This short and interesting video explains the CloudMask key management system. Alice has a lock she uses to protect her data. She can send copies of this lock to any of her friends who can use it to protect a message they send her. However, there is just one key and that is held by Alice. Anyone can protect and send data to Alice, but only she can open it. It’s that simple.
With CloudMask's Data protection under breach, infrastructure breaches no longer mean data breaches. Insecure clouds and mobile devices no longer mean insecure enterprise data. And an insider with access to applications and systems can no longer see data.
Sign up now for your 30 days free account, and experience the CloudMask advantage! cloudmask.com/get-cloudmask
Related posts
Why CloudMask?: You hold the key
October 29, 2015