Unlock the best of 360Quadrants

Send your custom requirements to top Vendors in one click

Cloud encryption is the process of transforming the customer’s data stored in the cloud environment into cipher text, which ensures only authorized people with the correct decryption key can access the data. Cloud encryption software can be applied to data at rest and data in transit. Companies across the globe are increasingly adopting the cloud technology. Organizations are categorically embracing diverse cloud environments, ranging from private and hybrid clouds to public cloud for the storage of enterprise data. However, the risks associated with content protection and data compliance continue to be the prime factors hindering cloud embracement across businesses. Moreover, computer hackers and the voluminous increase in the number of cyber-attacks have further increased data security concerns for organizations that have adopted cloud for data storage. Therefore, organizations are increasingly adopting cloud encryption software to safeguard sensitive information from data breaches and thefts, and to adhere to industry-specific compliances and standards. Cloud encryption software offers solutions and services that strengthen an organization’s security portfolio through strong encryption capabilities. ___________ 1. Micromarkets are the further segments and subsegments of the global cloud encryption market included in the report. 2. Core competencies of the companies are captured in terms of the key developments, key observations, and key strategies adopted by them to sustain their position in the market.

Filters

Best Cloud Encryption Software

Comparing 33 vendors in Cloud Encryption across 99 criteria.
  • 8K miles software services Ltd. is the service that is being born on the cloud. The software helps companies in embracing cloud security. Different businesses and organizations take great advantage of the cloud encryption technology of 8K miles software services. All the applications and processes offered by the organization have the skills and knowledge to make the cloud journey of the entire client list real success. The service provides a distributed on-demand platform

    Read More
    • SME
    • California, USA
    • Founded: 2007
    • $51MN to $100MN
    • 1,00,001 to 5,00,000
  • 360 Score: 0.02 Reviews

    Allot Communications Inc is a leading service provider of security solutions and network intelligence. Their cloud encryption technology has been helping enterprises and service providers to extract more value from their networks and to serve better to their customers. It combines proactive network intelligence with innovative security solutions to deliver secure and superior quality of experience. By using Allot Communications Inc cloud encryption service customers get the power to improve business decisions.

    Read More
    • SME
    • Hod Hasharon, Israel
    • Founded: 1996
    • $51MN to $100MN
    • 1 to 50
  • 360 Score: 0.02 Reviews

    Avanade is a software development company that offers cloud encryption and cloud-based services, among others, to help businesses deal with cyber threats. Avanade’s services do not come from traditional practices but are something that can be integrated and can secure the businesses by design. The company’s software and services help businesses to become more secure, helps them to stitch business models without any hiccups and help them to grow faster.

    Read More
    • Enterprise
    • 10,001 to 15,000
  • 360 Score: 0.02 Reviews

    Bitglass Cloud Encryption provides encryption for data-at-rest in any cloud application as well as any information that is shared across servers. To protect your data at all times, you need a secure cloud encryption service, and Bitglass Inc is here to provide it to you. With the Bitglass patented encryption service, you can get military-grade encryption for your files without compromising the functionality of your applications. With Bitglass, you can encrypt your data across any requests. Bitglass Cloud Encryption also provides control over your encryption keys.

    Read More
    • Startup
    • California, USA
    • Founded: 2013
    • $11MN to $50MN
    • 101 to 500
  • 360 Score: 0.0
    • SME
    • Andover, Massachusetts, USA
    • Founded: 2003
    • $101MN to $500MN
    • 501 to 1,000
  • 360 Score: 0.0

    Ciphercloud's offerings include CipherCloud for Cloud Discovery, CipherCloud for Salesforce, CipherCloud for SAP SuccessFactors, CipherCloud for Adobe Analytics, CipherCloud for ServiceNow, and CipherCloud for Box. The company is a pioneer and an industry leader in encrypting critical information in the cloud. Cuphercloud's Active Cloud Encryption delivers a full sclae protection to the data and prevents unauthorized access whether in the cloud or on mobile devices. The platform offers multi-cloud protection across the widest range of cloud apps. Also, CipherCloud is the sole vendor that facilitates automated workflows, triggers, bulk IT operations and other business-critical operations.

    Read More
    • SME
    • 501 to 1,000
  • 360 Score: 0.02 Reviews

    Safecrypt, a cloud encryption gateway by Datalocker Inc, helps provide users with an extra layer of protection between their private data and their cloud storage service provider. For encryption services, all you have to do is use their intuitive virtual drive. When you use this drive, your data is encrypted before it can be sent to your cloud storage provider to ensure that it cannot be accessed by anyone else. When you need to access the file yourself, all you will need to do is read the data using SafeCrypt's virtual drive to ensure that it is decrypted.

    Read More
    • SME
    • 501 to 1,000
  • 360 Score: 0.02 Reviews

    Dimension data cloud encryption offers a network security hat secures all the devices that are connected to the network. The intelligent technology protects your workplace by securing the data assets along with the employees. The service is highly used by the users to safeguard the present and future of the organization. Dimensional data assures the integrity, availability, and confidentiality of the organizational data. It ensures the protection of next-generation against threats.

    Read More
    • Startup
    • 1 to 50
  • 360 Score: 0.02 Reviews

    While digital transformation helps the organization in numerous ways, it can also introduce some new complexities. With 80% of an organization’s employees taking their work outside the office, data protection is essential. Ercom has nearly two decades of encryption service experience. They understand that organizations need a way to protect the data which is shared among the employees, the data shared with the partners. The information shared by a client with the organization. Hence, they provide encryption services for business and business-to-business interactions.

    Read More
    • Startup
    • 1 to 50
  • 360 Score: 0.0

    Gemalto specializes in mobile platforms and services, mobile embedded software and products, payment, government programs, machine to machine (Internet of Things (IoT)), and enterprise security. Gemalto is formed by the merger of Axalto Holding N.V., a specialist in telephone chip cards and telecommunication, and Gemplus International S.A., a prepaid phone cards provider. The company has set up 30 R&D centers and has a high focus on R&D with 3,000 digital scientists in the R&D team. The company has a diversified clientele that includes more than 2 billion customers across the geographic regions of North America, MEA, Europe, APAC, and Latin America. Gemalto caters to various verticals, such as BFSI, healthcare, telecom and IT, government and utilities, and automotive.

    Read More
    • Enterprise
    • Amsterdam, Netherlands
    • Founded: 2006
    • $1BN to $5BN
    • 10,001 to 15,000
  • 360 Score: 0.0

    HyTrust progressed in the cloud encryption market by providing encryption technology for public, private, and hybrid cloud environments. HyTrust helps customers in safeguarding their data in the cloud environment with enhanced encryption technologies. The company provides products, such as CloudControl Virtualization Security, DataControl Cloud Encryption, and KeyControl Key Management in the cloud encryption market. HyTrust DataControl provides encryption and key control for cloud and virtualization environment, and supports DAS, NAS, or SAN storage. DataControl is independent of the hypervisor and supports both Windows and Linux virtual (or physical) machines. It provides encryption for data at rest. The capabilities of HyTrust Data Control include strong encryption, simplified key management, hardware-accelerated encryption, and the ability to initially encrypt the existing data (or rekey data) while VMs and applications continue to run. The algorithm used by HyTrust is FIPS-approved AES, which supports 128 and 256 bit keys. Key management is provided via HyTrust KeyControl, a FIPS 140-2 Level 1-validated soft-appliance cluster. HyTrust KeyControl capabilities include a high-availability, security-hardened cluster with a simplified administration GUI, and the ability to talk to hardware HSM devices (including Gemalto’s Luna HSM). KeyControl can also act as a KMIP compliant server. HyTrust KeyControl supports hyperconvergence platforms, such as Cisco UCS/HyperFlex, NetApp FlexPod, Nutanix, SimpliVity/HPE, and Pivot3; cloud platforms such as Microsoft Azure, IBM Bluemix, Amazon Web Services (AWS), and VMware vCloud Air; and virtual environment such as vSphere 6.5. The company is highly renowned for its encryption support for the AWS platform.

    Read More
    • SME
    • 501 to 1,000
  • 360 Score: 0.02 Reviews

    J2 global is a cloud encryption service which is a secure network security service offered to the clients. The network service helps individuals, families and team safe and protected from un-trusted WiFi. J2 global offers self-hosted VPN cloud servers which can be easily installed by the users in their home, remote data centres, and offices. The advanced international cloud encryption services of J2 global enable people to connect, inform and empower the world.

    Read More
    • SME
    • Massachusetts, USA
    • Founded: 2004
    • $11MN to $50MN
    • 51 to 100
  • 360 Score: 0.02 Reviews

    MariaDB has worked extensively to develop the best tools and applications for your database to expand and work up to its full potential. The brand is now supported by eperi Gateway for database encryption and other services. There are various features which are enhanced by this combination and various problems tackled. Advanced algorithm solutions have been developed, which are exchangeable on individual levels. Encryption is managed on all levels giving maximum access to the user against external threats.

    Read More
    • Startup
    • 1 to 50
  • 360 Score: 0.0

    Netskope specializes in access control, anomaly detection, discovery, DLP, encryption, incident management, and threat protection. The company provides cloud encryption for various cloud service models, including SaaS, IaaS, and PaaS. The company has a large customer base which includes public and private sector organizations from across the globe. Some of the major customers of the company include Genomic Health, InterContinental Hotels Group, Levi Strauss & Co., Nuna International, Toyota, Oak Hill Advisors, and NVIDIA. Netskope provides solutions to various verticals, such as automotive and manufacturing, financial services and insurance, healthcare and life sciences, legal, oil and gas, retail and hospitality, and utilities. Some of the major technological partners of the company include Microsoft, Google, AWS, and Slack.

    Read More
    • SME
    • Founded: 2012
    • $101MN to $500MN
    • 501 to 1,000
  • 360 Score: 0.02 Reviews

    Oberthur Technologies is now IDEMIA and is known for its empowering solutions to financial institutions and mobile operators. With an extensive roster of services, security and cloud encryption are some of the most notable ones. With a bunch of products to secure data, biometric data, driver’s license data and much more, the security services are designed for security. Furthermore, they can be integrated, and these services comply with various security standards.

    Read More
    • Enterprise
    • Paris, France
    • Founded: 1984
    • $1BN to $5BN
    • 10,001 to 15,000
  • Parablu's Secure Cloud Gateway or Privacy Gateway utilizes encryption in addition to other techniques to create a barrier to unauthorized access of data inside a secure storage container it creates. Most importantly, Parablu enforces strict segregation of duties ensuring that the encryption and other data obfuscation occurs with the customer in full control over the encryption keys. Parablu's Zero Knowledge Privacy philosophy means that they don't know nor control the encryption keys. The company's management portal allows customers, at any time, to change the initialization vector for the encryption that is used. Another reason their product portfolio stands out is their ability to work with end user cloud storage subscriptions such as OneDrive for Business and Google Drive. Several customers already have subscriptions such as Office 365 or G-Suite purchased for their employees each of whom gets a generous allocation of cloud storage space ranging from 1TB - 5TB.

    Read More
    • Startup
    • 1 to 50
  • 360 Score: 0.02 Reviews

    PerfectCloud has developed various solutions for secure and private clouds. Data encryption is crucial to keep your cloud storage protected and freely use your data to full potential. It is essential that your files are correctly encrypted and you get the complete control of your encryption keys. SmartCryptor by PerfectCloud has effective and transparent encryption policies which take care of all the data sent into and out of your cloud. It also makes sure that your company remains compliant to government regulations and accordingly adapts your data for better functioning.

    Read More
    • Startup
    • 1 to 50
  • 360 Score: 0.02 Reviews

    Persistent Systems have developed innovative methods to help software-driven business with cloud management. Cloud computing is an essential component of any IT-based enterprise. Excellent data services and cloud services need to be completed with absolute security of data and the transactions inside and outside of it. Persistent Systems tries to interweave technical concerns of safety and operations with organizational concerns like a business, people, and governance. Thereby, data protection and management in the cloud are well managed by innovative solutions.

    Read More
    • Enterprise
    • 5,001 to 10,000
    • SME
    • Connecticut, USA
    • Founded: 1996
    • $11MN to $50MN
    • 101 to 500
  • 360 Score: 0.02 Reviews

    Randtronics has worked exclusively on building advanced tools for the security of your business and company against all possible threats. It focuses on encryption as the most potent form of cybersecurity and thereby implements it to get the best out of your data. It manages risks on all levels, including hardware and software devices. It also achieves data security compliance as it adapts to the upcoming regulations by governments. Different tools and solutions work together to protect each unit of your cloud and give you the best control of your enterprise.

    Read More
    • Startup
    • 1 to 50
  • 360 Score: 0.0
    • Startup
    • 1 to 50
  • With exclusive and latest development techniques in their arsenal, SAIC aims to provide the best technology to the best in the industry. Their advanced processes and tools allow them direct access to one of the best cloud technology. They help build a private cloud system for an organization that can be used within the organization to help handle different business operations. SAIC handles every aspect of creating a safe and secure cloud system.

    Read More
    • Startup
    • 1 to 50
  • 360 Score: 0.0

    Secomba specializes in cloud encryption. The company provides a product named Boxcryptor for encryption of files and folders in Dropbox, Google Drive, OneDrive, and cloud environment. Boxcryptor is available for both consumers and business teams. The company has been receiving investment from Agile partners, which is helping Secomba to progress in the cloud encryption market. Boxcryptor for teams offers: Enterprise user management through SSO and SCIM support, end-to-end encryption technology, Zero knowledge encryption etc. For individuals, the solution supports almost every cloud storage provider present in the market. It automatically identifies the user's installed cloud storage providers and adds them to the virtual Boxcryptor drive. It also allows users to sync their encrypted data across two of their desired devices.

    Read More
    • Startup
    • Bayern, Germany
    • Founded: 2011
    • 1 to 50
  • 360 Score: 0.02 Reviews

    With SkyBox for Cloud, an organization can strengthen and extend their security management to a cloud infrastructure. Often the company’s fall short in their cloud security capabilities, as it can be hard to visualize the cloud infrastructure and hence, challenging to protect information stored in the cloud. SkyBox for cloud helps make it easier to visualize the network infrastructure and help employ consistent security measures to protect the information. With SkyBox, you can help extend your security measures to the cloud and multi-cloud networks.

    Read More
    • Startup
    • 1 to 50
  • 360 Score: 0.0

    Skuhigh guarantees Data security on the cloud environment with the help of encryption, key management, tokenization, access control, and information rights management. The company supports various SaaS, PaaS, and IaaS service providers, including Skyhigh for Shadow IT, Skyhigh for Office 365, Skyhigh for Box, Skyhigh for Salesforce, Skyhigh for Slack, Skyhigh for AWS, Skyhigh for Custom Applications, Skyhigh for ServiceNow, Skyhigh for Dropbox, and Skyhigh for Google Drive. The company also customizes its platform capabilities according to the needs of CSPs. With a wide products and solutions portfolio, Skyhigh scores extremely well in the depth and breadth of product offering and product feature and functionality parameters. Skyhigh is one of the leading CASBs to cater platforms with capabilities, such as DLP, encryption, tokenization, and access control, for all major cloud services and applications on IaaS. Skyhigh CASB is compliant with FedRAMP and certified by ISO 27001/27018.

