CloudMask thinks differently in the secure-cloud landscape.
The economic value proposition of Software as a Service (SaaS) is undeniable. SaaS is disrupting industry after industry,
making accessible to sole proprietors and small businesses software functionality that historically required significant
investment in hardware, software, and annual maintenance fees. This, in turn, is making smaller players even more agile
and efficient than they used to be, allowing them to run competitive circles around larger or laggard players.
The good news is that rich software functionality is often available for less than $100 per month, enabling high levels of
business management and administrative efficiencies.
The bad news is that the tempting sky of cloud and SaaS computing is filled with thunderclouds of cybersecurity concerns.
Despite the best efforts of traditional cybersecurity experts, the adoption of cloud computing has been accompanied by an
ever-growing number of egregious data breaches. These breaches damage brands and drive up significant costs for
investigations, notification, and identity-theft protection for clients whose personal information has drifted into malicious
hands.
So, what’s going on? Why do even the largest enterprises struggle with securing their data? Wouldn’t the National
Security Agency be one of the most rigorous security practitioners in the world? What leaks have we not yet detected?
One thought leader at a major global cybersecurity consultancy explained it like this: “We’re trying to examine every packet
that flows across the perimeter of the network and notice IP addresses that don’t make sense. This is incredibly hard.
There’s a ridiculous amount of data, and we’ve entered an age where the network no longer has clear boundaries. We
really haven’t solved that problem.”
What is the problem?
The problem lies in the way traditional security thinkers have defined the problem. They’re working with a castle and moat
metaphor, where the internal network is protected with a set of security rings. Each ring, however, has costly hardware and
software searching for malevolent inbound and outbound data. But it’s like looking for needles in a haystack. And even if
security experts are successful at protecting the perimeter, there is little protection against insiders (employees or others
with access to the internal network).
Protect your Data even
under breach
CloudMask thinks differently.
We see the problem in simpler terms: protecting sensitive data and ensuring that only authorized users, using known
devices, can see data in the clear. We’re happy to let the traditional security experts work on their perimeters, knowing that
when they fail, our customers’ data remains secure. And, in contrast with products designed for big enterprises, we’ve
created a solution that can be installed, configured, and afforded by small businesses without IT staff.
The SaaS Security Problem – Simplified
SaaS applications use best-practice security protocols and rely on their cloud provider to secure the infrastructure the
application runs on.
One vendor explains it this way: “We ensure that your communications are secure using bank-grade 256-bit SSL
encryption. All of (our) infrastructure is hosted using physically secure, managed data centers that meet the rigid SSAE 16
specifications. Geo-redundant backups are performed multiple times per day, and site security and privacy are routinely
audited by respected third parties.”
By means of 256-bit SSL encryption, the connection between your browser or app and database servers is secured. When
you submit a query or update, the data is encrypted as it transits the internet. Once the data reaches the data center, it is
decrypted for insertion into the app’s database.
The data center itself (e.g., Amazon Web Services) has a rigorous set of security controls and protocols, meaning that only
employees with the proper identification and access passwords can physically or virtually access the servers that hold the
application’s data. SSAE 16 is a standard according to which data centers are audited for their degree of compliance with
policy.
There are three vulnerabilities that should concern executives:
1. Anyone who tricks a user into revealing their username and password can impersonate that user and log in
from any browser in the world.
Such a hacker can impersonate the user and perform administrator functions. You don’t have to be a fool to have this
happen to you. Even a sophisticated user like CIA Director John Brennan has fallen prey to high school-age hackers.
2. Any insider (employee of the data center) can turn from “good” to “bad” overnight or have their credentials
stolen, meaning that an authorized system administrator could access application data for malevolent purposes.
Insiders don’t need to be “bad” to present a threat. They can simply be careless.
A recent report on cybersecurity suggests that less than 50 percent of organizations have adequate policies in place to
mitigate insider-threat risks. The challenge here is that executives depend on their SaaS provider, who in turn rely on their
cloud service providers to maintain security hygiene. That’s a lot of blind faith.
3. Governments have the desire, capacity and experience to tap into the cloud-service providers who hold the
world’s data.
The problem here is manifold. On the one hand, the government can access specific information based on a warrant. On
the other hand, it is an entirely different matter to access everything on an as-needs basis, under cover of National Security
