Careers


Testimonials

“If the encryption vendor offers options for ‘function preserving encryption’ – for example, to preserve sort – regulations may require the use of standardized and approved algorithms or proof of independent certification for the potentially weakened encryption.”

Analyst

Gartner Group

“Based on the Segregation of Duties security principle, key management should be separated from the cloud provider hosting the data.  This provides the greatest protection both against external breach of the service provider as well as an attack originating from a privileged user/employee of the provider.”

Guidance

Cloud Security Alliance

Download WhitePapers