Cloud Encryption

Encryption and Quarantine Management in 3 Minutes


What Is It?

The cloud, and particularly the adoption of public cloud applications such as Salesforce, G Suite, Dropbox, and others, impacts one of the primary instruments in every organization’s security toolkit: encryption. In its natural form, encryption can be a rigid method for controlling users and data – a barrier. As we move to the cloud, encryption in its traditional format can become cumbersome and counter-effective to broad SaaS adoption and warrants re-evaluation.

Getting Selective: Encrypting at the File Level

With only a small percentage of corporate data in the cloud being sensitive, taking a selective, risk-appropriate approach is in order. File-level encryption is a great asset to have up your sleeve. The right encryption methodology and technology must allow for organizational discretion and control over what data is encrypted, providing increased security for your most sensitive data in the event of a user-induced breach, as in a phishing attack -- all while keeping users’ ability to access and distribute sensitive information in SaaS applications.

Key: Encrypt Without Breaking Functionality

We see customers spend a good amount of time, resources, and money deploying SaaS applications across their organizations. Keeping them running with full functionality is key. In a cloud setting, encryption at the network level has the potential to (and often does) break the native functionalities of cloud platforms and diminish their built-in value. For example, encrypted data can be rendered unusable, breaking search functionality or making it impossible to use in report building. The right encryption solution covers all your and your users’ security needs without interfering with the native mobile, productive, collaborative benefits of SaaS applications.

Can Encryption Be Easy?

Of course it can! In a nutshell, we recommend that organizations:

  1. Define what data and access points are most sensitive to them - PCI data, intellectual property information, password lists, financial records, etc.
  2. Consolidate the data into a few repositories to improve management practices.
  3. Select an encryption solution that is easy to work with, prioritizes user experience, and is compatible with other SaaS platforms you may adopt down the line.

Other Resources on the Topic

Experience a Live Demo

See Cisco Cloudlock in action from one of our cloud security experts

Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser