![]() |
市場調查報告書
商品編碼
1864760
加密安全市場:2025-2032 年全球預測(按組件、部署類型、組織規模、最終用戶和安全類型分類)Crypto Security Market by Component, Deployment Mode, Organization Size, End User, Security Type - Global Forecast 2025-2032 |
||||||
※ 本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。
預計到 2032 年,加密貨幣證券市場規模將成長至 259.2 億美元,複合年成長率為 25.04%。
| 關鍵市場統計數據 | |
|---|---|
| 基準年 2024 | 43.3億美元 |
| 預計年份:2025年 | 54.2億美元 |
| 預測年份 2032 | 259.2億美元 |
| 複合年成長率 (%) | 25.04% |
數位資產生態系統目前正處於創新、監管審查和持續的敵對壓力這三大力量的交匯點,因此,制定企業級安全戰略至關重要。本前言旨在為執行摘要奠定基礎,闡述企業在採用基於區塊鏈的應用、去中心化金融 (DeFi) 和代幣化舉措時面臨的核心安全挑戰。我們將重點闡述為何安全考量不再是小眾的營運問題,而是影響業務永續營運、客戶信任和合規性的董事會層面策略優先事項。
從背景介紹過渡到目的,本導言闡明了這份執行摘要的目的:將複雜的技術、監管和商業性趨勢提煉成可操作的洞察,供企業高管、安全負責人和技術負責人參考。鑑於威脅行為者正日益利用軟體供應鏈、加密金鑰管理和第三方整合中的漏洞,本文強調了將安全投資與業務目標和風險接受度相匹配的必要性。因此,本文旨在為讀者闡明以下內容:對變革性變化、關稅阻力、基於細分市場的影響、區域差異、供應商趨勢以及領導者可立即實施的實用建議的簡明扼要的總結。
最後,本節強調了整合人員、流程和技術的綜合方法的重要性,並指出跨職能管治、持續威脅情報和健全的事件回應模型對於有效的加密安全計畫至關重要。透過圍繞這些支柱建立後續分析,引言部分旨在幫助讀者評估管理不斷演變的風險所需的技術控制措施和策略決策框架。
加密安全領域正經歷著由技術成熟、攻擊者創新和監管範式演變所驅動的變革性變化。智慧合約工具和形式化檢驗的進步提升了安全軟體開發的基礎,但同時,隨著機構整合代幣化、互通帳本和跨域資料共用,攻擊面也不斷擴大。這種動態變化意味著防禦者必須採用既考慮通訊協定級漏洞又考慮企業整合相關風險的威脅模型。
同時,攻擊者正利用自動化、供應鏈漏洞和日益複雜的社交工程手段不斷升級攻擊。因此,威脅情報計畫正從被動的事件追蹤轉向主動的威脅搜尋和預測分析。安全工具也隨之發展演變。現今的解決方案融合了遙測驅動的偵測、行為分析和支援安全金鑰生命週期管理的加密原語。
在管治方面,監管機構正在統一託管、交易透明度和消費者保護方面的標準,迫使各組織在創新雄心與合規義務之間尋求平衡。這促使安全團隊與法務、產品和風險部門更緊密地合作,並建立將合規性融入設計和實施流程的營運架構。這些技術、攻擊和監管方面的綜合力量正在重塑各組織評估風險、分配安全支出以及確定加密安全計畫功能優先順序的方式。
美國貿易政策近期關稅政策的累積影響對加密安全生態系統產生了重大影響,尤其是對那些依賴全球化供應鏈進行硬體、軟體開發和管理服務的公司而言。關稅相關的成本壓力波及採購決策,改變供應商的經濟模式,並促使企業重新評估其加密硬體、安全元件製造和專用安全設備的籌資策略。因此,許多組織面臨策略選擇:要麼承受更高的單位成本,要麼重新架構以最大限度地減少對受影響組件的依賴,要麼將生產和採購轉移到其他地區。
除了直接的成本影響外,關稅還會影響產品藍圖的推進速度和專用組件的供應。硬體交付延遲和價格波動加劇會延長整合週期,使認證流程複雜化,並需要採取臨時性變通方案,從而降低階到端的安全防護能力。這些營運負擔增加了加強供應鏈風險管理的必要性,包括擴大合約保固範圍、加強組件來源檢驗以及改善部署前檢查和測試通訊協定。
