KuppingerCole Report
Executive View
By Mike Small

Vaultive Cloud Data Security Platform

The data held in office productivity suites like Office 365 spans the whole operation of an organization from the board to the shop floor. This makes it imperative that it is protected against risks of leakage and unauthorized disclosure. Vaultive cloud data security provides an important solution for organizations seeking an approach for encrypting and otherwise protecting data in Office 365 that can then be extended to other software-as-a-service (SaaS) applications.
By
sm@kuppingercole.com

1 Introduction

The easy availability of cloud services together with the revolution in the range of devices that are used to access these services has created challe ...

Login Free 30-day Select Access Get full Access

2 Product Description

Vaultive is a privately held US company which was founded in 2009 and is funded by Venture Capital. The company is headquartered in Boston with resea ...

Login Free 30-day Select Access Get full Access

2.1 Office 365 Encryption

The Vaultive CDP encrypts data in transit, data at rest, and data in use by the Exchange Online application in the cloud. It ensures the cloud custom ...

Vaultive CDP operates as a stateless network level proxy that encrypts and decrypts messages as they flow through the network. This means that no mes ...

Login Free 30-day Select Access Get full Access

2.1.1 Email Traffic Flow

The Vaultive CDP has minimal impact on existing email flow. The customer’s Mail Exchange (MX) record directs incoming emails to their front-end serv ...

Login Free 30-day Select Access Get full Access

2.1.2 Mobile Device Support

Data encrypted by the Vaultive CDP is supported on mobile devices including iPhone, Android and tablets providing access to Office 365 in a way that i ...

Login Free 30-day Select Access Get full Access

2.1.3 Encrypted and Signed emails

Many organizations use Pretty Good Privacy (PGP) or Secure/Multipurpose Internet Mail Extensions (S/MIME) to exchange digitally signed and encrypted e ...

Login Free 30-day Select Access Get full Access

2.1.4 Encryption Used

Vaultive uses standard 256 bit AES encryption and the appliance is currently undergoing FIPS 140-2 validation. This encryption technology is enhanced ...

Login Free 30-day Select Access Get full Access

2.1.5 Key Location

The encryption keys can be stored within the Vaultive appliance or within a Hardware Security Module (HSM) device if the customer requires. This mean ...

Login Free 30-day Select Access Get full Access

2.1.6 Key Management

Key management is a critical element to maintain the security of the encrypted data. The keys need to be secured against loss or theft while, at the ...

Login Free 30-day Select Access Get full Access

2.1.7 Extensibility to Other SaaS Applications

Office 365 is often the first strategic SaaS application that many organizations adopt, but most would like a CASB platform that is extensible to cove ...

Login Free 30-day Select Access Get full Access

3 Strengths and Challenges

KuppingerCole recommends that organizations encrypt their data held in cloud services. The data held in office productivity suites like Office 365 sp ...

Login Free 30-day Select Access Get full Access

Copyright

©2020 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top