All-in-One Cloud Security for Email, File, Mobile and Cloud Data

By   ISBuzz Team
Writer , Information Security Buzz | Jun 23, 2015 05:30 pm PST

cloud security for email, file, mobile and cloud dataUnified Secure Data Exchange Broker solution consolidates email, file, mobile and cloud data security

Safe-T announced today the release of Safe-T Box 6.0, featuring the Secure Cloud Access Broker which secures, governs and monitors data in the cloud to prevent leakage, ensure compliance with industry regulations and enable organizations to offer cloud services to their customers.  With the addition of the Secure Cloud Access Broker, Safe-T Box provides a unified Secure Data Exchange Broker solution with one easy to use interface called Smart Transfer which consolidates secure email, file transfers, mobile communications, and cloud data protection all in a single on premise solution.

Spending on cloud computing infrastructure and platforms will grow at a 30% CAGR from 2013 through 2018, six times more growth than overall IT spending according to a Goldman Sachs  study published earlier. Although cloud services are becoming very common, so are the concerns about data loss and leakage.

Safe –T Box 6.0’s Secure Cloud Access Broker tracks all cloud file transfer activities, provides automated security policy enforcement on all cloud exchanged traffic, and encrypts shared files with password access.  Integrating with leading consumer cloud storage and SaaS solutions, the Secure Cloud Access Broker ensures compliance with a variety of healthcare and financial regulations including HIPAA, PCI-DSS, FISMA, and GLBA.

The Secure Cloud Access Broker differs from other security cloud solutions because it includes an extra level of protection by performing data leak prevention (DLP) before data leaves premises rather than in the cloud, by scanning downloaded files using anti-virus solutions, and by preventing automatic data synchronization to and from the cloud, which is often the source of attacks.  In addition, the Secure Cloud Access Broker protects sensitive data without negatively impacting network performance.

“With the addition of the Secure Cloud Access Broker, Safe-T Box enables our customers to consolidate all of their data exchange patterns in a unified solution, eliminating the need to invest time and money on multiple solutions from multiple vendors”, said Amir Mizhar, Chief Software Officer and Founder with Safe-T.  “In addition to the improved usability and lower operational costs, using a uniform method to secure data exchanges reduces the risk that a security breach will go undetected.”

“We chose Safe-T Box as our secure data exchange solution since we were able to utilize it for multiple needs, such as secure email and secure collaboration”, said Dor Laniado, ECI Chief Information Security Officer at ECI Telecom. “As part of ECI Telecom’s cloud strategy, we plan on using Safe-T Box for secure cloud access.”

Safe-T was recently named Cool Vendor in Gartner’s report  ‘Cool Vendors in Mobile and Wireless, 2015’ published April 10, 2015, for being innovative, intriguing and impactful.

About Safe-T

Safe-T Data is a provider of date security solutions for a wide range of industries, including: financial, healthcare and manufacturing organizations.

Safe-T Data’s Safe-T Box is a Secure Data Exchange Broker solution, which enables organizations enables organizations to broker, control and secure data exchange of any type and size between people, applications, cloud solutions, and businesses. It is designed to rapidly add security and control across a wide variety of data exchange Patterns for enterprises of all types including to and from the Cloud.

Safe-T’s RSAccess Secure Data Access solution is disruptive and breakthrough secure reverse-access solution that is designed to overcome the challenges of today’s DMZ networks and network segmentation, prevent criminal application access, application hacking, and protect classified networks within the enterprise infrastructure. Safe-T Data’s secure front-end solution eliminates the need to store sensitive data in the DMZ, thereby reducing exposure to data breaches.

Subscribe
Notify of
guest
0 Expert Comments
Inline Feedbacks
View all comments

Recent Posts

0
Would love your thoughts, please comment.x
()
x