end-to-end encryption24%
Regularly monitoring for threats57%
Setting strict access control rules7%
All of the above10%
Yes, both30%
Yes, but only 378650%
Yes, but only 36028%
Patching is in progress for one or both6%
No4%
Traditional methods can sometimes be just as effective as cutting-edge innovations?28%
Technology can lead to a depreciation of fundamental skills?44%
Technological innovations often introduce unnecessary complexity, making processes less accessible and more expensive?35%
Stressed or overwhelmed by the pressure to constantly adapt to new technologies and methods?24%
Technological progress is driven by human needs and experiences rather than just what is technologically possible?10%
No selling.
No recruiting.
No self promotion.

Rules of EngagementFAQsPrivacy
© 2025 Gartner, Inc. and/or its affiliates. All rights reserved.
Monitor, secure, protect and detect
All of the above is the only real way to protect and secure your data transfer. If you don’t have visibility, you’re flying blind