Risk
3/7/2014
03:16 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

CloudLock Announces Compliance For Google+

CloudLock customers can now leverage one social networks while applying security and compliance policies to protect data

SAN FRANCISCO, CA - GOOGLE PARTNER SUMMIT 2014 - CloudLock, the cloud security pioneer and the world's leading cloud data security company is announcing the availability of CloudLock Compliance for Google+ at the Google Partner Summit 2014. The announcement represents the industry's first and only PCI/PII compliance solution for the business transforming social network.

CloudLock's Google+ auditing solution extends CloudLock's robust security suite by providing customers with the visibility, and control they need to implement their social network usage and compliance policies (such as PII, PCI, HIPAA, SOX, more) in place. CloudLock's compliance solution for Google Drive was an industry first, and more than two years and billions of object scans later, remains the only pure-cloud solution to enforcing complex compliance requirements on cloud data without disruption and at infinite scale. The combined CloudLock and Google offering is the most advanced feature rich and widely adopted enterprise social network, with a security and compliance solution that far surpass any competitive or existing offering.

"I couldn't think of a more fitting audience than our close friends and partners in the Google Apps ecosystem to be announcing CloudLock Compliance for Google+. We all share a tremendous passion for making customers successful by transforming the way technology enables their business," said Gil Zimmermann, CloudLock CEO and co-founder. "Working with the Google Enterprise team and the amazing resellers and systems integrators in this audience, has allowed CloudLock to transform the way security has traditionally been perceived and implemented in the past, with a cloud approach that turns security into an enabler of cloud adoption and business transformation. The attendees of the Google Partner Summit are trusted advisors who enable customers to rethink their transformation barriers, and empower their users and business to be more productive, collaborative, mobile, social, and more secure, than they've ever been before."

CloudLock's enterprise-class, content-aware, security and compliance solutions have already been adopted by hundreds of enterprises that have adopted Google Apps, covering millions of end-users in a manner that is not disruptive to their work. CloudLock is seeing accelerated cloud adoption as more and more enterprises seek to adopt cloud and SaaS offerings as a critical part of their businesses backbone, and require that their security and compliance policies extend to those components as well.

Leading industry Analysts such as Forrester Research are helping customers navigate their paths to the cloud and recently addressed the topic of utilizing cloud tools to maximize collaboration and productivity, while maintaining a secure environment. Forrester Research, Inc.'s January, 2014 report, Best Practices for Optimizing Your Migration to a Cloud Collaboration Solution, included the following statement: "...we see Google customers using emerging cloud services that integrate with Google Apps, such as CloudLock, to manage and secure their Google implementation."

"Being part of the Google Apps Enterprise Ecosystem, allows us to partner with the largest, best resellers and System Integrators in the world. Together, we've enabled hundreds of organizations, representing tens of millions of dollars in mutual subscription revenues, to accelerate their cloud adoption strategies while improving security controls and compliance adherence" said Andrew Davidson, director of channels. "The Google Enterprise Partner Summit brings together hundreds of resellers and ISVs from all over the world, and is a testimonial to how rapidly the global ecosystem is maturing."

Today's announcement, is fresh on the heels of several recent CloudLock announcements, including last weeks introduction of the industry's first pure-cloud CloudLock Selective Encryption&trade solution, last month's announcement of CloudLock's closing of a $16.5M C round led by leading VC Bessemer Venture Partners to meet accelerated growth demands, and last Novembers announcement of CloudLock for Salesforce.

Organizations interested in Google+ auditing, security, and compliance capabilities through CloudLock Compliance for Google+ can contact sign up here: CloudLock Compliance for Google+

Additional Resources

· Customer Stories & Case Studies

· CloudLock Selective Encryption

· Cloud Security Simplified

About CloudLock

CloudLock is the cloud data security company. Its information security applications enable organizations to enforce regulatory, operational, and security compliance in public cloud platforms. The largest organizations in the world trust CloudLock to secure their data in the cloud, increase collaboration, and reduce their risk. Since its launch in 2011, CloudLock has grown to more than 600 paying customers, protecting millions of end-users in those enterprises. Additionally, CloudLock has built out a world-class reseller and partner network, allowing cloud services pioneers to enable organizations to embrace the cloud and transform their security and business in the process. For more information about the company or reseller opportunities visit cloudlock.com or follow CloudLock on Twitter @CloudLock.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4594
Published: 2014-10-25
The Payment for Webform module 7.x-1.x before 7.x-1.5 for Drupal does not restrict access by anonymous users, which allows remote anonymous users to use the payment of other anonymous users when submitting a form that requires payment.

CVE-2014-0476
Published: 2014-10-25
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

CVE-2014-1927
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928....

CVE-2014-1928
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulner...

CVE-2014-1929
Published: 2014-10-25
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.