Letters or their equivalent. Despite their best efforts to security screen and oversee intelligence and law enforcement
operations, the government also falls prey to “trusted” staff performing unauthorized actions. These vulnerabilities impact
the firm’s liability for data breaches and the capacity to deliver on a promise of client confidentiality and privacy.
In storing sensitive personal and other data, the firm is considered a data controller. As a data controller, the firm is subject
to a variety of data protection laws and regulations. Such regulations increasingly create a costly burden to notify
individuals affected by data breaches and to purchase several years of identity-theft protection. Emerging European laws
impose heavy fines for firms who violate data protection regulations.
If you think the solution is not to use cloud, think again.
The concerns outlined above have caused many organizations to have misgivings about adopting cloud-based solutions,
presuming that an on-premise solution (a server running in your office) is safer. Unfortunately, that is not the case. Your
office or server room isn’t nearly as secure as an access-controlled data center.
CloudMask: a silver lining for SaaS
CloudMask addresses these vulnerabilities in a way that enables executives to immunize their firms against data-
breaches, differentiate by offering highly secure data management and communications, and using economical cloud
services with confidence.
CloudMask can provide SaaS users with an easy-to-install browser extension that automatically masks sensitive data
before it enters the 256-bit encryption channel to the data center. When that data arrives at the data center where the 256-
bit protection ends, CloudMask data stays masked.
This process also works in reverse, as in the case when the user requests sensitive data. Here the masked data is double-
encrypted as it moves through the secured communications channel. When it arrives in the browser, the 256-bit encryption
is removed, and CloudMask seamlessly unmasks to present the data in the clear.
Alongside controlling users and their access rights, practice management account owners/administrators have the capacity
to select specific fields to be masked. Not all data needs to be masked and protected, but data categorized as sensitive
personal data, personally identifying, or otherwise confidential, can be selected for automated, seamless masking and
unmasking.
From a functional perspective, CloudMask resolves the concerns that executives
might have with respect to using SaaS applications:
1. Each user authorized to access the SaaS account installs a CloudMask browser extension that is activated through a
simple process generating the personal, private and public keys required for the encryption process. What’s more, the
extension can be installed on multiple personal devices, each of which is personalized with a private key. Thus, even if a
username and password are somehow compromised, which under normal circumstances would allow anyone anywhere in
the world to log into the account and see data in the clear, the unauthorized user cannot do so without access to the
specific devices configured with the personalized browser extension.
2. The data stored under care of the data center remains masked while at rest or in motion. Neither the practice
management SaaS vendor nor CloudMask administrators nor data center administrators, have keys that can be used to
unmask the data. If the data center suffers a breach (e.g., an unauthorized insider penetrates the database, or a
government agency serves a National Security Letter), data the user has designated as sensitive remains protected.
3. The data stored under care of the data center is masked in such a way (“tokenization”) that anonymizes what was
previously sensitive data. Thus, even if that data is stolen, it is no longer considered sensitive personal information or
personally identifying information, so it no longer falls under data protection regulations or requirements. In other words,
breaches of systems holding tokenized data do not trigger the costly response and remediation efforts associated with
breaches of systems holding sensitive personal information.
The Technical Story
A separate e-book explains the technical details behind this process and the software that automates it, as well as
describing the benefits of encrypting and tokenizing data, which we collectively refer to as “masking.” The e-book also
provides a brief explanation of the well-established public/private key methods used by the encryption process.
Grounded Confidence
CloudMask is unique in having its “CloudMask engine” certified through a Common Criteria for Information Technology
Security Evaluation (Common Criteria) process, which is used by twenty-six federal governments to evaluate security
products for their own use.
The process of independent evaluation assesses whether a product’s functional claims live up to the way it is coded and
performs. Many products claim to be “bank-grade” or “military-grade,” both of which are subjective assessments.
CloudMask is the only data-masking product capable of working with SaaS offers to achieve Common Criteria certification.
More expensive competitors like Cipher Cloud and Ionic have not achieved such objective criteria. Technical advisors can
access CloudMask’s Common Criteria Assessment here.
It’s easy to get started with CloudMask. Visit www.cloudmask.com

