CipherCloud Announces its Next Generation Release in Unified Cloud Data Protection

We are very excited to announce the availability of CipherCloud Gateway Version 2 –  a single gateway with unified policies to protect data across all cloud platforms and applications. As enterprises use multiple cloud services, this solves the limitations associated with single cloud centric solutions. New with CipherCloud 2 are out-of-the-box connectors for Amazon Web Services (AWS), and Yammer, in addition to the existing Salesforce and connectors, CipherCloud Connect Open API, and cloud malware detection. These powerful new features allow enterprises to extend protection overall to critical data stored and processed in public and private cloud platforms and applications. CipherCloud 2 connectors for Salesforce,, Amazon Web Services (AWS), and facilitate cloud adoption by allowing customers to retain complete control over sensitive data. The open API helps developers and ISVs to create custom connectors that can leverage CipherCloud data protection technology with their public or private cloud applications. Malware detection identifies and blocks infected files from being uploaded, enabling enterprises to protect themselves against attempts by hackers to penetrate data-rich cloud environments.

Features & Benefits:

  • Cloud Data Privacy – Data is encrypted, tokenized, or masked prior to leaving the enterprise, and the only set of keys resides with the enterprise; this protects the data and makes it unusable by anyone without the keys. Enterprises can either leverage out-of-the-box connectors provided by CipherCloud, or develop custom connectors using the CipherCloud Connect open API.
  • Cloud Data Security – Malware detection capabilities allow customers to protect their public and private cloud platforms against malware attacks spread through files such as infected Adobe PDFs or Microsoft Office documents.
  • Cloud Compliance – Consistent logging of user activities across all cloud applications enables organizations to manage compliance and forensic requirements, giving them the ability to find out who is doing what, where, and when, in which application and on which object.


Join over 5,000 subscribers - best practices and tips delivered weekly to your inbox.
We respect your privacy. Your email address will never be sold or shared with anyone else.
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *