All Research
Executive View
The data held in office productivity suites like Office 365 spans the whole operation of an organization from the board to the shop floor. This makes it imperative that it is protected against risks of leakage and unauthorized disclosure. Vaultive cloud data security provides an important solution for organizations seeking an approach for encrypting and otherwise protecting data in Office 365 that can then be extended to other software-as-a-service (SaaS) applications.

1 Introduction

The easy availability of cloud services together with the revolution in the range of devices that are used to access these services has created challenges for organizations in the areas of security and compliance. Employees and associates can use their personal cloud services to perform their jobs without reference to their employer. Line of business managers can acquire cloud services without performing a risk assessment or considering the impact of these on compliance. To compound the problem, mobile devices can be used to access these services from outside of the organizational perimeter.

The specific concerns of organizations using cloud services, and in particular Software as a Service, include:

  • The geographic location where the data is held and processed and the accessibility of this data by the Cloud Service Provider (CSP) and their staff.
  • Government Access - The way in which governments can legally require access to the data being processed without the permission of the cloud customer being sought. The recent revelations around access to Yahoo emails by the US government[^1] is an example.
  • GDPR - The European General Data Protection Regulation (GDPR) coming into force in May 2018 is another challenge where organizations holding personal data need be able to prove compliance that the data has only been used for the agreed purposes.

In order help organizations to meet these challenges there are now a variety of products on the market. These have been loosely categorized under the heading of Cloud Access Security Brokers (CASBs). These products provide functionality which overlaps several areas including:

  • Storage encryption – that provide whole disk, volume or file level encryption of data.
  • Rights Management – that provide granular access control over access to unstructured files.
  • Data Leakage Prevention – that provide discovery and control over the sharing, transmission and storage in the cloud of specific classes of data.
  • Access Brokers and Gateways – that discover what cloud services are being accessed and provide control over who can access cloud services and the functions that they can perform.

One specific area of concern is the protection of data held in office productivity tools such as Office 356, Google Apps etc. These tools and email are used to hold and exchange data across the whole spectrum of an organization’s activities, from the boardroom to the shop floor. It is imperative that organizations take steps to protect this data against leakage and unauthorized disclosure to protect their operations and ensure compliance. KuppingerCole recommends that data held in cloud services should be encrypted in a way that is under the control of the customer.

Full article is available for registered users with free trial access or paid subscription.
Log in
Register and read on!
Create an account and buy Professional package, to access this and 600+ other in-depth and up-to-date insights
Register your account to start 30 days of free trial access
Get premium access
Choose a package

Stay up to date

Subscribe for a newsletter to receive updates on newest events, insights and research.
I have read and agree to the Privacy Policy
I have read and agree to the Terms of Use