Cloud application providers like Google Gmail, Microsoft Office 365 or Salesforce.com alone cannot be relied upon for data security and confidentiality of information stored in the cloud. Encryption of data (Both Personal and Business) stored in the cloud is a must to ward off threats from cyber criminals. Also it is possible for law enforcement agencies to legally require cloud application providers to give them access to email and other sensitive data needed for criminal investigations, all without notifying the data’s owner.
CipherCloud lets the organization who owns the data exclusively control the keys needed to decrypt the data. This approach ensures that emails or other data cannot be exposed, even through legal means without direct engagement with the data owner.
CipherCloud provides a cloud encryption gateway for leading cloud application providers including Salesforce, Google Gmail, Microsoft Office 365, and Amazon AWS. The CipherCloud Gateway incorporates a number of military-grade, AES-based format and operations preserving encryption schemes that can be used to secure cloud-bound data before it leaves the enterprise network, without impacting the usability or functionality of cloud applications. It also scans all in-bound and out-bound cloud content for malicious code and cleans and/or quarantines infected content on the fly, without adding any noticeable latency.
In addition, CipherCloud Connect AnyApp lets organizations implement encryption in hours for all public and private cloud applications and databases. CipherCloud’s encryption and tokenization offerings preserve data format and operations, including search and sort, while requiring no application changes or client software.
“The Petraeus case serves as a wake-up call for executives at companies and senior officials at government agencies to take control of the data. There is no confidentiality of sensitive information in the cloud,” said Pravin Kothari, founder and CEO of CipherCloud. “It is essential that organizations encrypt their data before it’s sent to the cloud. That is the only way to ensure that information is not vulnerable to cloud threats, hackers and accidental leakage.”