除了採購之外,關稅也會對人才和服務市場產生間接影響。供應商企業發展的變化將影響本地人才庫和通路合作夥伴生態系統,從而推動對遠端管理服務的需求,並增加對安全隔離區和雲端託管金鑰管理服務等軟體解決方案的依賴。這些趨勢迫使安全領導者重新評估其彈性策略,強調模組化架構以支援元件替換,並加強對加密金鑰儲存和韌體完整性的控制,以降低轉型期間風險的增加。
了解加密安全市場的細分對於根據組織需求和部署實際情況自訂功能至關重要。基於組件,該市場可分為服務和解決方案路徑。服務包括諮詢和實施路徑,例如諮詢、整合和實施、資安管理服務以及培訓;而解決方案則涵蓋廣泛的技術控制,包括應用安全、區塊鏈安全、資料加密、終端安全、身分和存取管理、基礎設施安全、金鑰管理、網路安全以及安全資訊和事件管理 (SIEM)。這種雙重性意味著採購決策需要在諮詢主導的成熟度建構與選擇能夠高效互通的不同技術平台之間取得平衡。
從部署角度來看,雲端和本地部署在架構和維運模型方面仍然至關重要。雲端部署能夠實現快速擴展和集中式遙測,但需要嚴格的多租戶隔離、第三方保障以及雲端原生金鑰管理技術。另一方面,本地部署通常是那些對資料居住有嚴格要求或受監管約束的組織的首選,因為與現有企業身分管理和基礎設施安全措施的緊密整合至關重要。
組織規模也會影響解決方案的選擇和交付模式。大型企業往往優先考慮支援複雜混合環境和廣泛合規性要求的整合平台和託管服務,而小型企業則通常更傾向於模組化解決方案、雲端優先服務以及能夠以更低營運成本交付成果的供應商夥伴關係。此外,最終用戶產業(金融服務、能源和公共產業、政府、醫療保健和生命科學、資訊科技和通訊、零售和電子商務)也會影響威脅模型、監管要求以及特定安全類型的優先級,例如區塊鏈安全、金鑰管理和 SIEM 功能。整合細分觀點——組件、部署類型、組織規模、最終用戶和安全類型——能夠幫助經營團隊建立一個將技術控制與業務約束和風險接受度能力相匹配的安全計劃。
區域趨勢在塑造威脅情勢、監管態勢和供應商生態系統方面發揮著至關重要的作用,而這些正是任何加密貨幣安全策略的基礎。在美洲,監管監督和機構採用與成熟的安全供應商和服務供應商生態系統並存。這創造了一個環境,使得先進的託管模式、合規主導的控制措施和機構管理服務得以廣泛應用,從而鼓勵各組織在重視技術彈性的同時,優先考慮管治和審核。同時,在歐洲、中東和非洲地區,監管方法和威脅行為者的特徵正在分化,一些司法管轄區提倡統一標準,而另一些則優先考慮資料主權和國家安全控制,這就需要製定量身定做的應對措施,以平衡跨境資料流動與本地合規要求。
亞太地區在金融科技應用和數位基礎設施方面正經歷快速創新,但法規結構和市場成熟度卻各不相同。該地區往往是大規模支付創新和數位身分舉措的推動力量,因此安全方案必須考慮與該地區付款基礎、多元化的身份生態系統以及有時分散的供應商格局的互通性。在所有地區,區域地緣政治緊張局勢和貿易政策的變化都會影響供應鏈和供應商選擇,進而影響組件的彈性以及某些部署方案的可行性。
因此,關於供應商風險、數據位置、事件回應協調和人才招募的決策應反映區域性洞察。採取區域敏感型方法(即集中管治與區域營運控制相結合)的組織將更有能力應對複雜的監管環境,有效應對跨境事件,並在不同的營運環境中保持安全結果的一致性。
加密安全領域的競爭格局呈現出多元化的特點,既有專注於特定領域的專業供應商,也有成熟的企業安全公司,還有拓展代幣化服務的系統整合商。該領域的領導企業憑藉深厚的密碼工程技術、強大的金鑰管理能力以及在安全託管模型和智慧合約保障方面的成熟經驗脫穎而出。除了這些技術能力之外,成功的公司還提供強大的專案服務,例如資安管理服務、持續監控和事件回應服務,以滿足企業客戶對業務連續性的需求。
夥伴關係生態系統正變得日益重要,技術供應商、雲端服務供應商和專業服務公司正在建立整合交付模式。這些合作能夠實現端到端解決方案,將硬體安全模組、雲端金鑰管理和應用層保護與持續的、可控的檢測和回應相結合。同時,開放原始碼計劃和通訊協定級工具有助於實現互通性,但在生產環境中應用之前,仍需經過嚴格的管治和安全審查。
