Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

CloudLock Launches Selective Encryption Solution

CloudLock, a Waltham, Massachusetts-based firm that helps companies secure data stored in the cloud, announced the launch of CloudLock Selective Encryption, a new cloud-based encryption solution that enables enterprises to protect data stored across multiple SaaS and public cloud platforms.

CloudLock, a Waltham, Massachusetts-based firm that helps companies secure data stored in the cloud, announced the launch of CloudLock Selective Encryption, a new cloud-based encryption solution that enables enterprises to protect data stored across multiple SaaS and public cloud platforms.

CloudLock Logo

Late last month the company announced that it had raised $16.5 million in a Series C funding round that would be used to expand its business and invest in existing and new product lines.

The company’s cloud-based offerings help customers enforce their own security, governance, and compliance requirements on their data and users in the cloud.

CloudLock’s solutions help protect sensitive data like PII and PCI stored in cloud services such as Google Apps and Salesforce, by providing DLP, auditing and compliance, data management and end-user security.

CloudLock Selective Encryption is a content-aware, AES 256-bit encryption solution that is the latest feature in CloudLock’s suite of security offerings.

“Leveraging a people-centric approach to security, CloudLock Selective Encryption non-disruptively encrypts only the most sensitive data and allows for both end-user driven encryption as well as corporate-governed encryption, enforced by CloudLock’s cloud-based policy engine,” the company explained. “CloudLock’s detection and response capabilities provide risk-appropriate security controls, allowing customers to enforce higher levels of data security for only the data that requires it.”

“The CloudLock approach is to allow organizations to protect data in the cloud, not from the cloud, using appropriate security measures aligned with unique data classification strategies,” explained Gil Zimmermann, CEO & Co-Founder at CloudLock. “CloudLock Selective Encryption helps customers protect both data that is making its way to the cloud, as well as retroactively protect data already residing in the cloud.”

CloudLock will be demonstrating the solution next week during the 2014 RSA Conference in San Francisco, CA.

Advertisement. Scroll to continue reading.

Disclosure: Gil Zimmermann, CEO & Co-founder of CloudLock, is a SecurtyWeek contributor. You can read his columns here.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.