    Read More
    • Startup
    • California, USA
    • Founded: 2012
    • $11MN to $50MN
    • 101 to 500
  • 360 Score: 0.02 Reviews

    Stormshield has worked immensely to develop on the level of security for your data. Your cloud and data are essential commodities, and it is crucial to preserve them against numerous threats and problems looming around them. The company forms various links and connections and all associations in this network also become vulnerable to different types of data threats. Stormshield Data Security maintains end-to-end data encryption to provide maximum transparency against any malicious behaviour or data leakage.

    Read More
    • Startup
    • München, Germany
    • Founded: 2014
    • 1 to 50
  • 360 Score: 0.02 Reviews

    The StratoKey Cloud Encryption Gateway encrypts web and cloud application data automatically. It helps in blocking the immense bulk of data breaks when any network or system is endangered.The company's cloud encryption platform for organizations uses very secured Advanced Encryption Standard (AES) along with Format Preserving Encryption to preserve the credential information. It is a flexible model and users can easily select and match encryption strength to data confidentiality.

    Read More
    • Startup
    • 1 to 50
  • 360 Score: 0.0
    • Enterprise
    • Stockholm, Sweden
    • Founded: 2002
    • $5BN to $10BN
    • 15,001 to 20,000
  • 360 Score: 0.0

    Thales e-Security specializes as a data encryption company for data centers, clouds, big data, and container environments. Thales e-Security has progressed in the cloud encryption market by delivering best-in-class solutions for cloud data encryption, tokenization and data masking, key management, and digital signing. The company provides Vormetric Cloud Encryption Gateway, Vormetric Data Security Manager (DSM), and Vormetric Transparent Encryption. Vormetric Cloud Encryption Gateway encrypts the data before it is transferred to the cloud environment. It also supports virtual machine formats, such as Open Virtualization Format (.ovf) distribution and Amazon Machine Image (AMI). The gateway provides data security blades, which are supported by Amazon S3 and Caringo Object Storage. The data security blades also provide live integration to LDAP and active directory. The Vormetric DSM is one of the key solutions from Thales e-Security for the support of Vormetric Cloud Encryption Gateway. DSM aids in centralized key and policy management, and is capable of supporting various form factors and FIPS 140-2 levels. DSM helps in the efficient centralized management of keys, generated from Thales e-Security products or from Microsoft SQL Server TDE, Oracle TDE, and IBM Guardium Data Encryption. Thales e-Security also provides Vormetric Transparent Encryption, which offers file and volume level data at rest encryption, access controls, and data access audit logging. The company supports encryption for cloud service models, such as IaaS, PaaS, and SaaS. Thales e-Security is proficient in managing encryption keys that help customers in integrated key management and nShield BYOK. Vormetric Key Management as a Service (KMaaS), catered from Thales e-Security, guarantees efficient management of keys with key activity reporting, key lifecycle management, and key secure storage for customers. Vormetric KMaaS is supported by Salesforce SaaS-based platform. The company also offers nShield BYOK, which is essential for nShield HSM, to securely store encryption keys for sensitive cloud data, stored on cloud platforms, such as AWS, Microsoft Azure, and Google Cloud Platform. The company also provides services, such as 24/7 support and maintenance, training, PKI professional services, and custom cryptographic services. Thales PKI consulting services help customers deploy managed PKIs and comply with policies and standards, WebTrust audit requirements, and federal bridge cross-certificate criteria. The types of PKI consulting services catered by Thales e-Security are PKI solution implementation professional services, PKI solution review services, and PKI and cryptographic security training. The company has a broad range of solutions and services portfolio in the cloud encryption market. Therefore, it scores well in the breadth and depth of product offering parameter, due to advanced product features and functionalities. Thales e-Security has various delivery modes and tie-ups with distributors and resellers, who provide the company’s solutions and services to customers across the globe. The company also provides solutions that can be customized according to the customers’ requirements. Thales is highly focused on product innovations and invests significantly in R&D. Recently, it launched a new version of CipherTrust Monitor, which helps the network security team to monitor the HSM of both kind payShield and nShield.

    Read More
    • Enterprise
    • La Defense, France
    • Founded: 1983
    • $10BN to $50BN
    • 50,001 to 75,000
  • Trend Micro has progressed in the cloud encryption market by delivering a solution named SecureCloud. SecureCloud secures critical data on the cloud and virtual environment by providing encryption, which is supported with policy-based key management and unique server validation. SecureCloud supports data protection on private cloud, public cloud, and virtual environments. SecureCloud extends its support to Amazon EC2, Eucalyptus, vCloud, RightScale, TCloud, VMware ESX and vSphere, and other virtual environments. SecureCloud delivers keys to the devices in a secure way, and there is no requirement for the deployment of the file system and management infrastructure. SecureCloud aids in data privacy, regulatory compliance, and secure storage recycling. SecureCloud helps customers to be compliant with internal cybersecurity policies and government regulations, such as HIPAA, HITECH, Sarbanes-Oxley, GLB, and PCI-DSS. The encryption algorithms utilized for cloud data encryption are based on AES 256 bit. SecureCloud secures data, metadata, and associated structures without reducing the performance and operational efficiency. SecureCloud utilizes identity- and integrity-based policy enforcement, which makes sure that the keys are delivered only to authorized virtual machines. The product also aids in robust auditing, reporting, alerting, and remotely managing the cipher keys. Trend Micro also offers integrated DLP on network gateways and on cloud. DLP in the cloud environment provides features, such as inspection of the network and cloud environment, tracking of sensitive data, identification of critical business operations, and detection of suspicious data by monitoring keywords, regular expressions, and document attributes.

    Read More
    • Enterprise
    • Tokyo, Japan
    • Founded: 1988
    • $1BN to $5BN
    • 5,001 to 10,000

Reviews

Global Head - Service and Product Development,Company Name Classified
Global Head - Service and Product Development, Company Name Classified
(*)(*)(*)(*)(*)5

“The way you want it"

The entire platform is very flexible that allows the users and organizations to pick and match encryption strength to data confidentiality. It additionally uses a diverse encryption strategy which has notable advantages like preserving the functionality and searchability of the application.
Vice President,Company Name Classified
Vice President, Company Name Classified
(*)(*)(*)(*)(*)5

“Reliable, Safe, and powerful"

The use of multiple powerful encryption methods makes the platform not only secure but also reliable for users to send or store their essential data on the cloud. It utilizes SSL for interacting with other users by making sure the data is encrypted at all times.
Global Head - Service and Product Development,Company Name Classified
Global Head - Service and Product Development, Company Name Classified
(*)(*)(*)(*)(*)5

“Just one word, Secure"

The software takes advantage of its Zero-Knowledge technology which allows only the user and the authorized receiver access to the data. In addition to that, to make transferring of files easy and secure, it uses the new TLS security network.
Technical Director,Company Name Classified
Technical Director, Company Name Classified
(*)(*)(*)(*)(*)5

“Best of both worlds"

Cloud computing and data sharing on the cloud have risen to prominence, mostly because of the security and flexibility they provide to the users. The company’s software uses encryption techniques even to boost the security protocols, which can be tweaked according to the organizations’ preference.
Global Head - Service and Product Development,Company Name Classified
Global Head - Service and Product Development, Company Name Classified
(*)(*)(*)(*)(*)5

“Flexibility with security"

Your data must remain secure, but it should also be conveniently movable for better development of your company. Stormshield understands this priority and accordingly gives us a very adaptable network which suits all your needs with complete confidentiality.
Questions And Answers
Have a Question? Ask here.
No Questions