在評估供應商時,應優先考慮可驗證的加密技術來源、透明的漏洞揭露政策以及強大的第三方檢驗,例如獨立的安全性評估和穿透測試。同樣重要的是,託管服務的服務等級保證、硬體組件可追溯的供應鏈保障,以及清晰的功能整合和合規性支援藍圖。能夠清楚展現卓越技術和穩健營運支援模式的公司,將更有優勢贏得企業客戶的青睞,因為越來越多的組織正在尋求承包、高彈性的加密安全解決方案。
產業領導者應採取務實且積極主動的方式,從人員、流程和技術層面加強加密安全。首先,至關重要的是建立一個跨職能的管治結構,創建一個風險管理論壇,整合安全、法律、產品和業務等各個相關人員。此管治模型應明確儲存、事件回應和第三方風險的決策權限,並確保技術選擇既符合安全要求又符合業務目標。在管治中建立清晰的升級路徑和基於指標的監控機制,可以減少不確定性,並在事件發生時縮短回應時間。
接下來,領導者必須投資於能力建設項目,包括為開發人員提供關於安全智慧合約設計模式、加密安全規範和安全整合技術的結構化培訓,以及持續進行紅隊和紫隊演練,以檢驗檢測和響應能力。此類人才培養投資的回報在於減少常見的配置錯誤,並提高初始事件回應的速度和準確性。
第三,從技術角度來看,應優先採用模組化架構,最大限度地減少單點故障,並在因地緣政治或關稅風險導致供應鏈中斷時能夠快速更換組件。應採用多層控制措施,包括基於硬體的金鑰儲存、強大的識別及存取管理、端對端加密以及基於廣泛遙測資料的監控。最後,應實施全面的供應商實質審查和合約保障措施,要求供應商提供產品溯源管理、遵循安全的開發生命週期實務並及時揭露漏洞。這些措施共同作用,將建構一個兼顧創新、營運安全和合規性的彈性系統。
本執行摘要的調查方法融合了定性和結構化分析技術,以確保研究結果基於實證,並對實踐者俱有實用價值。主要資料來源包括對來自各行各業的安全領導者、密碼學專家和首席架構師的專家訪談,這些訪談提供了關於實施挑戰、管治實踐和事件回應的實用觀點。此外,還對技術資訊披露、安全公告和通訊協定文件進行了系統性審查,以檢驗技術聲明並揭示反覆出現的漏洞模式。
透過全面檢驗多個資料流,分析的嚴謹性得以增強。從業人員的證詞與事故案例研究和供應商能力描述相結合,以識別一致的主題。調查方法強調結論的可重複性和透明度,記錄假設,並清楚區分觀察到的模式和推論的含義。當需要進行解釋時,分析優先考慮保守的、基於證據的立場,並重點指出需要進一步調查的不確定領域。
在整個過程中,倫理考量指導資料處理和供應商描述,避免超出公共支援範圍進行歸屬,並確保敏感的操作細節在策略層面而非指令層面進行討論。最終形成的調查方法兼顧了實踐者的洞見和系統的分析,為尋求加強加密安全計劃的決策者提供切實可行的建議。
總之,不斷演變的加密安全環境要求企業具備清晰的策略方向、嚴謹的營運和靈活的架構。整合管治、人才培育和技術保障措施的組織將更有能力應對創新和對抗壓力帶來的雙重挑戰。這個環境由多種因素共同塑造——加密工具和去中心化架構的進步、監管力度的加大以及持續的供應鏈和關稅衝擊——因此,風險管理方法必須全面考慮這些因素。
領導者應將安全視為一項持續性計劃,而非一次性的合規活動,該計劃需要持續投資於檢測、回應和保障能力。透過應用本文提出的分段觀點和區域洞察,組織可以優先考慮能夠直接應對其營運限制和威脅敞口的控制措施。這種務實的方法使決策者能夠在控制深度、營運複雜性和上市速度之間做出基於證據的權衡。
確保加密專案安全最終取決於跨部門協作、嚴格的供應商篩選以及對系統韌性的重視。遵循這些原則的組織將更有能力掌握分散式帳本技術所帶來的策略機遇,同時維護客戶、合作夥伴和監管機構所要求的信任和誠信。
The Crypto Security Market is projected to grow by USD 25.92 billion at a CAGR of 25.04% by 2032.
