CipherCloud is expanding its Cloud Information Protection platform with new data discovery and granular visibility features.
A new addition to the CipherCloud portfolio offers discovery and granular visibility into all information users share across all of their cloud applications. CipherCloud Data Discovery was unveiled today at Infosecurity Europe in London.
Data Discovery, combined with a new security console that ties all of CipherCloud's cloud-based security solutions together into a single interface, is meant to provide customers with the discovery and visualization they need into their clouds in a framework that enables IT administrators to easily monitor, take action and run discovery processes on.
"Discovery is a big piece of this solution. Also, we have visualization with it so you can drill down into an instance of the issue," CipherCloud founder and CEO Pravin Kothari told Talkin' Cloud.
CipherCloud is known mostly for its gateway that sits between the enterprise user and cloud applications to do encryption on the fly, and the company has been building out its capacity in recent months with a new round of financing and subsequent sales and marketing hires.
The new addition to its portfolio enables active monitoring of users for discovery of inside threats. For customers using the likes of Box and Salesforce (NYSE: CRM), CipherCloud Data Discovery provides the ability to monitor external cloud apps for appropriate (or inappropriate) usage to ensure that all organizational security policies are being adhered to.
In a world where data is increasingly being distributed across on-premise and a variety of offsite private and public cloud infrastructure and services, being able to monitor the entirety of the IT environment is likewise increasingly important. That's what this latest CipherCloud release is meant to do.
CipherCloud previously has been focused on providing IT administrators with control in the cloud, but that's not quite enough. This is the visibility piece, Kothari said, "which is also very critical once you're in the cloud." Agreed. Both are needed to ensure security in the cloud, whether from external threats or internal misuse.