CipherPoint Enables Compliance, Secures Content In SharePointCipherPoint Enables Compliance, Secures Content In SharePoint
CipherPoint Enterprise is a transparent content encryption software solution for SharePoint
October 22, 2010

PRESS RELEASE
October 18, 2010, Austin, TX: CipherPoint Software announced today the immediate availability of two products which bring enterprise-class content security to customers using Microsoft SharePoint.
CipherPointSP Enterprise is a transparent content encryption software solution for SharePoint. CipherPointKM is a central security console providing advanced key management and administration capabilities for multiple SharePoint servers running CipherPointSP Enterprise.
The CipherPoint solution is the first enterprise-class content security solution for SharePoint. CipherPoint Software’s approach delivers transparent encryption for sensitive and confidential content, with no client software required, and no user interaction required. CipherPoint Software’s products enable compliance with multiple regulations (including PCI DSS, GLBA, HIPAA, and state data privacy laws) requiring encryption of sensitive and confidential information. The products provide an effective solution to protect against the insider threat within any SharePoint environment while enforcing separation of duties and need to know among business users, information security personnel, and the various SharePoint administrators.
“CipherPointSP Enterprise and CipherPointKM deliver truly transparent, serverside content encryption, and they address a serious and previously unsolved security problem for SharePoint, the insider threat," said Dave Conder, CTO, BlueModus, a Microsoft Gold SharePoint partner.
Users of SharePoint interested in learning more about the CipherPoint solution should visit CipherPoint’s website at: http://www.cipherpointsoftware.com.
Free downloads of trial versions of the software are available from the website:
http://www.cipherpointsoftware.com/resources--downloads.html
You May Also Like
Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025Shift Left: Integrating Security into the Software Development Lifecycle
Mar 5, 2025