Sookasa encrypted search3/1/2024 ![]() This creates a significant challenge in regulated industries such as healthcare, education, legal and finance because the loss of a single device that is connected to a cloud account can cause a catastrophic data breach and significant legal liability.Ĭloud services such as Dropbox, Box and Gmail scatter and duplicate files across multiple devices and shared folders. So, before you upload them to OneDrive, they are protected with a firm and reliable layer of security. Current encryption solutions require heavy IT resources, restrict user freedom and significantly hurt user experience, and are therefore not suitable for smaller agile businesses. Most OneDrive encryption applications adopt the 256-bit Advanced Encryption Standard (AES). With today's launch, for the first time, organizations have a self-service turnkey encryption and compliance solution that enables their employees to safely use their favorite mobile devices and cloud services. ![]() With Sookasa, files are encrypted anywhere they are placed, including on the cloud, mobile devices and desktops, and remain encrypted even when shared externally. Sookasa controls and audits file accesses across devices and users according to HIPAA and FERPA standards. “Sookasa is challenging the traditional security notion that you have to trade usability for security by offering compliance ready, on-demand, enterprise-grade data encryption, access control, and tracking to users in any business vertical using the native application interface and experience,” said David Monahan, Research Director, Security and Risk Management at Enterprise Management Associates.Īfter a quick installation process, Sookasa users enjoy the natural user experience of their favorite cloud services without ever noticing their files are being encrypted and decrypted in the background. “Businesses of any size can easily support even external data sharing at an affordable cost with minimal setup and maintenance. The accelerating Bring Your Own Technology (BYOT) trend is expanding data leak and breach challenges, since sensitive data is being shared across a plethora of cloud-connected devices on a massive scale.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |