CipherCloud for
SAP SuccessFactors

SAFEGUARD EMPLOYEE DATA
IN THE SUCCESSFACTORS CLOUD

SAP SuccessFactors provides human capital management (HCM) and workforce analytics for thousands of enterprises across the globe, but many organizations are required to meet strict data privacy and residency laws for employee data.


PRODUCT HIGHLIGHTS

  • Inline encryption and tokenization of employee data
  • Granular polices protect sensitive data before it is sent to the cloud
  • Customer control of encryption keys and key operations
  • Preserves reporting, analytics, searching and sorting of protected data
  • Flexible cloud-based and on-premises deployment options

ADVANCED ENCRYPTION

CipherCloud for SAP SuccessFactors allows enterprises to certify against stringent privacy and residency regulations. CipherCloud provides:

  • Encryption of employee data with flexible options for preserving formats, partial field encryption and more
  • Preserves a seamless end-user experience for workforce analytics and ad-hoc reporting using SuccessFactors organizational charts, views and filters
  • Protects sensitive data in emailed and downloaded reports, protects bulk import and export operations
  • CipherCloud implements AES 256-bit encryption and is only cloud access security broker vendor to have achieved FIPS 140-2 level 1 validation

ECOSYSTEM SUPPORT

CipherCloud for SAP SuccessFactors supports SuccessFactor ecosystem applications and enterprise systems. CipherCloud provides:

  • Web services application programming interface for protecting data flows to
    third-party applications
  • Support for enterprise systems including Boomi, OpenText, SQL Server,
    Single Sign-on and Payroll applications
  • Protects sensitive data in bulk import and export operations

GLOBAL COMPLIANCE

CipherCloud for SAP SuccessFactors allows organizations to adopt or extend the use of cloud applications while addressing strict data privacy and residency regulations.

  • Certify compliance with global data protection and privacy regulations
  • Mitigate the risk of breach notification through encryption and tokenization of regulated data
  • Prevent third-party access and forced government disclosure without your organizations knowledge by keeping exclusive control over encryption keys