Futurex and Google enable client-side Google Workspace encryption
Full-spectrum key management solution allows customer-controlled import and export of cryptographic keys
According to Google, client-side encryption renders customer data unreadable, boosting security. A user’s organization retains sole ownership and control over the cryptographic keys employed to encrypt files and documents on Google Workspace.
With Futurex's key management solution supporting Drive, Docs, Sheets, and Slides, enterprise users of Google Workspace can now enjoy unparalleled control over sensitive data, right from their browsers.
FIPS 140-2 Level 3-compliant, Futurex's key management enterprise server (KMES) series 3 is an all-in-one platform featuring symmetric key lifecycle management capabilities, code signing, data protection, and vaultless tokenization. Supported key types and protocols include DES, Triple DES, DUKPT, X.509, AES, RSA, and EMVCo.
Users can also leverage Futurex's VirtuCrypt cloud service to track and report suspicious activity. Aside from meeting SSAE (SOC 1, 2, and 3) standards, TIA-942 Tier 4, and HIPAA compliance, VirtuCrypt data centers support dual control environments backed by multi-tiered identity verification systems. In addition, integrated hardware security modules (HSMs) from Futurex simplify installation, eliminating the need for third-party services.
Commenting on its solution, Futurex said it only provides client-side encryption but also supports enterprise-wide data protection through public key infrastructure (PKI), certificate authority (CA), cryptographic key lifecycle management, and integration with third-party applications.
The complete guide to building a security awareness programme that works
How security leaders can drive real behaviour changeDownload now
"Google Workspace client-side encryption advancement marks an exciting time for encryption innovation," said Ryan Smith, vice president of global business development at Futurex.
"Our robust FIPS 140-2 Level 3-validated HSMs not only handle all the key management on the client side — making it easier for organizations to manage their cryptographic keys and retain better control of their data security — but deliver data protection across the enterprise."
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download