Encryption and Quarantine Management in 3 Minutes Business Challenges While the majority of cloud application providers offer encryption in transit and at rest, many organizations are looking for an…

Encryption and Quarantine Management in 3 Minutes

Michael Gleason

I spend my days (and nights) explaining how the strengths of the cloud - high availability, scalability, and interoperability - can help us overcome what is often considered its greatest weakness: security.


Encryption and Quarantine Management in the Cloud

Business Challenges

While the majority of cloud application providers offer encryption in transit and at rest, many organizations are looking for an additional layer of protection and control over their most sensitive information assets. Meanwhile, encryption methodologies often introduce complications in the form of performance implications or interfering with the end user experience, such as reporting or search functionality.

CloudLock’s API-Driven, Cloud-Native Approach

With CloudLock, we can leverage policy-driven, automated encryption as a response action to DLP policy violation. For instance, when sensitive content is discovered within a file that violates DLP policy, we can automatically encrypt  it to protect that sensitive information, all while preserving the end user experience and real-time coauthoring.

Additionally, we enable user-driven encryption flows, whereby users can protect the data they deem most sensitive while reducing the workload on IT and security staff.

CloudLock also enables folder-level encryption, whereby specific folders can be designated to encrypt all the files within. A great example of a use case for this could be an HR employee looking to store information containing employee records in the cloud. By designating a specific folder as the repository, IT and security staff can remain confident that such sensitive information isn’t going to be leaked to the public. Meanwhile, the HR team gets to leverage all the benefits of cloud file sync and share applications.

Last, but certainly not least, CloudLock enables organizations to centrally manage and store cryptographic keys with industry-leading key management solutions. This allows them to maintain ultimate control over encrypted content.

To learn more, be sure to visit www.cloudlock.com or email us at info@cloudlock.com.

What’s Encryption-Worthy in Your Environment?

Would you like to see the value of policy-driven, automated encryption and quarantine management? Request a Free Security Assessment to put your current security workflows to the test. Find out how CloudLock’s selective encryption offerings can provide insight, control, and security over the sensitive data you store in your Google Apps environments.

CloudLock Security Assessment


Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser