Research & Studies

“Enterprises should always check the claims of vendors that their solutions are based on proven security models. The highest level of security is currently provided by solutions that are on-premise, with keys not available anywhere in the cloud where the algorithms comply with internationally accepted standards.”

- Analyst ,
Gartner Group

“Based on the Segregation of Duties security principle, key management should be separated from the cloud provider hosting the data.  This provides the greatest protection both against external breach of the service provider as well as an attack originating from a privileged user/employee of the provider.”

- Guidance ,
Cloud Security Alliance