AES 256-bit Encryption

CipherCloud uses standards-based AES 256-bit encryption, which is FIPS-compliant and has been extensively reviewed and tested by many independent organizations. This encryption standard has been widely deployed for secure government and civilian applications globally.
Learn more about AES Encryption >

Enterprise Key Management

The solution includes enterprise-grade key management in compliance with NIST SP 800-57 standards. Keys can be stored securely on the CipherCloud Platform or separately on a KMIP-compliant server. Keys can be split between multiple custodians, rotated or expired without affecting legacy data.

High-Performance Architecture

The CipherCloud platform is highly scalable, supporting large scale, high throughput deployments with extremely low latency. A stateless architecture requires no local database for encryption.

Support for Desktop Clients and Mobile Devices

CipherCloud enables you to continue to access Office 365 seamlessly from any desktop using Outlook or mobile devices supporting ActiveSync, without requiring installation of client software.

Broad Support for Office 365 Features

Security that breaks applications is pointless. CipherCloud avoids this by integrating tightly with Office 365, preserving the format and functionality of the application, while maintaining the highest possible levels of security. CipherCloud supports and enhances Office 365 security features including role-based permissions, anti-spam, anti-malware, custom mail routing, recipient policies, tracking, reporting and more.

Encryption of Attachments

Files attached to emails often contain sensitive information, with multiple copies residing in the cloud. CipherCloud encrypts text in most common file formats including Word, Excel, PowerPoint, PDFs and more. This is transparent to your users, but if an unauthorized user tries to open an encrypted attachment, it will appear to be corrupted.

Multiple Deployment Options

The CipherCloud platform can be installed on a physical server or virtual machine behind your corporate firewall, or deployed in a virtual private cloud (such as Amazon Web Services). The solution can also be hosted by third-party providers such as Rackspace or NTT.