Cryptzone Joins Cloud Security Alliance

Cryptzone, a provider of dynamic, context-aware network, application and content security solutions, has joined the Cloud Security Alliance (CSA), a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within cloud computing.

cryptzone-cloud-security“Cryptzone offers a unique, comprehensive approach to securing data across both on-premises and cloud-based networks – a model that is very typical of what we see end-users leveraging today,” said Jim Reavis, CEO of the Cloud Security Alliance. “We look forward to their contributions to our Software Defined Perimeter (SDP) research, among other things, as we continue on CSA’s mission to promote secure computing, both in and by leveraging the cloud.” 

Cryptzone’s portfolio of solutions includes:

  • AppGate – a dynamic, context aware security gateway that prevents unauthorized access.
  • HiSoftware Security Sheriff – an integrated classification, encryption and content protection solution for SharePoint, Office 365 and File Shares.
  • Simple Encryption Platform – which secures data in email, removable storage, files and folders.
  • Compliance Sheriff – which provides content governance for public websites, intranets and extranets.

“Sophisticated cyberattacks are forcing enterprises to dramatically shift their thinking on how they secure their most valuable data and assets,” said Kurt A. Mueffelmann, President and CEO of Cryptzone. “The CSA has been at the forefront of research, not only to secure cloud computing, but to leverage the cloud to secure your entire compute infrastructure. We look forward to working with the CSA to further this research, and educate enterprises on how they can leverage best practices and proven models to improve their security posture now and for the future.”

The Cloud Security Alliance is dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA’s mission also includes education on the uses of cloud computing to help secure all other forms of computing.