ncrypted Cloud emerges from stealth mode with free data encryption offering



Similar documents
SOOKASA WHITEPAPER SECURITY SOOKASA.COM

Cloud Computing for Education Workshop

Thinking outside the (Drop)box: PKWARE targets enterprise file-share encryption

Manual for Android 1.5

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.

2013 USER GROUP CONFERENCE

Performance Analysis of Client Side Encryption Tools

Cloud Web Portal User Guide Version 2.0

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

How To Connect Your Cloud

USER MANUAL. v Windows Client January

IONU PRO Product Overview

Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices

Cloudifile Getting Started

Mac OS X User Manual Version 2.0

Egnyte Cloud File Server. White Paper

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

Mobile App User's Guide

Flexible Identity Federation

Novell Filr 1.0.x Mobile App Quick Start

Country Club Bank- Mobile Banking FAQs

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

activecho Frequently Asked Questions

OneDrive for Business

Virtustream acquires ViewTrust to build out its risk management capabilities

AkrutoSync 4.0 User Guide

Utilizing Dropbox to Share Files

Access Your Cisco Smart Storage Remotely Via WebDAV

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

Using the Apple Configurator and MaaS3360

Access the TCNJ Palo Alto Networks VPN using the GlobalProtect VPN client

eztechdirect Backup Service Features

Store & Share Quick Start

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

Enterprise Private Cloud Storage

1. Scope of Service. 1.1 About Boxcryptor Classic

Using the Jive for ios App

SECURITY OF CLOUD STORAGE AND CLOUD COMPUTING

activecho Driving Secure Enterprise File Sharing and Syncing

Shafiq Khan. An Introduction to. Cloud Computing 13/12/2012

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

Welcome to Sookasa. Getting Started Guide for SafeMonk users

Click below for details about which Operating Systems work with UMT Plus and UMT Audit :

FAQ Answers to frequently asked questions relating to the security, protection and redundancy of images stored in the Eclipse Data Center


Cloud Computing for Education Workshop

Cloudifile: Frequently Asked Questions

Answers to Your Frequently Asked Questions About the Microsoft Office365 Program for Pasadena City College Faculty and Staff

Storing & Synchronizing Data In The Cloud

Kony Mobile Application Management (MAM)

Storage Made Easy. Cloud File Server Overview

Gladinet Cloud Access Solution Simple, Secure Access to Online Storage

PolyU Connect. OneDrive for Business. User Guide

IDENTIFYING THE OPTIMAL MULTI- USER DOCUMENT SHARING PLATFORM

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

MOBILE BANKING. BL Mobile Banking access to your bank accounts on the move

Mobile App User's Guide

How To Use Egnyte

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

TELUS Business Connect Meeting User Guide. Video Conference. Web Share.

Mobile Banking and Mobile Xpress Deposit Frequently Asked Questions (FAQ s)

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

CHOOSING AN MDM PLATFORM

Welcome to ncrypted Cloud!

Using the owncloud Android App

ACCESSING MICROSOFT OFFICE 365 FREE STUDENT RESOURCES

Dictamus Manual. Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10.

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Android App User Guide

The Genealogy Cloud: Which Online Storage Program is Right For You Page , copyright High-Definition Genealogy. All rights reserved.

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Advanced Configuration Steps

Connection. to SECON-Server

Analyzing the Security Schemes of Various Cloud Storage Services

Copyright 2013, 3CX Ltd.

WatchDox Administrator's Guide. Application Version 3.7.5

For the latest information, check the product home page ( en/products/rack2_smart).

Research Information Security Guideline

Online Backup Solution Features

ReadyNAS OS 6.2. Reviewer s Guide

Cloud Computing. Chapter 6 Data Storage in the Cloud

Media Shuttle s Defense-in- Depth Security Strategy

How to Print Using the PrinterOn Hosted Service & FAQs

GoToMyPC reviewer s guide

Cloud Attached Storage 3.1 EA

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016

Digital Storage Options MAKING ROOM IN THE CLOUD

SSL Enforcer Documentation

Transcription:

ncrypted Cloud emerges from stealth mode with free data encryption offering Analyst: Agatha Poon 12 Mar, 2013 Having emerged from stealth mode in early February, cloud storage security startup ncrypted Cloud is aimed at addressing pertinent concerns over data security and privacy in third-party cloud storage environments. Building on its patent-pending technology, the company provides what it refers to as a 'virtual security layer' on top of cloud storage platforms while enabling users to encrypt/decrypt data with a few mouse clicks. At present, it provides individuals and corporate customers using Dropbox with a free download of a basic version. The goal is to extend platform support to include other cloud storage providers such as SkyDrive and Google Drive following the commercial availability of the two paid versions, Consumer Pro and Enterprise, which are expected to be available at the beginning of May. Technology and product Data encryption is done through 'personal key' generation. When a user encrypts the data, it will generate personal key on a per-file basis. The personal key is generated based on the email address provided by the user in registering for an encrypted Cloud account and the password used for the ncrypted Cloud account identity and stored within the ncrypted Cloud software installed on the user's PC. The company says it also generates a PKI key pair in which the public key is used to encrypt the key for the file with a personal recovery key. If the private key ever changes (due to a change in email address/password), users are still able to access their information with their personal recovery key. For the Enterprise version, multiple identities can be added. A recovery key is also created for enterprise users. If the user is no longer with the company and his or her access right to corporate data is revoked, the user can still access his or her own data. Copyright 2013 - The 451 Group 1

