<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

No Infrastructure – A True Cloud Solution

CloudMask does not require a security gateway to be installed. Instead, it integrates easily with modern browsers, on desktop and mobile devices, as a browser extension, and as an executable agent (exe). User data is encrypted using the best breed algorithms at the moment of creation, well before it leaves your device.

Accordingly, users and departments of any size can start using CloudMask immediately without having to deploy new infrastructure. Given that the data is encrypted at the source, it can be safely stored at public cloud CloudMask servers.

For large organizations interested in consolidating various departmental data centers, the CloudMask server may be installed on-site as part of their private cloud and shared across their global network.

No Infrastructure – A True Cloud Solution

Share Encrypted Data Among Trusted Community

application.png

CloudMask enables users to easily share encrypted data with other users and groups as per sharing policies. CloudMask's policy manager integrates with existing security authentication and authorization frameworks.

In doing so, it allows administrators and owners to configure access rights and group sharing based on the application, the type of data, and the role of its creator.

By leveraging CloudMask encryption key management algorithms, users can be efficiently added and removed to existing groups by authorized owners.

Transparent Functionality

CloudMask is seamlessly interoperable with modern browsers and devices. Users do not need to change how they interact with their applications.

CloudMask also leverages existing Identity Credential and Access Management. Users simply log on once with their strong credentials to CloudMask and the protected applications.

Transparent Functionality

See the Potential with End-to-End Encryption for Google