CloudMask - Your Data Last Line of Defence

  1. This crisp, one minute video shows how your data appears to a hacker and to an authorized user after it is protected by CloudMask. Three real world examples are given - Gmail, Box and Salesforce.com. In each case, the demo shows views of the applications to a hacker and to an authorized user.
    With CloudMask's Data protection under breach, infrastructure breaches no longer mean data breaches. Insecure clouds and mobile devices no longer mean insecure enterprise data. And an insider with access to applications and systems can no longer see data.
    Sign up now for your 30 days free account, and experience the CloudMask advantage! cloudmask.com

    # vimeo.com/113180997 Uploaded
  2. CloudMask is a Software as a Service (SaaS) solution. Using patent-pending methods, CloudMask, running on user devices, transparently intercepts and analyses data to identify and encrypt private information. The intercepted data may belong to a variety of applications, such as Google Photos, SalesForce, Box, and MS Office 365.

    In doing so, the application receives meaningless tokens, instead of the original private data, which do not break the application functionality. Accordingly, the security methods are performed transparently, without requiring any changes to existing Applications.

    As a result, CloudMask protects against unauthorized disclosure and vendor misuse of the data.
    Also, these techniques also apply to on-premise applications, and accordingly allowing CloudMask to mitigate insider threats by utilizing user-owned keys (asymmetric key pair). Keys that are never shared or transmitted over the network. Only users/systems explicitly authorized by the data owner may use their personal keys to restore tokens back to their meaningful data.

    # vimeo.com/91822055 Uploaded
  3. This short animated video has a small business owner (Jo) sharing his fears about data security in the cloud. He is worried that data could be hacked or that government could access his data without his approval. The threat from malicious insiders is ever present as well. Jo speaks of how he came to know of CloudMask in a major security conference and how it protects sensitive company data using military grade encryption. Authorized users can access their data anywhere on any device while unauthorized users see meaningless jumbles even if they get full access. Company security policies are implemented uniformly across all applications and real data is stored safely while only masked data is ever stored in the cloud. CloudMask can be set up rapidly and no hardware needs to be purchased at all.
    With CloudMask's Data protection under breach, infrastructure breaches no longer mean data breaches. Insecure clouds and mobile devices no longer mean insecure enterprise data. And an insider with access to applications and systems can no longer see data.
    Sign up now for your 30 days free account, and experience the CloudMask advantage! cloudmask.com/get-cloudmask

    # vimeo.com/97029541 Uploaded
  4. This video demonstrates the use of CloudMask to secure two popular and mission critical applications - Gmail and Salesforce.com.
    Two users are created and CloudMask is set up to protect both their accounts. Thereafter, user 1 sends an encrypted email to user 2. The demo shows how easy it is for user 1 to send the encrypted email and add an attachment to it. Both users do not have to take any extra steps to correspond securely. The demo also shows that if the email of user 2 is compromised and an attacker logs into his account from a different browser he only sees encrypted fields and no useful data. A similar demonstration is shown for a Salesforce.com page. Authorized users can read every field, unauthorized users see gibberish.
    With CloudMask's Data protection under breach, infrastructure breaches no longer mean data breaches. Insecure clouds and mobile devices no longer mean insecure enterprise data. And an insider with access to applications and systems can no longer see data.
    Sign up now for your 30 days free account, and experience the CloudMask advantage!
    cloudmask.com/get-cloudmask

    # vimeo.com/100769877 Uploaded
  5. This video describes the basic CloudMask solution and how it protects your data even if an attacker were to have complete access to your cloud storage. It explains how CloudMask provides a strong, simple and economical solution for everyone to give data privacy everywhere. After a general introduction, it goes on to demonstrate how CloudMask protects your Gmail account and lets you share encrypted mail with members of your secure group.
    With CloudMask's Data protection under breach, infrastructure breaches no longer mean data breaches. Insecure clouds and mobile devices no longer mean insecure enterprise data. And an insider with access to applications and systems can no longer see data.
    Sign up now for your 30 days free account, and experience the CloudMask advantage! cloudmask.com

    # vimeo.com/81970208 Uploaded

CloudMask - Your Data Last Line of Defence

CloudMask PRO

CloudMask provides Data protection during breach, it is your last line of defence when hackers break through all your other layer of defence. CloudMask provides strong, simple, economical solution that helps organizations, and individuals, to achieve


+ More

CloudMask provides Data protection during breach, it is your last line of defence when hackers break through all your other layer of defence. CloudMask provides strong, simple, economical solution that helps organizations, and individuals, to achieve security, privacy, protection, sovereignty/Jurisdiction, and Compliance. The data protection starts from the point of creation and protects the data while in-transit, in processing and in-storage. CloudMask solution is service provider, application and device neutral.

Browse This Channel

Shout Box

Channels are a simple, beautiful way to showcase and watch videos. Browse more Channels.