3 Key Business Challenges Solved by a CASB Solution

CASB, Cloud Data Protection, Gartner 0 Comments

The right CASB can offer solutions to data protection and compliance challenges that customers are confronted with everyday. Three most common issues customers face are: Not having visibility into unsanctioned cloud applications Challenge We often hear from our customers that when they migrate to the cloud they lose visibility of sensitive and regulated data. It is critical to understand the …

5 Steps to Data Protection for GDPR

Cloud Data Protection, GDPR, General Data Protection 0 Comments

Global Data Protection Regulation (GDPR) is an extension of past privacy laws, but much stronger, much tougher consequences and much clearer, more explicitly about what needs to be done to protect data.  The follow steps to GDPR compliance: Know Your Cloud Footprint The first step to compliance with GDPR is to know your cloud footprint. This sounds obvious, but the …

Gartner Calls Out CASB Among the Top 11 Security Technologies at its Security & Risk Management Summit 2017

CASB, Gartner, Security Technology 1 Comment

It was great representing CipherCloud at the Gartner Security & Risk Management Summit 2017 last week in National Harbor, Maryland. I had a chance to speak with a number of IT / security professionals and business owners from various companies. Throughout the conference, I was frequently asked the following questions: What model do your customers use to help pass compliance …

GDPR and the Cloud: 6 Key Points You Need to Know

Cloud Data Protection, GDPR, General Data Protection 1 Comment

The clock is ticking and the GDPR is coming to a jurisdiction near you. Although it was created by the EU, most businesses realize that the General Data Protection Regulation, which takes effect in May 2018, will have global reach, covering not just data in Europe, but the personal information of European citizens and residents – wherever it is globally. …

Unprotected File Sharing Gets Expensive

Compliance, HealthCare, Healthcare Information

A Recent $2 Million HIPAA Penalty for Exposed Patient Data If you work in a health care organization and handle sensitive patient health data, you’ve probably heard about the recent case in which US regulators hit St. Joseph Health System with a penalty of $2.14 million for HIPAA violations. That penalty is just the tip of the iceberg: St. Joseph …

Rocks stacked in the corner of a brick wall

Data Protection: The Cloud Security Cornerstone

Cloud Data Security

Not Your Grandma’s IT Security Concern Not that long ago, the main concern of network security professionals was protecting the company’s network perimeter. Servers, not data, was the issue. When the cloud rolled in, the IT security landscape began to change profoundly. When companies use cloud services, effectively they’re outsourcing the care of their data. Unfortunately, they can’t outsource their …

horse and rider soar over city

Recognized Leadership vs Claims of Leadership

Announcements, CASB

Getting Beyond the Noise Technology products often are overhyped, and products in the CASB space are no exception. CASB players proliferate amid an abundance of venture money and self-proclaimed market and technology leadership. Customers rely on competitive analysis from independent sources to cut through the noise and provide a clear picture of what vendors really have to offer. The first …

goalkeeper blocks soccer ball

Cloud Data Isn’t Lazy Data

Cloud Data Protection

Why your cloud security strategy shouldn’t rely solely on data-at-rest encryption In our last blog post, we revealed that cloud provider “Bring Your Own Keys” (BYOK) options merely let customers keep a copy of their keys, not own the whole set of keys. In this post, we’ll look at the SaaS application environment in detail to understand why data-at-rest encryption …

Hardware store clerk with keys

Does BYOK Mean ‘Barely Your Own Keys’?

Cloud, Compliance

3 Truths about Encryption and BYOK Many people making important decisions about data security have a fuzzy understanding of how encryption actually works. Their confusion can easily be exploited by hackers, governments, and vendors pushing incomplete solutions. That’s because, on the surface, encryption seems reasonably easy to understand with real-world analogies to keys, locks, secrets (both good and bad), and …