CipherCloud Introduces Connectors for Amazon Web Services

CipherCloud Introduces Connectors for Amazon Web Services

CipherCloud has introduced CipherCloud out-of-the-box connectors for Amazon Web Services (AWS) allowing organizations that use AWS to implement encryption, tokenization and masking to protect sensitive data on-the-fly, before it is sent to the cloud.

All these tasks are done without impacting functionality, usability or performance, according to CipherCloud, a provider of award-winning encryption gateways for cloud platforms and applications.
The company notes that CipherCloud’s data protection platform provides enhanced security features to those ISVs that are developing solutions on Amazon EC2. Through the expansion of support for AWS, the company is unifying data security policies across multiple enterprise cloud services.

Amazon Web Services provides organizations of all sizes with secure, cost-effective IT services that power their businesses. In addition to the investments we make in infrastructure and platform security, we support customers deploying additional security solutions to optimize protection for their individual business needs,” said Terry Wise, director of business development for AWS. “CipherCloud’s approach to securing data provides customers and ISVs with additional tools to help them optimize their security standards and meet their compliance objectives.”

Enterprises know the cloud provides operational and economic benefits that improve efficiency and cut costs, but security and compliance concerns are top of mind. CipherCloud provides an innovative cloud encryption gateway for customers and partners to address these requirements,” said Pravin Kothari, founder and CEO, CipherCloud. “AWS is one of the most prominent enterprise cloud platforms in the world. Armed with CipherCloud, AWS developers can provide additional security and compliance controls to further enhance security for AWS and increase platform adoption.”

Elaborating more on its key innovation, CipherCloud’s says that the application-level cloud encryption gateway can perform encryption and tokenization of sensitive data on an item-by-item basis, as data is proxied.
Businesses can store this data in a cloud service, without impacting the data’s functionality and usability.

The company also offers CipherCloud Connect Open API that enables CipherCloud integration with any web application running on Amazon Elastic Compute Cloud (Amazon EC2). Looking forward, CipherCloud is set to launch out-of-the-box connectors and tools that can be applied to Amazon Simple Storage Service (Amazon S3) and Amazon Simple Database (SimpleDB).  Businesses have the option of selecting from a range of encryption and tokenization strategies, and the encryption keys always remain with the customer.

By Anuradha Shukla

CloudBuzz

A curated, syndicated list of leading technology news stories from around the world. Leading and trending stories are researched curated each day covering prominent technology vendors in the connected technology space.

NEWS

New IDC Spending Guide Forecasts Nearly $120 Billion in Worldwide Spending on Security Products and Services in 2021

New IDC Spending Guide Forecasts Nearly $120 Billion in Worldwide Spending on Security Products and Services in 2021

FRAMINGHAM, Mass., October 19, 2017 – Worldwide spending on security-related hardware, software, and services is forecast to reach $119.9 billion in ...
Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Treacherous 12: Top Threats to Cloud Computing + Industry Insights

Top Threats to Cloud Computing SEATTLE, Oct. 20, 2017 /PRNewswire/ -- The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining ...
IBM’s cloud, cybersecurity and data analytics business rose 11 percent to $8.8 billion in the quarter

IBM’s cloud, cybersecurity and data analytics business rose 11 percent to $8.8 billion in the quarter

Big Blue back on the attack, analysts cautious (Reuters) - IBM shares surged 5 percent on Wednesday after the world’s ...

CONTRIBUTORS

3 Groundbreaking Wearables In The Travel Space

3 Groundbreaking Wearables In The Travel Space

3 Groundbreaking Wearables The advent of wearable technologies had many expecting a utopia free of 20th-century pains such as paper ...
Benefits of Licensing Software as a Service In The Cloud

Benefits of Licensing Software as a Service In The Cloud

Software as a Service In The Cloud When Microsoft moved to a monthly cloud-based subscription package for its Windows 10 ...
2017 Brings DLP Technology and IoT's Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP ...
How IoT, Wearables, and Mixed Reality May Disrupt Banking

How IoT, Wearables, and Mixed Reality May Disrupt Banking

Banking Disruption Technology and finance have always gone together. It takes the best, most secure technologies to keep stockpiles of money ...
Cloud Proofing Future Business Challenges

Cloud Proofing Future Business Challenges

Coping with Cloud Challenges Hardly a week goes by without coming across news around the increase in the number of ...
cloud 2020

IoTT, The Internet of Things, Tomorrow

What Should Your Home Be Telling You? Home. The place where you lay your head to sleep, where a roof ...
security wordpress 101

WordPress Security 101 – Securing Your WordPress Installation

WordPress Security 101 Roughly 37,000 websites are breached daily. Considering WordPress powers at least 53% of all websites, you can bet a lot ...
Data Breaches: Incident Response Planning - Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning - Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last ...

SPONSORS

The Skill & Training Mandates of Big Data

The Skill & Training Mandates of Big Data

Big Data Mandates For some years a dearth of data scientists and analysts has caused concern, with McKinsey expecting a ...
Hybrid IT Matures Just In Time To Tackle Complex Challenges

Hybrid IT Matures Just In Time To Tackle Complex Challenges

Tackling Complex IT Challenges Today’s sophisticated business environment demands a dynamic and robust IT infrastructure which is a far cry ...
Has Cybersecurity Become Too Reactive in this Day and Age?

Has Cybersecurity Become Too Reactive in this Day and Age?

Cybersecurity Too Reactive? Cybersecurity today has become far too reactive. The constant innovation of hackers has meant that defenses are ...

GET READY FOR CLOUD MICROSERVICES

So, is microservices the answer? What are the pitfalls? Is this the path you really want to lead your company down?

On November 8 at 2:30 p.m. ET, join hosts JP Morgenthal, Steve Prentice and Kalyan Ramanathan for a vibrant and interactive online discussion specifically about the pitfalls of microservices, including management, sprawl, and decomposition – and how to avoid them.

JP