| KEY MARKET STATISTICS | |
|---|---|
| Base Year [2024] | USD 4.33 billion |
| Estimated Year [2025] | USD 5.42 billion |
| Forecast Year [2032] | USD 25.92 billion |
| CAGR (%) | 25.04% |
The digital asset ecosystem now sits at the intersection of innovation, regulatory scrutiny, and persistent adversarial pressure, creating an imperative for enterprise-grade security strategies. This introduction establishes the context for the executive summary by framing the core security challenges that organizations face as they adopt blockchain-based applications, decentralized finance, and tokenization initiatives. It outlines why security considerations are no longer a niche operational concern but a board-level strategic priority that influences business continuity, customer trust, and regulatory compliance.
Moving from context to intent, the introduction clarifies the purpose of this executive summary: to synthesize complex technical, regulatory, and commercial developments into actionable intelligence for C-suite executives, security leaders, and technology strategists. It emphasizes the need to align security investments with business objectives and risk tolerance, recognizing that threat actors increasingly exploit gaps across software supply chains, cryptographic key management, and third-party integrations. Consequently, the narrative sets expectations for what follows: a concise distillation of transformative shifts, tariff-driven headwinds, segmentation-based implications, regional differentials, vendor dynamics, and pragmatic recommendations that leaders can operationalize immediately.
Finally, this section stresses the importance of an integrated approach that blends people, processes, and technology. It highlights that effective crypto security programs require cross-functional governance, continuous threat intelligence, and resilient incident response models. By framing the subsequent analysis around these pillars, the introduction primes readers to evaluate both technical controls and strategic decision-making frameworks necessary to manage evolving risks.
The landscape for crypto security is undergoing transformative shifts driven by technological maturation, adversary innovation, and evolving regulatory paradigms. Advances in smart contract tooling and formal verification have increased the baseline of secure software development, yet at the same time the attack surface has expanded as institutions integrate tokenization, interoperable ledgers, and cross-domain data sharing. This dynamic means defenders must adopt threat models that account for both protocol-level vulnerabilities and enterprise integration exposures.
Simultaneously, adversaries are leveraging automation, supply-chain exploitation, and increasingly sophisticated social engineering to escalate attacks. Threat intelligence programs are therefore moving from reactive incident tracking to proactive hunting and predictive analytics. This shift is accompanied by a corresponding evolution in security tooling: solutions now embed telemetry-driven detection, behavior analytics, and cryptographic primitives that support secure key lifecycle management.
On the governance front, regulators are converging on standards for custody, transaction transparency, and consumer protections, prompting organizations to reconcile innovation ambitions with compliance obligations. Because of this, security teams are partnering more closely with legal, product, and risk functions to operationalize compliance into design and deployment processes. Together, these technological, adversarial, and regulatory forces are reshaping how organizations assess risk, allocate security spend, and prioritize capabilities within crypto security programs.
The cumulative impact of recent tariff dynamics originating from United States trade policy has material implications for the crypto security ecosystem, particularly for firms that rely on globalized supply chains for hardware, software development, and managed services. Tariff-related cost pressures ripple through procurement decisions, altering vendor economics and incentivizing firms to revisit sourcing strategies for cryptographic hardware, secure element manufacturing, and specialized security appliances. As a result, many organizations face a strategic choice between absorbing higher unit costs, redesigning architectures to minimize dependency on affected components, or shifting production and procurement to alternative geographies.
In addition to direct cost impacts, tariffs influence the cadence of product roadmaps and the availability of specialized components. Delays in hardware deliveries and increased price volatility can extend integration timelines, complicate certification processes, and necessitate temporary workarounds that may reduce end-to-end security posture. This operational strain amplifies the need for stronger supply-chain risk management, including expanded contractual assurances, tighter component provenance validation, and enhanced inspection or testing protocols before deployment.
