Encryption has been one of the last bastions of traditional on-premise security trying to operate in a SaaS-first world. However, indiscriminate encryption of data breaks the promise of security as a business enabler by bringing a heavy-handed approach and detracting from some of the agility of SaaS apps.
CloudLock offers a vastly different approach, with intelligent Selective Encryption that enables cloud users to discover, classify, and encrypt their most sensitive data, ensuring it is protected, while still empowering users with the full functionality of their SaaS applications.
Unlike other solutions, CloudLock Selective Encryption offers:
- The ability to collaborate on encrypted files
- No performance degradation of user experience
- No single point-of-failure
- No changes to network topology
Today, CloudLock is taking this concept a step further by making encryption an automated and seamless part of our Security Fabric. When sensitive data is uploaded to a cloud service, CloudLock can automatically encrypt that data according to highly-configurable, policy-driven rules.
So How Does It Work? An Example.
- Handles finance data across a range of locations
- Needs to prevent this data from being exposed beyond their Finance department
- Creates a policy in CloudLock to detect and take action when information, such as credit card and account numbers are discovered within their cloud service. This information needs to be encrypted, with access restricted to the Finance department.
- Receives a file with finance data in plain-text, but doesn’t realize it
- Uploads the file to their cloud service
The CloudLock Security Fabric:
- Detects the file that was uploaded
- Compares the file’s contents to the company’s set of policies and detects a policy violation
- Automatically encrypts the file and removes sharing beyond the Finance department
- Alerts both the user and the platform administrator of the violation
This new automated response action continues CloudLock’s commitment to risk-appropriate security, while having no impact on the end user. This latest capability adds to our ability to automatically quarantine information in multiple platforms when policy violations are detected.
The 1% Who Can Take Down Your Organization
If cloud cybersecurity is of interest, you should find this report fascinating. Our analysis of user user behavior across 10 million users, 1 billion files, and over 91,000 cloud applications, shows that 75% of the security risk can be attributed to just 1% of users. Read the full report for additional insights on cloud cybersecurity trends across users, collaboration, and applications.