EUGENE, Ore., Sept. 30, 2025 /PRNewswire/ -- Prime Factors, a leader in application-level data protection, has been recognized as a Sample Vendor in the Gartner Hype Cycle for Data Security Technologies, 2025.
Gartner states, "Security and risk management leaders are prioritizing data security efforts amid emerging challenges from AI, geopolitical instability and quantum computing. AI trust, risk and security management, crypto-agility, and data access governance, among other innovations, can help mitigate data security risks from these drivers." According to Gartner, "Crypto-agility is the capability to transparently swap out encryption algorithms and related artifacts in an application, replacing them with different and, presumably, safer algorithms."
Gartner cautions, "Looking ahead, as quantum computing threats transition from theoretical concerns to practical realities, SRM leaders will need to prioritize crypto-agility and the implementation of postquantum cryptographic controls," adding that "Furthermore, with the looming introduction of widespread quantum computing, asymmetric cryptography algorithms are no longer safe. SRM leaders should pay close attention to crypto-agility, postquantum cryptography and quantum key distribution. This includes transitioning to quantum-safe algorithms, as the urgency to replace vulnerable cryptographic algorithms will only intensify as we approach the end of the decade." Gartner explains, "SRM leaders must carefully evaluate and select the appropriate data security technologies to align with their organizations' objectives. Doing so is crucial to mitigating regulatory risks and protecting the organization from potential reputational damage caused by ineffective data security programs."
"As new threats continue to emerge, organizations must take a proactive approach to their cryptography, one that prioritizes flexibility and adaptability over time," said Juan Asenjo, Director of Product Management at Prime Factors. "While the concept of crypto-agility focuses on transitioning to quantum-resistant algorithms, a broader approach delivers even greater value. A true crypto-agile architecture employs the concept of 'data protection agility,' which entails implementing techniques and solutions that enable seamless change to how data is secured with minimal application re-work. Abstracting security from applications and centralizing policy management with distributed enforcement is what helps makes this possible."
Gartner states common implementation challenges, however, explaining, "Crypto-agility is fundamentally a developer-driven effort, but developers often lack architectures, patterns, libraries and other artifacts needed to successfully implement crypto-agile applications." They go on to say, "Many organizations lack the expertise needed to lead this kind of cryptographic hygiene, delaying action and becoming blind to risks," further warning, "Most organizations don't know how cryptography functions within their operations, where keys and algorithms are used, or how secrets are stored and managed. Swapping them out for new algorithms will be challenging."
"We believe, this is where Prime Factors' innovative data security technology comes into play," said Asenjo. "We set out to build a solution that could make protecting data both now and in the future possible and attainable for enterprises, enabling them to better manage their data security architecture and avoid costly application re-development when changes arise. Prime Factors' data security platform, EncryptRIGHT, simplifies application-level data protection by combining centralized policy management with distributed enforcement, leveraging a broad spectrum of techniques like encryption, tokenization, and data masking. Adopting a policy-driven model not only streamlines implementation and reduces inconsistencies but also simplifies crypto-agility implementation so that organizations can seamlessly evolve their security measures."
Gartner clients can access the full report here.
*Gartner, "Hype Cycle for Data Security Technologies", Andrew Bales, July 10, 2025.
Gartner Disclaimer
GARTNER and Hype Cycle are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
About Prime Factors
Prime Factors is a global leader in applied data protection software, helping to secure an open and collaborative digital world. Data has never been more plentiful or more valuable, and the protection of sensitive data has never been more complex. With a focus on application-level data protection, software solutions from Prime Factors help to simplify the complexities associated with protecting sensitive information where it is most at risk. For 40 years, Prime Factors has served more than 1,000 customers across six continents in a variety of industries, including 80% of the top financial institutions in North America, with cryptographic software solutions for payments, information exchange, and general data protection. www.primefactors.com Follow us on LinkedIn or X.
About EncryptRIGHT®
Leveraging a Data Security Governance approach, EncryptRIGHT defines and enforces how data is protected, who can access secure data, and what form the data takes when access is granted. In a single code base, EncryptRIGHT combines a variety of different security techniques, including encryption, hashing, digital signing, redaction masking, tokenization, and dynamic data masking, along with role-based access controls, and audit logging and reporting, to robustly define and enforce data privacy. By abstracting data protection policies from application programming, EncryptRIGHT delivers application-native data protection in just a few lines of code – significantly simplifying the enforcement of data protection in a way that drastically reduces implementation times, while enforcing a complete separation of duties between information security and application programming. EncryptRIGHT delivers application-level data protection, simplified.
SOURCE Prime Factors

WANT YOUR COMPANY'S NEWS FEATURED ON PRNEWSWIRE.COM?

Newsrooms &
Influencers

Digital Media
Outlets

Journalists
Opted In
Share this article