Skip to content

HIPAA Compliance in the Cloud

October 27, 2015
By StratoKey

The healthcare industry and the cloud. It sounds like a match made in heaven.Healthcare providers can instantly access a patient's medical history, contact information and insurance status from a range of different organizations via a smart, connected, cloud-based network to provide faster and more effective treatment. Plus, payment and insurance claims are made simpler and easier with all the relevant parties sharing data.Sounds perfect - a cost-effective, central application that enables all...

Cloud Access Security Broker Checklist

September 30, 2015
By StratoKey

Gartner coined the term Cloud Access Security Brokers (or CASB) a few years ago now, and placed it atop of their security technology trends of 2014. As defined by Gartner , CASB solutions are on-premises, or cloud-based security policy enforcement points, placed between consumers and cloud service providers that offer monitoring and control across multiple cloud services.

Salesforce Encryption - part 2

August 23, 2015
By StratoKey

In the first section of this two part post on implementing cloud data protection for Salesforce, we looked at identifying an appropriate cloud data protection solution, encrypting Salesforce data and how to lock end applications to the cloud data protection gateway. In this second part, we are looking at moving to the next level of cloud protection, threat identification, countermeasures and mitigation.

Continuing the 6 steps to securing your cloud application:

Legal Ramifications of Data Breaches

August 17, 2015
By StratoKey

In one of our previous posts, we discussed how organizations can protect themselves against a costly data breach and briefly touched upon some of the expenses companies incur once they have been breached.

With federal data breach notification laws now in effect across the US, and similar laws in place in most European countries, organizations who suffer a cyber-attack are legally required to report the breach, opening the door to negative publicity and a whole raft of associated costs.

Salesforce Encryption - part 1

June 30, 2015
By Anthony Scotney

It was disheartening to read that a Financial Services Regulator's guidelines around data sovereignty lead to the termination of a Salesforce® deployment by a large bank. This mandate at least in part resulted in the bank abandoning their $10 million Salesforce investment. The reason this is a disheartening result is because there are cloud data protection solutions (such as Salesforce encryption) that can alleviate much of the security concern that exists with cloud applications.

Data Breach Notification Laws Coming to Australia

May 10, 2015
By StratoKey

The Australian government last month announced that mandatory data breach notification laws will be brought in by the end of the year, meaning that an organization must notify its customers of any data breach that results in customer information being compromised.

Cloud Encryption Explained

April 20, 2015
By Anthony Scotney

Significant cost drivers have squarely placed the cloud in the sights of CIOs. Unfortunately, these drivers have often been stalled by a fear that the cloud is an exposed environment that is not only difficult to secure but also a regulatory nightmare. Fortunately, there are concrete mechanisms that can protect cloud applications against crippling data loss, leaks and breaches. Cloud data protection (also known as Cloud Encryption) is one such mechanism that forms the focus of this post.

How to Protect Against Costly Data Breaches

March 31, 2015
By StratoKey

Details matter when it comes to protecting confidential data against the numerous threats that stalk the connected world. It is this detail oriented approach that will ultimately matter when it comes to the crunch against an adversary. In our last article we discussed the adoption of the NIST cybersecurity framework. We are extending upon that article to give organizations some concrete reasoning behind serious security weaknesses and provide constructive solutions to the cloud application...

Have You Adopted the NIST Cybersecurity Framework?

February 26, 2015
By StratoKey

As someone in the business of security, you may have heard of the NIST Cybersecurity Framework, developed by the US Commerce Department''s National Institute of Standards and Technology (NIST). It was initiated by way of an Executive Order from US President Barack Obama in response to the government''s growing concern of over cybersecurity and the threat it poses to national and economic security.

Compliance Solutions for Pipedrive

February 12, 2015
By Sian Parany

Pipedrive has grown into a leading CRM solution, trusted by over 100,000 companies across 170+ countries for its intuitive design and powerful features. Its popularity extends to regulated industries like healthcare, manufacturing, and technology, where data security and compliance are critical. Recognizing the need for enhanced protection in these sectors, StratoKey introduced its Pipedrive integration to deliver advanced security and compliance capabilities. StratoKey's Cloud Data Protection...