Welcome!

Cloud Security Authors: Yeshim Deniz, Zakia Bouachraoui, Liz McMillan, Elizabeth White, Ravi Rajamiyer

Related Topics: @CloudExpo

@CloudExpo: Article

CipherCloud Offers Military-Grade Encryption

CEO Pravin Kothari says flatly: “There is no confidentiality of sensitive information in the cloud."

It’s downright embarrassing when the head of the CIA can’t use e-mail to whisper sweet nothings without his love affair being outed four months after it reputedly ended.

The fact that the lady in question and General David Petraeus, who ran the wars in both Iraq and Afghanistan, used a shared Gmail account to leave messages for each other in the draft folder – a tactic employed by terrorists to avoid incriminating e-mail trails – has also prompted concern about whether the spy chief’s cyber security was blown by somebody else besides the FBI at any point.

It’s supposed to be a cautionary tail for all the people who are careless with their e-mail and with the cloud, an opening for two-year-old encryption start-up CipherCloud to suggest that companies and government agencies that use cloud apps like Salesforce, Force.com, Chatter, Office 365 and of course Gmail would be a lot safer if they used its widgetry.

It sells a patent-pending cloud encryption gateway that automatically secures such traffic before it’s sent to the cloud. In the case of Gmail incoming mail, outgoing mail, draft mails and attachments are encrypted in real-time, a process that’s completely seamless to the user according to CMO Paige Leidig.

Because of its stateless architecture, CipherCloud is supposed to provide high-performance, low-latency and scalability. No noticeable performance degradation is caused by its real-time data processing.


The CipherCloud Gateway

The start-up claims that legacy encryption isn’t up to the cloud’s challenges and that storing personal and business data unencrypted there leaves it at risk.

It says the Petraeus case demonstrates how easy it is for law enforcement agencies to legally require cloud application providers to give them access to e-mail and other data needed for criminal investigations without notifying the data’s owner.

CEO Pravin Kothari says flatly, “There is no confidentiality of sensitive information in the cloud. It is essential that organizations encrypt their data before it’s sent to the cloud. That is the only way to ensure that information is not vulnerable to cloud threats, hackers and accidental leakage.”

CipherCloud gives the organization that owns the data exclusive control the keys needed to decrypt it. This approach ensures that e-mails or other data can’t be exposed even legally without the data owner’s knowledge.

The widgetry works with Amazon EC2 and S3 via connectors and with all the popular mobile devices.

The start-up also offers a Connect AnyApp, which can implement encryption for all public and private cloud applications and databases.

The company’s encryption and tokenization preserves the data format and application operations, including search and sort, without changing the software or impacting backend integration.

Its malware detection lets users protect their public and private cloud solutions against attacks spread through infected PDFs or Office documents.

Consistent logging of user activities across all cloud applications enables organizations to manage compliance and forensic requirements such as finding out who is doing what, where, when, in which application and on which object.

CipherCloud is backed by Andreessen Horowitz, Index Ventures and T- Venture, the venture capital arm of Deutsche Telekom. It currently has 127 employees with expectations of doubling that number in six months. It also expects to open an office in the UK.

A typical CipherCloud installation runs to six or seven figures depending on the size of the company’s infrastructure and the number of users.

More Stories By Maureen O'Gara

Maureen O'Gara the most read technology reporter for the past 20 years, is the Cloud Computing and Virtualization News Desk editor of SYS-CON Media. She is the publisher of famous "Billygrams" and the editor-in-chief of "Client/Server News" for more than a decade. One of the most respected technology reporters in the business, Maureen can be reached by email at maureen(at)sys-con.com or paperboy(at)g2news.com, and by phone at 516 759-7025. Twitter: @MaureenOGara

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, will provide an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life ...