CipherCloud for Salesforce

Powered by SC Magazine
 

Today, this product focuses on the Salesforce application, but it is well-positioned to apply to any cloud-based application.

The choice of Salesforce is a good starting point for big cloud apps because it is the number three customer relationship management (CRM) product - after SAP and Oracle. 

Hitching its wagon to the Salesforce star was wise as well because Salesforce is touting the "social enterprise" application of social media concepts and techniques to CRM. We can't think of an environment that needs good security more than an application that deals in competitive sales and marketing information in a social network milieu. There really is only one way to feel comfortable about security in this environment - and that is encryption.

The product also provides protection in that it prevents malware from being uploaded to the Salesforce application. Further, organizations developing with an open plug-in framework can develop applications that work with CipherCloud, and there are other uses coming soon, including Gmail and the Amazon cloud.

Overall, this is a unique approach to securing a cloud-based application. While other cloud security products secure the virtual platform - a very good general approach, of course - this one is right at the application layer and it pays dividends in both security and performance. There does not seem to be any performance difference on Salesforce with or without CipherCloud.

This is a simple product to use and it ties tightly into Salesforce - even in its pricing, which is quite reasonable given the added security that it adds to an application handling sensitive data in a difficult environment.

Copyright © SC Magazine, US edition


 
:
Overall Rating
Product Info
Supplier:
 
Tags
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 320

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 125

Vote