Beyond procurement, tariffs have secondary effects on talent and service markets. Regional shifts in vendor footprints can influence local talent pools and channel partner ecosystems, driving demand for remote managed services and increasing reliance on software-based mitigations like secure enclaves and cloud-hosted key management services. Collectively, these dynamics are prompting security leaders to reassess resilience strategies, emphasize modular architectures that can accommodate component substitution, and strengthen controls around cryptographic key custody and firmware integrity to mitigate heightened exposure during transitional periods.
Understanding segmentation in the crypto security market is essential for tailoring capabilities to organizational needs and deployment realities. Based on component, the market divides into Service and Solution pathways; services encompass advisory and implementation trajectories such as consulting, integration and deployment, managed security services, and training, while solutions cover a broad spectrum of technical controls including application security, blockchain security, data encryption, endpoint security, identity and access management, infrastructure security, key management, network security, and security information and event management. This duality means that procurement decisions must balance consultancy-led maturity building with the selection of discrete technical platforms that interoperate efficiently.
When viewed by deployment mode, the distinction between cloud and on-premises remains pivotal for architecture and operational models. Cloud deployments enable rapid scaling and centralized telemetry but require rigorous multi-tenant isolation, third-party assurance, and cloud-native key management practices. On-premises deployments, by contrast, often appeal to organizations with stringent data residency and regulatory constraints and therefore necessitate tight integration with existing enterprise identity and infrastructure security controls.
Organization size further shapes solution selection and delivery models. Large enterprises frequently prioritize integrated platforms and managed services that support complex hybrid environments and extensive compliance requirements, while small and medium enterprises often favor modular solutions, cloud-first offerings, and vendor partnerships that deliver outcomes with lower operational overhead. Finally, end-user verticals-spanning financial services, energy and utilities, government, healthcare and life sciences, information technology and telecom, and retail and e-commerce-influence threat models, regulatory obligations, and the prioritization of specific security types such as blockchain security, key management, or SIEM capabilities. By aligning segmentation lenses across component, deployment, organization size, end user, and security type, leaders can craft security programs that match technical controls to business constraints and risk tolerances.
Regional dynamics play a determinative role in shaping the threat landscape, regulatory posture, and vendor ecosystems that underpin crypto security strategies. In the Americas, regulatory scrutiny and institutional adoption co-exist with a mature ecosystem of security vendors and service providers; this creates an environment where advanced custody models, compliance-driven controls, and institutional-grade managed services are widely available, prompting organizations to prioritize governance and auditability alongside technical resilience. By contrast, Europe, the Middle East & Africa present a mosaic of regulatory approaches and threat actor profiles, with some jurisdictions advancing harmonized standards while others emphasize data sovereignty and national security controls, requiring tailored approaches that reconcile cross-border data flows with local compliance imperatives.
Asia-Pacific exhibits rapid innovation in both fintech adoption and digital infrastructure, coupled with a diversity of regulatory frameworks and market maturity. This region often leads in large-scale payment innovations and digital identity initiatives, and therefore security programs must accommodate interoperability with regional rails, diverse identity ecosystems, and sometimes fragmented vendor landscapes. Across all regions, regional geopolitical tensions and trade policy shifts influence supply chains and vendor selection, which in turn affect component resilience and the practicability of certain deployment choices.
Consequently, regional insight should inform decisions about vendor risk, data residency, incident response coordination, and talent sourcing. Organizations that adopt a region-sensitive posture-balancing centralized governance with localized operational controls-will be better positioned to navigate regulatory complexity, respond to cross-border incidents, and maintain consistency in security outcomes across diverse operational theaters.
Competitive dynamics in the crypto security domain are characterized by a blend of specialized niche vendors, established enterprise security firms, and systems integrators expanding into tokenized services. Leaders in the space differentiate through depth in cryptographic engineering, robust key management capabilities, and demonstrable expertise in secure custody models and smart contract assurance. Complementing these technical capabilities, successful firms also demonstrate strong programmatic offerings-such as managed security services, continuous monitoring, and incident response retainers-that align with the needs of enterprise buyers seeking operational continuity.
