CipherCloud Introduces Connectors for Amazon Web Services

CipherCloud Introduces Connectors for Amazon Web Services

CipherCloud has introduced CipherCloud out-of-the-box connectors for Amazon Web Services (AWS) allowing organizations that use AWS to implement encryption, tokenization and masking to protect sensitive data on-the-fly, before it is sent to the cloud.

All these tasks are done without impacting functionality, usability or performance, according to CipherCloud, a provider of award-winning encryption gateways for cloud platforms and applications.
The company notes that CipherCloud’s data protection platform provides enhanced security features to those ISVs that are developing solutions on Amazon EC2. Through the expansion of support for AWS, the company is unifying data security policies across multiple enterprise cloud services.

Amazon Web Services provides organizations of all sizes with secure, cost-effective IT services that power their businesses. In addition to the investments we make in infrastructure and platform security, we support customers deploying additional security solutions to optimize protection for their individual business needs,” said Terry Wise, director of business development for AWS. “CipherCloud’s approach to securing data provides customers and ISVs with additional tools to help them optimize their security standards and meet their compliance objectives.”

Enterprises know the cloud provides operational and economic benefits that improve efficiency and cut costs, but security and compliance concerns are top of mind. CipherCloud provides an innovative cloud encryption gateway for customers and partners to address these requirements,” said Pravin Kothari, founder and CEO, CipherCloud. “AWS is one of the most prominent enterprise cloud platforms in the world. Armed with CipherCloud, AWS developers can provide additional security and compliance controls to further enhance security for AWS and increase platform adoption.”

Elaborating more on its key innovation, CipherCloud’s says that the application-level cloud encryption gateway can perform encryption and tokenization of sensitive data on an item-by-item basis, as data is proxied.
Businesses can store this data in a cloud service, without impacting the data’s functionality and usability.

The company also offers CipherCloud Connect Open API that enables CipherCloud integration with any web application running on Amazon Elastic Compute Cloud (Amazon EC2). Looking forward, CipherCloud is set to launch out-of-the-box connectors and tools that can be applied to Amazon Simple Storage Service (Amazon S3) and Amazon Simple Database (SimpleDB).  Businesses have the option of selecting from a range of encryption and tokenization strategies, and the encryption keys always remain with the customer.

By Anuradha Shukla

Sorry, comments are closed for this post.

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…