Box Giving Customers Control Over Encryption KeysBox Giving Customers Control Over Encryption Keys
Box says they've eliminated the last major barrier to cloud adoption, even in highly regulated organizations.
February 10, 2015

Box, a leading provider of cloud storage and collaboration services, today announced new technology they say will eliminate the final major barrier to cloud adoption. The new solution, Box Encryption Key Management (EKM), gives Box customers the ability to manage, create, and revoke their own encryption keys.
"EKM helps break into more heavily regulated areas," says Box's vice-president of enterprise product, Rand Wacker.
One of the major reasons organizations -- particularly those that are risk-averse or in highly regulated industries -- avoid cloud adoption is that, in the cloud, they share servers with strangers. Although each tenant has always been in its own virtual instance, segregated from other customers', some organizations were rightly wary.
If attackers could break out of one customer's virtual instance and access the cloud providers' hardware, they might break into all other virtual machines on that hardware, through the back door. And if an attacker broke into wherever a cloud service company stored all of its encryption keys, that would be even worse.
These things, among others, complicate matters for organizations that have to comply with privacy and security regulations.
EKM might end that particular quarrel, and give Box customers better single-tenant control. It gives customers the authority to manage their own hardware security module, create and revoke their own encryption keys, and maintain up-to-date logs.
Wacker says that Box was determined to provide better security without damaging the user experience. This led them to decide that they needed a solution bespoke to Box -- something built in, not bolted on.
Box has already partnered with Amazon and SafeNet to roll out EKM first. The technology is currently in beta, and will be generally available this spring.
About the Author(s)
You May Also Like
Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023What's In Your Cloud?
Nov 30, 2023