Partnership ecosystems are increasingly important, with technology vendors, cloud providers, and professional services firms forming integrated delivery models. These alliances enable end-to-end solutions that combine hardware security modules, cloud key management, and application-layer protections with ongoing managed detection and response. Meanwhile, open-source projects and protocol-level tooling remain influential, contributing to interoperability but also requiring rigorous governance and security review when adopted in production environments.
In evaluating vendors, buyers should prioritize demonstrable cryptographic provenance, transparent vulnerability disclosure policies, and strong third-party validation such as independent security assessments and penetration testing. Equally important are service-level guarantees for managed offerings, traceable supply-chain assurances for hardware components, and clear roadmaps for feature integration and compliance support. Firms that can articulate both technical excellence and a robust operational support model are positioned to capture enterprise demand as organizations increasingly seek turnkey and resilient crypto security solutions.
Industry leaders should adopt a pragmatic and proactive posture to strengthen crypto security across people, process, and technology. First, it is critical to institute cross-functional governance that integrates security, legal, product, and business stakeholders into a unified risk management forum. This governance model should codify decision rights for custody, incident response, and third-party risk, ensuring that technology choices reflect both security requirements and business objectives. By aligning governance with clear escalation paths and metrics-driven oversight, organizations can reduce ambiguity and accelerate response times when incidents occur.
Second, leaders must invest in capability-building programs that include formalized training for developers on secure smart contract patterns, cryptographic hygiene, and secure integration practices, as well as continuous red-team and purple-team exercises to stress-test detection and response. These human-centered investments pay dividends by reducing common misconfigurations and improving the speed and fidelity of incident triage.
Third, from a technology standpoint, prioritize modular architectures that minimize single points of failure and permit component substitution should geopolitical or tariff risks disrupt supply chains. Adopt layered controls including hardware-backed key storage, strong identity and access management, end-to-end encryption, and telemetry-rich monitoring. Finally, embrace vendor due diligence and contractual protections that mandate provenance, secure development lifecycle practices, and timely vulnerability disclosures. Together, these actions create a resilient posture that balances innovation with operational security and regulatory compliance.
The research methodology underpinning this executive summary blends qualitative and structured analytical approaches to ensure findings are evidence-based and practitioner-relevant. Primary inputs include expert interviews with security leaders, cryptography specialists, and lead architects across diverse industries, which provide grounded perspectives on implementation challenges, governance practices, and incident handling. These interviews are complemented by a systematic review of technical disclosures, security advisories, and protocol documentation to validate technical assertions and illuminate recurring vulnerability patterns.
Analytical rigor is reinforced through cross-validation across multiple data streams, triangulating practitioner testimony with incident case studies and vendor capability descriptions to identify consistent themes. The methodology emphasizes reproducibility and transparency in how conclusions are drawn, documenting assumptions and delineating the distinction between observed patterns and inferred implications. Where interpretation is required, the analysis favors conservative, evidence-aligned stances and notes areas of uncertainty that merit further investigation.
Throughout, ethical considerations guide data handling and vendor representations, avoiding attribution beyond what is publicly corroborated and ensuring that sensitive operational details are discussed at a strategic rather than prescriptive level. The result is a methodology that balances practitioner insight with systematic analysis to produce actionable recommendations for decision-makers seeking to strengthen crypto security programs.
In conclusion, the evolving crypto security environment demands strategic clarity, operational rigor, and adaptable architectures. Organizations that integrate governance, workforce development, and technological safeguards will be better equipped to manage the dual challenges of innovation and adversarial pressure. The landscape is shaped by convergent forces-advances in cryptographic tooling and decentralized architectures, increasing regulatory attention, and persistent supply-chain and tariff-driven disruptions-that together necessitate a holistic approach to risk management.
Leaders should view security not as a one-time compliance exercise but as an ongoing program that requires continuous investment in detection, response, and assurance capabilities. By applying the segmentation lenses and regional insights presented here, organizations can prioritize controls that map directly to their operational constraints and threat exposure. This pragmatic orientation enables decision-makers to make evidence-based trade-offs between control depth, operational complexity, and speed to market.
Ultimately, success in securing crypto-enabled initiatives rests on collaboration across functions, disciplined vendor selection, and an emphasis on resilience. Organizations that adopt these principles will be positioned to pursue the strategic opportunities of distributed ledger technologies while maintaining the trust and integrity that customers, partners, and regulators require.