The key pair is stored within ncrypted Cloud's database and is protected with the user's personal key. Thus, the ncrypted Cloud server does not know or have access to it because it distributes the key pair to multiple devices. Given that the data is encrypted locally, the startup says the Key Store will be invalidated if a third-party user tries to log onto the PC by altering the original user's credential. At present, any sharing is based on first sharing in Dropbox for data delivery. The company says it is working on adding a Trusted Share option where users can simply share a file with a third party through a one-time usage URL. Upon the commercial availability of its paid versions (Consumer Pro and Enterprise), ncrypted Cloud will extend support for SkyDrive and Google Drive users. Advanced features such as a user-set timer for simple URL sharing and folder sharing between different storage providers will be available in future iterations as well. In addition to a Consumer Basic version, which is now available for free download, ncrypted Cloud will make available two paid versions Consumer Pro and Enterprise with audit details and centralized control of corporate data, respectively. While both paid versions are now in beta, the Enterprise version is available for up to six business organizations. As the commercial versions expected to be available in early May come online, pricing will be on a per-user/month basis. And the Free Consumer version will always be available as a way to drive collaboration. Target segment Targeting consumers and enterprises, ncrypted Cloud focuses on simplicity without compromising control. Users can select from multiple policies by right clicking on any files or top-level folders. For the secure sharing feature, however, the self-service feature is applicable only when users select folders, not individual files. Both consumers and enterprise users are able to access files/folders from mobile devices running on ios and Android mobile platforms. The company is working with four enterprise customers, which have already tested the consumer product, to test out the enterprise functionality later this month. Beta companies come from multiple vertical segments, including a top 10 ranked university in London (14,000 students and faculty), a Fortune 500 insurance and health care provider (40,000 employees), a federal law enforcement organization (50,000 staff), and a global science and manufacturer (58,000 employees). Business model The company claims to have several hundred free downloads since February and is working closely Copyright 2013 - The 451 Group 2

with its four beta customers to put the Enterprise version through its paces. It has been leveraging all social media outlets to engage potential customers and is identifying beta customers for the Enterprise edition through targeted media. NCrypted Cloud is looking to develop strategic partnerships with cloud storage providers as part of the go-to-market strategy, but it's still early days. Founded in July 2012 by the former president and founder of Verdasys, Nicholas Stamos (CEO), and former distinguished software engineer of Verdasys, Igor Odnovorov (CTO), ncrypted Cloud's vision is to facilitate collaboration among consumers and enterprise users through information sharing. It raised an angel round of funding in late 2012 of more than $2.25m that will be used to bring the commercial editions to market. The company has a team of 16 employees, including a dozen full-time employees. It is potentially looking to raise further funding from strategic investors, possibly in the second half of this year. Competition The idea of building a security layer on top of cloud storage services is not foreign to industry players and ncrypted Cloud is not the only game in town. Companies like Sookasa and Secomba (BoxCryptor) have similar offerings, although technology implementation is quite different. Sookasa seems to focus its efforts on exploiting opportunities in the enterprise market. In the case of BoxCryptor, users must create and keep their own passwords and data will be lost if users fail to retrieve their own passwords. NCrypted Cloud is likely to be compared with Vivo, created and owned by PKWARE, in the data encryption arena. Cloudfogger also provides a freemium model to boost uptake. BoxProtect, in its current version, provides data encryption only for Dropbox users running on Mac OS X or using an iphone or ipod Touch and is looking to extend support for additional cloud storage providers. On the service provider side, cloud storage providers such as Amazon, Mozy, Nirvanix and Rackspace have invested considerably in hardening their offerings. Amazon, for example, claims to have each object encrypted with a unique key using the server side encryption feature. Nirvanix secures data transfers by providing AES 256-bit encryption and SSL options. That being said, users are less likely to get the level of self-service capability to define and implement security policies. The 451 Take Despite the growing availability of competitive offerings, ncrypted Cloud has done a good job Copyright 2013 - The 451 Group 3

in striking a balance between security and control. With a simple to use interface, users, for the first time, are able to define their own privacy settings and make security policies. This is likely to become the norm in the era of self-service. While Dropbox has a good representation in the cloud storage market, the ability to maintaining vendor neutrality is as important as delivering its performance claims moving forward. Copyright 2013 - The 451 Group 4

Reproduced by permission of The 451 Group; 2013. This report was originally published within 451 Research s Daily T1R. For additional information on 451 Research or to apply for trial access, go to: www.451research.com Copyright 2013 - The 451 Group 5