SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check Out Our Special Report On Casino Security

Get it now!

DigiCert Survey Highlights Importance Of Digital Trust In Business Outcomes, Customer Loyalty

18 Nov 2022

DigiCert Survey Highlights Importance Of Digital Trust In Business Outcomes, Customer Loyalty
Contact company
Contact DigiCert, Inc.
icon Add as a preferred source Download PDF version
Related Links
  • DigiCert’s Root Certificate Authority Is Approved By The Connectivity Standards Alliance (Alliance) For Matter Device Attestation
  • Door Security Trends: The Path Forward
  • Using Technology To Address Loss Prevention During The Holidays

DigiCert, Inc., a provider of digital trust, releases its 2022 State of Digital Trust Survey that finds that almost half of consumers (47%) have stopped doing business with a company after losing trust in that company’s digital security. If companies do not manage digital trust, 84% of their customers would consider switching, with 57% saying switching would be likely.

Digital trust enables organizations and individuals to participate in the connected world with the confidence that their digital footprint is secure.

Expanding attack surface

Amid the backdrop of an expanding attack surface, organizations require digital trust for a variety of use cases, including connected device and user identity and access, data integrity, software security, email protection, and web and digital content integrity. Companies that are strategically investing in the digital trust are positioning themselves now as stewards of a secure, connected world.

Digital trust isn't just a buzzword. It provides the freedom to fully participate in the digital world"

“Digital trust isn't just a buzzword. It provides the freedom to fully participate in the digital world,” said Jason Sabin, CTO at DigiCert. “It has become crucial to maintaining customer loyalty and the loss of it has a direct impact to the brand. If customers lose confidence in the digital trust competency of a vendor, they’ll eventually leave.”

Meeting regulatory requirements

One hundred percent of enterprises surveyed said digital trust is important. Top reasons include the growing importance of data, an expanding threat surface, an increase in bad actors and pressure from customers. Nearly all (99%) enterprises believe it is possible that their customers would switch to a competitor if they lost trust in the enterprise’s digital security.

It’s also essential to take stock of how customers perceive the digital trust of an organization. Ninety-nine percent of enterprises said their customers have more confidence in the enterprise’s digital trust today than in the past. Nearly three quarters (73%) said it is significantly more.

Organizations recognize the importance of digital trust to their success, and top digital trust initiatives include increasing customer loyalty, reducing the number of security incidents and meeting regulatory requirements. But it isn’t easy. The top three challenges IT cited include managing digital certificates, meeting regulatory compliance and handling the massive scope of digital assets to protect.

Stringent privacy laws

More than half (57%) of consumers surveyed have experienced cybersecurity attacks

Consumers don’t have the same perceptions as organizations. More than half (57%) of consumers surveyed have experienced cybersecurity attacks. Top attacks include account hacks, password exposure, and bank or credit account theft. Less than half of the consumer respondents said their digital trust in the organizations they deal with is more than in the past, and 54% say there is room for improvement.

North America leads the world in rating digital trust as extremely important, followed by Asia-Pacific (APAC). Ninety-one percent of APAC consumers are concerned about cyber threats, more than anywhere else in the world.

For a region with stringent privacy laws, EMEA consumers are surprisingly relaxed about digital trust and have the lowest level of concern for cyber threats. However, EMEA shows strong interest at the enterprise level. Latin America-based enterprises lag behind the other regions in viewing digital trust as extremely important.

Digital trust metrics

The survey included a series of questions to determine how well (or poorly) each respondent was doing across a wide range of digital trust metrics. After the scores were totaled, the respondents were split into three groups: leaders, laggards and those in the middle. The leaders and laggards were then compared to examine the differences and explore what the leaders were doing better.

The leaders range from 10% better to 300% better in every metric

The leaders report doing three times as well as laggards with eCommerce website performance and availability, and 2.9 times as many say they’re doing well at preventing phishing or other email-based attacks. The leaders range from 10% better to 300% better in every metric. Overall, the leaders’ approach to digital trust is more strategic.

Switching business partners

For example:

  • The top tier is 4.5 times as likely to believe a loss of customer trust will lead to a loss of that customer. They are also more likely to believe that digital trust affects their brand, sales and margin. In addition, they are 5.6 times as likely to say they would switch business partners if they lost trust.
  • The top tier is further along in their digital trust journey and will complete that journey much earlier than the bottom tier.
  • The top tier takes cyber threats much more seriously. They are 1.5 to 2.3 times as likely to be concerned about cyber threats.
  • The top tier is up to three times as likely to be engaged with important cybersecurity safeguards.

Improving digital trust

DigiCert recommends the following steps to improve digital trust:

  • Make digital trust a strategic imperative. This was one of the clear differentiators for the top-tier enterprises, which recognized that digital trust impacts important business outcomes such as brand, customer loyalty, revenue and margins.
  • Establish a Digital Trust Office within their organization’s technology function, with a clear leader empowered with decision-making power.
  • Recognize that digital trust awareness is rising among the users, including consumers, and that the business success and reputation are tied directly to their ability to ensure digital trust at a high level.
  • Enlist expert help in their quest for digital trust. One of the digital trust challenges cited by enterprises was a lack of staff expertise. Make sure the partners they bring on have a comprehensive portfolio spanning the building blocks of digital trust and can provide solutions for unified trust management for their entire organization.
  • Remember — the customers care about digital trust and protecting servers, users, devices, documents and DevOps processes. Establish clear lines of digital trust communication with them, explaining not only the commitment to digital trust but also the progress.

Dallas-based Eleven Research administered the survey to 400 IT, Information Security and DevOps senior and C-level managers from enterprises with 1,000 or more employees. Four hundred consumers were also surveyed.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Digital video surveillance
  • IP video surveillance
  • Electronic security systems
  • Office security systems
  • Office security
  • Application security
  • Commercial security
  • Perimeter security
  • Security management
  • Security devices
  • Security access systems
  • Radio frequency Identification
  • Asset tracking
  • Video analytics
  • Electronic access control
  • Identity management
  • Building security
  • Facility security
  • Network cameras
  • Door access control
  • Security software
  • IP Surveillance
  • Security service
  • IP security solutions
  • Security communication
  • Integration software
  • Perimeter protection
  • Cyber security
  • Corporate Security
  • Data Security
  • Incident Management
  • Power Supplies
  • Security Assessments
  • Cloud security
  • Mobile access
  • Video surveillance
  • Touchless Security
  • Related links
  • ELATEC Access control software
  • ANPR Software Video Surveillance software
  • Access Control Software Access control software
  • Biometric Access control software
  • Standalone Access control controllers
  • Contact Access control software
  • Detection Software Video Surveillance software
  • Broadcast Messenger Access control software
  • Drawing Software Video Surveillance software
  • Mifare Access control software
  • Carpool Anti-passback Access control software
  • IP Surveillance Software Video Surveillance software
  • Management Software Video Surveillance software
  • Recording Software Video Surveillance software
  • Centrally managed access solution Access control software
  • Surveillance Software Video Surveillance software
  • Door Monitoring Option Access control software
  • Face Recognition Software Access control software
  • ID Badging Software License Access control software
  • Keypad Commands/Intrusion Zones Access control software
  • Management Systems Upgrade Access control software
  • NetVue Interface to Intellex Access control software
  • NetVue Interface to Nice Systems Access control software
  • Redundant System Software Access control software
  • Remote software for telecode door entry phone system Access control software
  • Server software for MSDE Access control software
  • Version Upgrade Access control software
  • Related categories
  • Video Surveillance software
  • Access control controllers
  • Access control software
Related white papers
Physical Access Control

Physical Access Control

Download
Machine Operator Authentication

Machine Operator Authentication

Download
RFID For GMP/GLP Environments

RFID For GMP/GLP Environments

Download
Related articles
The Importance Of Machine Authentication In Plant Safety And Security

The Importance Of Machine Authentication In Plant Safety And Security

Universal Readers Create A Frictionless Access Experience For Orion Entrance Control

Universal Readers Create A Frictionless Access Experience For Orion Entrance Control

Security Considerations For RFID And Mobile Access

Security Considerations For RFID And Mobile Access

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Corporate news

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec