Protecting Data in the Cloud

As more enterprises migrate data to the cloud, new challenges around data liability begin to emerge. Companies that store sensitive data in cloud or hybrid cloud environments, must remain vigilant as to the protection of the data. While storage, encryption, and access controls can be all be outsourced, LIABLITY cannot. Regardless of where the data is stored, the responsibility to protect the data remains in the hands of the enterprise to which the sensitive data was originally entrusted, yet many companies fail to adequately protect their cloud data. A recent survey shows that while 48% of corporate data is being stored in the cloud, fewer than half of the companies using cloud storage are protecting that data with encryption!

*Source: Ponemon Institute

Data Residency, Sovereignty & Localization

Data Residency, Sovereignty, and Localization requirements add an additional layer of complexity to storing data in the cloud.  Data may exist under a specific company, country, or territory and may be subject to specific data protection and privacy regulations and industry standards.  EncryptRIGHT’s ability to do localized, application level encryption or tokenization of data before it is ever stored in a cloud environment helps companies manage many of these complexities.

*Source: Ponemon Institute

Subpoena-Proofing the Cloud

Legal departments are facing a growing concern for protecting data in the cloud that is often referred to as “subpoena-proofing.” Many enterprises outsource both storage and protection of data to cloud providers to lower operational costs. However, if a cloud provider that has access to the algorithms and keys needed to unlock sensitive data is subpoenaed, there might be very little that a company who has entrusted data protection to the cloud provider could do to ensure their data is not decrypted and handed over to authority. EncryptRIGHT helps subpoena-proof data in the cloud by protecting data at the application layer before it is stored in the cloud. Only the company originally entrusted with sensitive data can unlock it, since they maintain control over their cryptographic keys and data protection schemes, regardless of the where the data is stored.