More Related Content

PDF
Securing sensitive data for the health care industry
PDF
Law firms keep sensitive client data secure with CloudMask
PDF
Cashing in on the public cloud with total confidence
PDF
SaaS Platform Securing
PDF
Keep Student information protected while improving services
PDF
A Survey on Different Techniques Used in Decentralized Cloud Computing
PDF
A Novel Information Accountability Framework for Cloud Computing
PDF
Cloud Security (CASB) for Slack
Securing sensitive data for the health care industry
Law firms keep sensitive client data secure with CloudMask
Cashing in on the public cloud with total confidence
SaaS Platform Securing
Keep Student information protected while improving services
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
Cloud Security (CASB) for Slack

What's hot (20)

PDF
Cloud Computing
PPTX
Practical Security for the Cloud
PPTX
How To Plan Successful Encryption Strategy
PDF
MIST Effective Masquerade Attack Detection in the Cloud
PDF
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
PPTX
WebShield eP3 Network Overview (02-04-2017)
PDF
Ingres database and compliance
PDF
White paper-diligent-cybersecurity
PPTX
Seclore: Information Rights Management
DOCX
Office 365 data loss prevention
PDF
Data Privacy Readiness Test
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PDF
Information Rights Management (IRM)
PPTX
Data Loss Prevention
PDF
Practical advice for cloud data protection ulf mattsson - bright talk webin...
PPTX
Get ahead of cybersecurity with MS Enterprise Mobility + Security
PDF
Azure information protection_datasheet_en-us
PDF
Hexnode Identity and Access Management solution
PDF
Data centric security key to digital business success - ulf mattsson - bright...
Cloud Computing
Practical Security for the Cloud
How To Plan Successful Encryption Strategy
MIST Effective Masquerade Attack Detection in the Cloud
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
WebShield eP3 Network Overview (02-04-2017)
Ingres database and compliance
White paper-diligent-cybersecurity
Seclore: Information Rights Management
Office 365 data loss prevention
Data Privacy Readiness Test
Technology Overview - Symantec Data Loss Prevention (DLP)
Information Rights Management (IRM)
Data Loss Prevention
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Azure information protection_datasheet_en-us
Hexnode Identity and Access Management solution
Data centric security key to digital business success - ulf mattsson - bright...
Ad

Viewers also liked (8)

PPTX
Scaling Service Design - Christine Zoltok
DOCX
Curriculum vitae
PDF
Arthur Yang - s3329167 - Aviation Journal
PPTX
inline function
PPT
Tema 4 ecosistemas
PPTX
10 usaha kecil menengah (ukm)
PPTX
Electiva Emprendedor Maria Rojas
PDF
Project 2 - B.Tech
Scaling Service Design - Christine Zoltok
Curriculum vitae
Arthur Yang - s3329167 - Aviation Journal
inline function
Tema 4 ecosistemas
10 usaha kecil menengah (ukm)
Electiva Emprendedor Maria Rojas
Project 2 - B.Tech
Ad

Similar to Protect your Data even under breach (20)

PDF
Global Security Certification for Governments
PDF
Protect your confidential information while improving services
PDF
Data breaach mitigation
PPTX
9 Things You Need to Know Before Moving to the Cloud
PDF
Improve service while cutting cost
PDF
Seven Deadly Threats and Vulnerabilities in Cloud Computing
PDF
Seven deadly threats and vulnerabilities in cloud
PDF
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
ODP
Securing The Cloud
PDF
Cloud Security - Emerging Facets and Frontiers
PDF
Renewed Context for the Defense and Security Sector
PPTX
Cloud Security: A matter of trust?
PPT
28_Security-Privacy-in_Cloud_AND_real.ppt
PPT
28_Security-Privacy-inxssudusd_Cloud.ppt
PDF
wp-security-dbsec-cloud-3225125
PPTX
Extending security in the cloud network box - v4
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PPTX
Cloud Security - Idealware
PDF
The Cloud Beckons, But is it Safe?
PDF
Adallom_Cloud_Risk_Report-Nov14
Global Security Certification for Governments
Protect your confidential information while improving services
Data breaach mitigation
9 Things You Need to Know Before Moving to the Cloud
Improve service while cutting cost
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Seven deadly threats and vulnerabilities in cloud
Cloudifying threats-understanding-cloud-app-attacks-and-defenses joa-eng_0118
Securing The Cloud
Cloud Security - Emerging Facets and Frontiers
Renewed Context for the Defense and Security Sector
Cloud Security: A matter of trust?
28_Security-Privacy-in_Cloud_AND_real.ppt
28_Security-Privacy-inxssudusd_Cloud.ppt
wp-security-dbsec-cloud-3225125
Extending security in the cloud network box - v4
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
Cloud Security - Idealware
The Cloud Beckons, But is it Safe?
Adallom_Cloud_Risk_Report-Nov14

Recently uploaded (20)

