Welcome!

News Feed Item

CipherCloud Accelerates Data Protection in the Cloud with Industry's First Discover, Protect, and Monitor Platform

Over 2.6M users benefit from integrated cloud data visibility and control

SAN JOSE, Calif., Feb. 24, 2014 /PRNewswire/ -- Today, CipherCloud, the leader in cloud information protection, announces its continued platform innovation for enabling organizations to rapidly adopt cloud applications while protecting their sensitive data, ensuring compliance to policies and regulations, as well as ever growing unauthorized access, external threats and surveillance. Through these advancements, the company continues to extend its technical leadership in cloud information protection by combining the highest levels of cloud data discovery, protection – searchable strong encryption [SSE], tokenization, and data loss prevention – and anomaly monitoring.

The Discover, Protect, and Monitor platform comes at a time when organizations are sending exponentially more information into the cloud while seeking to overcome data privacy, regulatory compliance and data residency risks.  

Built on CipherCloud's founding commitment, the platform delivers the three critical elements to enable cloud adoption:

  • Discover – The first step is discovery. To determine the security controls their data requires, organizations must first identify and classify content that is sensitive, proprietary or regulated before it goes to the cloud. Visibility tools like data discovery provide the actionable intelligence companies need in order to find and apply the right type of protection to comply with regional and industry specific privacy laws.    
  • Protect – This is the core of any cloud data security strategy. As data privacy requirements escalate, enterprises need security controls that provide robust and granular level data protection to mitigate against compromise without locking out authorized users. By delivering SSE, tokenization, data loss prevention, key management, and malware detection, CipherCloud enables enterprises to seamlessly extend data protection from on premises to the cloud.  Our SSE technology delivers AES 256-bit encryption, the highest commercially available level of encryption while enabling natural language, wild cards and Boolean searches of encrypted data.
  • Monitor – This delivers detailed information on all logging, tracking, and auditing of user activities across all cloud applications. Information is aggregated and monitored resulting in the ability to quickly zero-in on violations of policies, identify anomalous patterns, and flag potential security breaches. Examples could include excessive access from locations known to harbor malicious activity or an extreme number of uploads and downloads of data over a short period of time by a particular user indicating malicious intent.

(Photo: http://photos.prnewswire.com/prnh/20140224/SF70262)
(Logo: http://photos.prnewswire.com/prnh/20130603/SF24948LOGO)

"We continue to raise the bar for cloud information protection," said Pravin Kothari, founder and CEO of CipherCloud. "The consumption of multiple cloud applications by the enterprise requires security to be in lock step with visibility. We are giving enterprises a coherent strategy and the innovative technologies they need to navigate the many privacy and residency regulations required to conduct business across the globe."

The CipherCloud platform provides a holistic set of cloud visibility, security and monitoring controls to enable organizations to proactively secure sensitive data and comply with government regulations and industry mandates, including GLBA, PCI, HIPAA and HITECH, the EU Data Protection Act, UK ICO guidance, the Australian Privacy Amendment Act and US State privacy laws.

Key technologies powering the CipherCloud Discover, Protect, and Monitor platform include:

  • Cloud Data Discovery –Search existing cloud applications on-demand and discover detailed information about sensitive data, and user activity, extending your corporate DLP policies to the cloud.
  • Searchable Strong  Encryption – Delivers AES 256-bit encryption, the highest commercially available level of encryption while enabling natural language, wild cards and Boolean searches of encrypted data
  • Tokenization – Enables tokenization – substituting randomly generated values for the original data, which never leaves the enterprise
  • Cloud Data Loss Prevention – Supports out-of the box and custom DLP policies that scan, detect and take action to protect sensitive information in any field or document; integrates with existing DLP systems such as Symantec or RSA via the ICAP protocol.
  • Cloud Malware Detection – Includes integrated malware protection preventing viruses from spreading with zero-day protection against cloud viruses, spyware, Trojans, bots, rootkits and more.
  • Activity Monitoring and Anomaly Detection – Tracks user interactions across multiple cloud applications assure compliance and spot anomalies through detailed security dashboards and reports.
  • Robust Key Management – Provides enterprise key management capabilities in compliance with NIST SP 800-57 standards. Multiple key storage options enable keys to be stored securely on the CipherCloud platform or separately on a KMIP-compliant key management server.
  • High-performance Scalable Architecture – Delivers near zero latency while supporting the largest number of companies and government agencies with demanding throughput requirements.

About CipherCloud
CipherCloud, the leader in cloud information protection, enables organizations to accelerate their adoption of cloud applications while ensuring visibility and control of their data. CipherCloud delivers data privacy, regulatory compliance, and data residency in the Cloud through an open platform that provides comprehensive data discovery, protection – search strong encryption, tokenization, data loss prevention, key management, and malware detection – and activity and anomaly monitoring services.

CipherCloud has experienced exceptional growth and success with over 2.6 million business users, across 25 countries, and in more than 11 industries.

The CipherCloud product portfolio protects popular cloud applications out-of-the-box such as salesforce.com, Box, and Microsoft Office 365.

CipherCloud, named as SC Magazine's 2013 Best Product of the Year, is backed by premier venture capital firms Andreessen Horowitz, Index Ventures, and T-Venture, the venture capital arm of Deutsche Telekom. For more information, visit www.ciphercloud.com and follow us on Twitter @ciphercloud.

CipherCloud Contact:
Lise Feng
Director of Corporate Communications
408-520-4937
[email protected]

SOURCE CipherCloud

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
Vidyo, Inc., has joined the Alliance for Open Media. The Alliance for Open Media is a non-profit organization working to define and develop media technologies that address the need for an open standard for video compression and delivery over the web. As a member of the Alliance, Vidyo will collaborate with industry leaders in pursuit of an open and royalty-free AOMedia Video codec, AV1. Vidyo’s contributions to the organization will bring to bear its long history of expertise in codec technolo...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.