Risk
3/7/2014
03:16 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

CloudLock Announces Compliance For Google+

CloudLock customers can now leverage one social networks while applying security and compliance policies to protect data

SAN FRANCISCO, CA - GOOGLE PARTNER SUMMIT 2014 - CloudLock, the cloud security pioneer and the world's leading cloud data security company is announcing the availability of CloudLock Compliance for Google+ at the Google Partner Summit 2014. The announcement represents the industry's first and only PCI/PII compliance solution for the business transforming social network.

CloudLock's Google+ auditing solution extends CloudLock's robust security suite by providing customers with the visibility, and control they need to implement their social network usage and compliance policies (such as PII, PCI, HIPAA, SOX, more) in place. CloudLock's compliance solution for Google Drive was an industry first, and more than two years and billions of object scans later, remains the only pure-cloud solution to enforcing complex compliance requirements on cloud data without disruption and at infinite scale. The combined CloudLock and Google offering is the most advanced feature rich and widely adopted enterprise social network, with a security and compliance solution that far surpass any competitive or existing offering.

"I couldn't think of a more fitting audience than our close friends and partners in the Google Apps ecosystem to be announcing CloudLock Compliance for Google+. We all share a tremendous passion for making customers successful by transforming the way technology enables their business," said Gil Zimmermann, CloudLock CEO and co-founder. "Working with the Google Enterprise team and the amazing resellers and systems integrators in this audience, has allowed CloudLock to transform the way security has traditionally been perceived and implemented in the past, with a cloud approach that turns security into an enabler of cloud adoption and business transformation. The attendees of the Google Partner Summit are trusted advisors who enable customers to rethink their transformation barriers, and empower their users and business to be more productive, collaborative, mobile, social, and more secure, than they've ever been before."

CloudLock's enterprise-class, content-aware, security and compliance solutions have already been adopted by hundreds of enterprises that have adopted Google Apps, covering millions of end-users in a manner that is not disruptive to their work. CloudLock is seeing accelerated cloud adoption as more and more enterprises seek to adopt cloud and SaaS offerings as a critical part of their businesses backbone, and require that their security and compliance policies extend to those components as well.

Leading industry Analysts such as Forrester Research are helping customers navigate their paths to the cloud and recently addressed the topic of utilizing cloud tools to maximize collaboration and productivity, while maintaining a secure environment. Forrester Research, Inc.'s January, 2014 report, Best Practices for Optimizing Your Migration to a Cloud Collaboration Solution, included the following statement: "...we see Google customers using emerging cloud services that integrate with Google Apps, such as CloudLock, to manage and secure their Google implementation."

"Being part of the Google Apps Enterprise Ecosystem, allows us to partner with the largest, best resellers and System Integrators in the world. Together, we've enabled hundreds of organizations, representing tens of millions of dollars in mutual subscription revenues, to accelerate their cloud adoption strategies while improving security controls and compliance adherence" said Andrew Davidson, director of channels. "The Google Enterprise Partner Summit brings together hundreds of resellers and ISVs from all over the world, and is a testimonial to how rapidly the global ecosystem is maturing."

Today's announcement, is fresh on the heels of several recent CloudLock announcements, including last weeks introduction of the industry's first pure-cloud CloudLock Selective Encryption&trade solution, last month's announcement of CloudLock's closing of a $16.5M C round led by leading VC Bessemer Venture Partners to meet accelerated growth demands, and last Novembers announcement of CloudLock for Salesforce.

Organizations interested in Google+ auditing, security, and compliance capabilities through CloudLock Compliance for Google+ can contact sign up here: CloudLock Compliance for Google+

Additional Resources

· Customer Stories & Case Studies

· CloudLock Selective Encryption

· Cloud Security Simplified

About CloudLock

CloudLock is the cloud data security company. Its information security applications enable organizations to enforce regulatory, operational, and security compliance in public cloud platforms. The largest organizations in the world trust CloudLock to secure their data in the cloud, increase collaboration, and reduce their risk. Since its launch in 2011, CloudLock has grown to more than 600 paying customers, protecting millions of end-users in those enterprises. Additionally, CloudLock has built out a world-class reseller and partner network, allowing cloud services pioneers to enable organizations to embrace the cloud and transform their security and business in the process. For more information about the company or reseller opportunities visit cloudlock.com or follow CloudLock on Twitter @CloudLock.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2886
Published: 2014-09-18
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during ins...

CVE-2014-4352
Published: 2014-09-18
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.

CVE-2014-4353
Published: 2014-09-18
Race condition in iMessage in Apple iOS before 8 allows attackers to obtain sensitive information by leveraging the presence of an attachment after the deletion of its parent (1) iMessage or (2) MMS.

CVE-2014-4354
Published: 2014-09-18
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.

CVE-2014-4356
Published: 2014-09-18
Apple iOS before 8 does not follow the intended configuration setting for text-message preview on the lock screen, which allows physically proximate attackers to obtain sensitive information by reading this screen.

Best of the Web
Dark Reading Radio