PPT
Geologic Time for studying geology for geologist
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Five Habits of High-Impact Board Members
PDF
Architecture types and enterprise applications.pdf
PPT
What is a Computer? Input Devices /output devices
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
Geologic Time for studying geology for geologist
A review of recent deep learning applications in wood surface defect identifi...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Zenith AI: Advanced Artificial Intelligence
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A novel scalable deep ensemble learning framework for big data classification...
WOOl fibre morphology and structure.pdf for textiles
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Getting started with AI Agents and Multi-Agent Systems
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Five Habits of High-Impact Board Members
Architecture types and enterprise applications.pdf
What is a Computer? Input Devices /output devices
observCloud-Native Containerability and monitoring.pptx
Enhancing emotion recognition model for a student engagement use case through...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
search engine optimization ppt fir known well about this
Developing a website for English-speaking practice to English as a foreign la...
Taming the Chaos: How to Turn Unstructured Data into Decisions

Protect your Data even under breach

  • 1. CloudMask thinks differently in the secure-cloud landscape. The economic value proposition of Software as a Service (SaaS) is undeniable. SaaS is disrupting industry after industry, making accessible to sole proprietors and small businesses software functionality that historically required significant investment in hardware, software, and annual maintenance fees. This, in turn, is making smaller players even more agile and efficient than they used to be, allowing them to run competitive circles around larger or laggard players. The good news is that rich software functionality is often available for less than $100 per month, enabling high levels of business management and administrative efficiencies. The bad news is that the tempting sky of cloud and SaaS computing is filled with thunderclouds of cybersecurity concerns. Despite the best efforts of traditional cybersecurity experts, the adoption of cloud computing has been accompanied by an ever-growing number of egregious data breaches. These breaches damage brands and drive up significant costs for investigations, notification, and identity-theft protection for clients whose personal information has drifted into malicious hands. So, what’s going on? Why do even the largest enterprises struggle with securing their data? Wouldn’t the National Security Agency be one of the most rigorous security practitioners in the world? What leaks have we not yet detected? One thought leader at a major global cybersecurity consultancy explained it like this: “We’re trying to examine every packet that flows across the perimeter of the network and notice IP addresses that don’t make sense. This is incredibly hard. There’s a ridiculous amount of data, and we’ve entered an age where the network no longer has clear boundaries. We really haven’t solved that problem.” What is the problem? The problem lies in the way traditional security thinkers have defined the problem. They’re working with a castle and moat metaphor, where the internal network is protected with a set of security rings. Each ring, however, has costly hardware and software searching for malevolent inbound and outbound data. But it’s like looking for needles in a haystack. And even if security experts are successful at protecting the perimeter, there is little protection against insiders (employees or others with access to the internal network). Protect your Data even under breach
  • 2. CloudMask thinks differently. We see the problem in simpler terms: protecting sensitive data and ensuring that only authorized users, using known devices, can see data in the clear. We’re happy to let the traditional security experts work on their perimeters, knowing that when they fail, our customers’ data remains secure. And, in contrast with products designed for big enterprises, we’ve created a solution that can be installed, configured, and afforded by small businesses without IT staff. The SaaS Security Problem – Simplified SaaS applications use best-practice security protocols and rely on their cloud provider to secure the infrastructure the application runs on. One vendor explains it this way: “We ensure that your communications are secure using bank-grade 256-bit SSL encryption. All of (our) infrastructure is hosted using physically secure, managed data centers that meet the rigid SSAE 16 specifications. Geo-redundant backups are performed multiple times per day, and site security and privacy are routinely audited by respected third parties.” By means of 256-bit SSL encryption, the connection between your browser or app and database servers is secured. When you submit a query or update, the data is encrypted as it transits the internet. Once the data reaches the data center, it is decrypted for insertion into the app’s database. The data center itself (e.g., Amazon Web Services) has a rigorous set of security controls and protocols, meaning that only employees with the proper identification and access passwords can physically or virtually access the servers that hold the application’s data. SSAE 16 is a standard according to which data centers are audited for their degree of compliance with policy. There are three vulnerabilities that should concern executives: 1. Anyone who tricks a user into revealing their username and password can impersonate that user and log in from any browser in the world. Such a hacker can impersonate the user and perform administrator functions. You don’t have to be a fool to have this happen to you. Even a sophisticated user like CIA Director John Brennan has fallen prey to high school-age hackers. 