Encryption as a Service is Key – Here’s Why Employees today are driven – driven to such an extent that they ignore corporate security policy when it conflicts with their need…

Encryption as a Service is Key – Here’s Why


Employees today are driven – driven to such an extent that they ignore corporate security policy when it conflicts with their need to do their job. They utilise the most effective tools and methods to complete their work – including cloud applications, platforms and infrastructures – from any device, in any location.

In order to balance productivity with security, employees need to be understood and supported, rather than curbed. Encryption as a Service (EaaS) technology is well positioned to help organizations strike that balance. EaaS represents a cloud-centric approach to security, where the capabilities of a single service provider can be used to encrypt data on many cloud platforms and devices, at any time, from any location – securely.

Read our featured eBook to find out how data encryption can provide control and security over the sensitive data you store.

Below we detail the merits of using EaaS over non-cloud centric methods to protect data in the cloud.

1) Unification is King

Traditional approaches to encryption often rely on disparate, CloudLock - Enable Collaboration in the Cloud (1)incompatible technologies, each designed to encrypt data in a different context. Each technology has to be individually vetted, purchased, and integrated. Not only is this a cost in time and money, but if an employee has to onerously negotiate several encryption technologies to perform their job function, they are likely to attempt to circumvent encryption altogether.

Additionally, encryption key management must be a consideration – disparate technologies will require disparate key management technologies, each of which comes with a maintenance cost and security risk, compounding the overhead of this approach.

EaaS avoids the disadvantages associated with disparate technologies. As the single encryption source, central key storage/management is capable of reducing the cost burden. Who owns the keys and where they should reside is always a contentious topic; however a mature EaaS solution will provide options such that keys can either be owned by the provider or the consumer.

An EaaS solution will have a well-defined API that enables its core functionality to be harnessed through simple HTTP requests. This enables encryption to form as part of a cloud security suite. This is where encryption is best employed (see our quick start guide to effective cloud encryption), as the pragmatic use of encryption policies (combined with education, control and auditing) provides a comprehensive and centralised means of creating secure working practices.

CloudLock - User Mobility in the Workplace2) Availability – Regardless of Device Data encryption and decryption needs to be available from any device or location. Traditional desktop-based encryption solutions require installation. With employees using various devices, this is impractical and – in the instance of unsupported devices – impossible. As a cloud-centric solution, EaaS is instantly available on any internet connected device at all times. And, unlike gateway solutions, there is no requirement for users to go through a VPN – enjoying the speed and data accessibility benefits of cloud applications fully, and avoiding user frustration.

3) Integration: The Importance of Playing Nice By virtue of being on-premises, desktop solutions do not integrate with apps in the cloud. As a result, manual decryption is required before the data is sent to the cloud. This may cause exposure and require users to manually re-encrypt the data when done.

Gateway encryption approaches may offer some degree of compatibility with cloud applications. However, they interpret network-level data on the company wire. Working on this level is not actively supported by vendors, and doesn’t yield a complete integration. As such, compatibility can be brittle and typically only a subset of a SaaS app’s integration points can be harnessed.

Many cloud platforms support extensibility and integrations through APIs. Leveraging them alongside the EaaS API allows for little or no loss of platform functionality while enabling a superior user experience – without additional setup cost. Additionally, cloud vendors could easily add an encryption function to their product by utilizing the API.

4) Don’t Forget Collaboration

Gateway encryption solutions require employees to work through the real-time-cloud-securitycompany’s VPN. This creates an obstacle, particularly when there is a need for third
party collaboration. The third party cannot work through the VPN to decrypt data. Employees in such situations are more than likely to exfiltrate the data to get their job done. Cloud platforms such as Google Drive provide unparalleled collaboration capabilities with great support for extensibility.

Integrating EaaS with such a system supports secure, granular encryption – while enabling the users to benefit from the full capabilities of the cloud platform’s apps, all without hinderance. Additionally, encrypted file use can be audited, and time-constrained.

Rounding Out

Employees are your best asset. They use cloud applications, and so should you. EaaS is one great way to empower them to work effectively yet securely. Unify encryption requirements and provide granular and seamless integrations with all cloud platforms and apps in your environment.

Interested in Learning More?

Read our featured eBook to find out how data encryption can provide control and security over the sensitive data you store.

Data Encryption in the Cloud: A Handy Guide

Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser