{"id":14591,"date":"2015-12-01T09:00:00","date_gmt":"2015-12-01T17:00:00","guid":{"rendered":"https:\/\/blogs.technet.microsoft.com\/dataplatforminsider\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/"},"modified":"2024-01-22T22:52:21","modified_gmt":"2024-01-23T06:52:21","slug":"always-encrypted-data-security-and-competitive-advantage","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/","title":{"rendered":"Always Encrypted Data Security and Competitive Advantage"},"content":{"rendered":"<p>As data becomes the center of digital business, your organization\u2019s ability to secure data is crucial for compliance and confidentiality. But data security is so important that it can also be a competitive differentiator. Indeed, Forrester Research reports a focus on data security can help drive customer loyalty and retention, create opportunities for premium offers and new sources of revenue, and protect future revenue streams.<\/p>\n<p>For example, suppose your data platform\u2019s security technology can assure customers that their credit card transactions complete quickly at the point of sale. In addition, suppose your data platform allows you to protect customer data by means of encryption throughout that transaction. A data platform that includes built-in technology to encrypt the customer\u2019s sensitive data within the database and during transaction-processing provides the foundation for customer satisfaction\u2014and differentiates your organization from competitors that rely on less advanced data security.<\/p>\n<p>Such assurance is built into the SQL Server 2016 data platform with Always Encrypted technology. (For details on the security built into the SQL Server platform, see &#8220;<a href=\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/11\/18\/always-encrypted-in-sql-server-azure-sql-database?wt.mc_id=WW_CE_DM_OO_BLOG_NONE\">Always Encrypted in SQL Server &amp; Azure SQL Database<\/a>.\u201d). And Always Encrypted capabilities are just one example of Microsoft\u2019s innovative and comprehensive approach to security. Microsoft has made security a priority for more than a decade. As a result, according to the National Institute of Standards and Technology2 (NIST) public security board, SQL Server has the fewest security vulnerabilities when compared with the major database vendors. In addition, SQL Server has been deemed \u201cthe most secure database\u201d by the Information Technology Industry Council (ITIC).<\/p>\n<p>Besides devoting internal efforts to security, Microsoft works closely with customers and the SQL Server community to ensure that security is properly implemented. As noted by Douglas McDowell, SQL Server MVP and North America CEO, of consulting company SolidQ, \u201cSQL Server continues to be one of the most secure database platforms. Microsoft increases SQL Server security with each release (check out Always Encrypted in SQL Server 2016). SQL Server security is all about the platform being secure by design and by default, running it under a hardened configuration, and then making sure best practice security processes and procedures are followed.\u201d<\/p>\n<p>This across-the-board focus on security contrasts with the position of other database vendors: Recall the news in August 2015 when Oracle\u2019s chief security officer berated customers for performing their own security testing on Oracle software and demanded they stop. Although May Ann Davidson\u2019s statements were later removed from her blog, her comments reveal a lack of understanding when it comes to security and customer needs.<\/p>\n<p>As the Forrester study highlighted, excellent data security can help organizations compete. And if there is any doubt about how data professionals rate the importance of advanced security technology, consider the results of a recent independent study by King Research: More than 400 security professionals rated the importance of various criteria for selecting security products on a scale of 1 to 10. Respondents placed \u201cSecurity Advantage by Using Superior Technology\u201d at a very high 7.5 on that scale.<\/p>\n<p>Microsoft recognizes that a commitment to security is a key criterion when you evaluate data platforms. SQL Server provides superior data platform security technology that can serve as the foundation for a comprehensive data security strategy to help your organization compete. Find out how to take advantage of that technology by attending the webinar, &#8220;<a href=\"https:\/\/info.microsoft.com\/CO-SQL-WBNR-FY16-09Sep-14-Top5DataChallenges-Register.html?ls=Website?wt.mc_id=WW_CE_DM_OO_BLOG_NONE\">Tackle the top five data challenges with SQL Server<\/a>.&#8221; For a more detailed overview download the <a href=\"http:\/\/download.microsoft.com\/download\/2\/C\/B\/2CB311D6-EC00-428C-80F3-03E7369013DD\/SQL_Server_Mission_Critical_Performance_TDM_White_Paper.pdf?wt.mc_id=WW_CE_DM_OO_BLOG_NONE\">white paper<\/a> on SQL Server 2016 mission-critical capabilities.<\/p>\n<\/p>\n<p>References:<\/p>\n<ol>\n<li>\n<em>The Future of Data Security And Privacy: Growth And Competitive Differentiation Vision: The Data Security And Privacy Playbook<\/em>, John Kindervag, Heidi Shey, and Kelley Mak, Forrester, July 10, 2015<\/li>\n<li>National Institute of Standards and Technology Comprehensive Vulnerability Database update 10\/2015<\/li>\n<li>Companies Lack Security Controls for Accessing Enterprise Applications, King Research<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>As data becomes the center of digital business, your organization\u2019s ability to secure data is crucial for compliance and confidentiality. But data security is so important that it can also be a competitive differentiator.<\/p>\n","protected":false},"author":1457,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"post_tag":[],"product":[5227,2403],"content-type":[2424,2445],"topic":[2460],"coauthors":[],"class_list":["post-14591","post","type-post","status-publish","format-standard","hentry","product-sql","product-sql-server-2016","content-type-best-practices","content-type-thought-leadership","topic-data-security","review-flag-1593580427-503","review-flag-1-1593580431-15","review-flag-5-1593580452-31","review-flag-7-1593580462-294","review-flag-alway-1593580309-407","review-flag-new-1593580247-437"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Always Encrypted Data Security and Competitive Advantage - Microsoft SQL Server Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Always Encrypted Data Security and Competitive Advantage - Microsoft SQL Server Blog\" \/>\n<meta property=\"og:description\" content=\"As data becomes the center of digital business, your organization\u2019s ability to secure data is crucial for compliance and confidentiality. But data security is so important that it can also be a competitive differentiator.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft SQL Server Blog\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/sqlserver\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-01T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-23T06:52:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"SQL Server Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SQLServer\" \/>\n<meta name=\"twitter:site\" content=\"@SQLServer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SQL Server Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/author\/sql-server-team\/\",\"@type\":\"Person\",\"@name\":\"SQL Server Team\"}],\"headline\":\"Always Encrypted Data Security and Competitive Advantage\",\"datePublished\":\"2015-12-01T17:00:00+00:00\",\"dateModified\":\"2024-01-23T06:52:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/\"},\"wordCount\":630,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/\",\"name\":\"Always Encrypted Data Security and Competitive Advantage - Microsoft SQL Server Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#website\"},\"datePublished\":\"2015-12-01T17:00:00+00:00\",\"dateModified\":\"2024-01-23T06:52:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Always Encrypted Data Security and Competitive Advantage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/\",\"name\":\"Microsoft SQL Server Blog\",\"description\":\"Official News from Microsoft\u2019s Information Platform\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#organization\",\"name\":\"Microsoft SQL Server Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft SQL Server Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/sqlserver\",\"https:\/\/x.com\/SQLServer\",\"https:\/\/www.youtube.com\/user\/MSCloudOS\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Always Encrypted Data Security and Competitive Advantage - Microsoft SQL Server Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/","og_locale":"en_US","og_type":"article","og_title":"Always Encrypted Data Security and Competitive Advantage - Microsoft SQL Server Blog","og_description":"As data becomes the center of digital business, your organization\u2019s ability to secure data is crucial for compliance and confidentiality. But data security is so important that it can also be a competitive differentiator.","og_url":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/","og_site_name":"Microsoft SQL Server Blog","article_publisher":"http:\/\/www.facebook.com\/sqlserver","article_published_time":"2015-12-01T17:00:00+00:00","article_modified_time":"2024-01-23T06:52:21+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png","type":"image\/png"}],"author":"SQL Server Team","twitter_card":"summary_large_image","twitter_creator":"@SQLServer","twitter_site":"@SQLServer","twitter_misc":{"Written by":"SQL Server Team","Est. reading time":"2 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/author\/sql-server-team\/","@type":"Person","@name":"SQL Server Team"}],"headline":"Always Encrypted Data Security and Competitive Advantage","datePublished":"2015-12-01T17:00:00+00:00","dateModified":"2024-01-23T06:52:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/"},"wordCount":630,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/","url":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/","name":"Always Encrypted Data Security and Competitive Advantage - Microsoft SQL Server Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#website"},"datePublished":"2015-12-01T17:00:00+00:00","dateModified":"2024-01-23T06:52:21+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2015\/12\/01\/always-encrypted-data-security-and-competitive-advantage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/"},{"@type":"ListItem","position":2,"name":"Always Encrypted Data Security and Competitive Advantage"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/","name":"Microsoft SQL Server Blog","description":"Official News from Microsoft\u2019s Information Platform","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#organization","name":"Microsoft SQL Server Blog","url":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft SQL Server Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/sqlserver","https:\/\/x.com\/SQLServer","https:\/\/www.youtube.com\/user\/MSCloudOS"]}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-json\/wp\/v2\/posts\/14591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-json\/wp\/v2\/users\/1457"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-json\/wp\/v2\/comments?post=14591"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-json\/wp\/v2\/posts\/14591\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-json\/wp\/v2\/media?parent=14591"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-json\/wp\/v2\/post_tag?post=14591"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-json\/wp\/v2\/product?post=14591"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-json\/wp\/v2\/content-type?post=14591"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-json\/wp\/v2\/topic?post=14591"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/wp-json\/wp\/v2\/coauthors?post=14591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}