2. Any insider (employee of the data center) can turn from “good” to “bad” overnight or have their credentials stolen, meaning that an authorized system administrator could access application data for malevolent purposes. Insiders don’t need to be “bad” to present a threat. They can simply be careless. A recent report on cybersecurity suggests that less than 50 percent of organizations have adequate policies in place to mitigate insider-threat risks. The challenge here is that executives depend on their SaaS provider, who in turn rely on their cloud service providers to maintain security hygiene. That’s a lot of blind faith. 3. Governments have the desire, capacity and experience to tap into the cloud-service providers who hold the world’s data. The problem here is manifold. On the one hand, the government can access specific information based on a warrant. On the other hand, it is an entirely different matter to access everything on an as-needs basis, under cover of National Security Letters or their equivalent. Despite their best efforts to security screen and oversee intelligence and law enforcement operations, the government also falls prey to “trusted” staff performing unauthorized actions. These vulnerabilities impact the firm’s liability for data breaches and the capacity to deliver on a promise of client confidentiality and privacy. In storing sensitive personal and other data, the firm is considered a data controller. As a data controller, the firm is subject to a variety of data protection laws and regulations. Such regulations increasingly create a costly burden to notify individuals affected by data breaches and to purchase several years of identity-theft protection. Emerging European laws impose heavy fines for firms who violate data protection regulations.
  • 3. If you think the solution is not to use cloud, think again. The concerns outlined above have caused many organizations to have misgivings about adopting cloud-based solutions, presuming that an on-premise solution (a server running in your office) is safer. Unfortunately, that is not the case. Your office or server room isn’t nearly as secure as an access-controlled data center. CloudMask: a silver lining for SaaS CloudMask addresses these vulnerabilities in a way that enables executives to immunize their firms against data- breaches, differentiate by offering highly secure data management and communications, and using economical cloud services with confidence. CloudMask can provide SaaS users with an easy-to-install browser extension that automatically masks sensitive data before it enters the 256-bit encryption channel to the data center. When that data arrives at the data center where the 256- bit protection ends, CloudMask data stays masked. This process also works in reverse, as in the case when the user requests sensitive data. Here the masked data is double- encrypted as it moves through the secured communications channel. When it arrives in the browser, the 256-bit encryption is removed, and CloudMask seamlessly unmasks to present the data in the clear. Alongside controlling users and their access rights, practice management account owners/administrators have the capacity to select specific fields to be masked. Not all data needs to be masked and protected, but data categorized as sensitive personal data, personally identifying, or otherwise confidential, can be selected for automated, seamless masking and unmasking. From a functional perspective, CloudMask resolves the concerns that executives might have with respect to using SaaS applications: 1. Each user authorized to access the SaaS account installs a CloudMask browser extension that is activated through a simple process generating the personal, private and public keys required for the encryption process. What’s more, the extension can be installed on multiple personal devices, each of which is personalized with a private key. Thus, even if a username and password are somehow compromised, which under normal circumstances would allow anyone anywhere in the world to log into the account and see data in the clear, the unauthorized user cannot do so without access to the specific devices configured with the personalized browser extension. 2. The data stored under care of the data center remains masked while at rest or in motion. Neither the practice management SaaS vendor nor CloudMask administrators nor data center administrators, have keys that can be used to unmask the data. If the data center suffers a breach (e.g., an unauthorized insider penetrates the database, or a government agency serves a National Security Letter), data the user has designated as sensitive remains protected. 3. The data stored under care of the data center is masked in such a way (“tokenization”) that anonymizes what was previously sensitive data. Thus, even if that data is stolen, it is no longer considered sensitive personal information or personally identifying information, so it no longer falls under data protection regulations or requirements. In other words, breaches of systems holding tokenized data do not trigger the costly response and remediation efforts associated with breaches of systems holding sensitive personal information. The Technical Story A separate e-book explains the technical details behind this process and the software that automates it, as well as describing the benefits of encrypting and tokenizing data, which we collectively refer to as “masking.” The e-book also provides a brief explanation of the well-established public/private key methods used by the encryption process. Grounded Confidence CloudMask is unique in having its “CloudMask engine” certified through a Common Criteria for Information Technology Security Evaluation (Common Criteria) process, which is used by twenty-six federal governments to evaluate security products for their own use.
  • 4. The process of independent evaluation assesses whether a product’s functional claims live up to the way it is coded and performs. Many products claim to be “bank-grade” or “military-grade,” both of which are subjective assessments. CloudMask is the only data-masking product capable of working with SaaS offers to achieve Common Criteria certification. More expensive competitors like Cipher Cloud and Ionic have not achieved such objective criteria. Technical advisors can access CloudMask’s Common Criteria Assessment here. It’s easy to get started with CloudMask. Visit www.cloudmask.com