Google Gives Customers Control of Encryption Keys

StorageReview-Google-CloudPlatform.jpg

Encryption Keys for Google Compute Engine, gives users the ability to bring-their-own-keys to encrypt compute resources. This brings the best of both worlds, as it provides users the power and flexibility of public cloud all the while giving users desired control over data security.

Google launched “bring your own encryption” keys for use on its Cloud Platform. The move is an effort to provide users of its cloud services with more control of their data security.
Google already encrypts all of the data stored on its cloud platform, but it also controls the encryption keys to access that data. Google holds both the lock and key. Using your own encryption keys is the only way to have complete control over who’s looking at your data.
Giving its cloud customers their own keys would give them more control of their security and close a feature gap with Amazon and Box and, potentially, attract more customers. Google is a relatively minor player in the public cloud business, trailing Amazon and Microsoft, and needs to make more effort to increase its dominance. 
Though users will have greater control, they should keep in mind what that means: If a customer loses the encryption keys, it’s game over — Google says it can’t help you access the lost keys or encrypted data.
The new service is free to Google cloud users and still in beta. Google invites feedback on its forums.
Forbes:http://http://onforb.es/1fDygx1

« Identity Access Management: Lessons From JPMorgan’s Insider Breaches
For Ransom, Bitcoin Replaces the Bag of Bills »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

L J Kushner & Associates

L J Kushner & Associates

L.J. Kushner is a leading Information Security recruiting firm.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

NTT Group

NTT Group

NTT offers agile, scalable technology services to bring it all together seamlessly, securely, and sustainably. We help you adopt a holistic security approach across your network, clouds, applications.

Appsian Security

Appsian Security

Appsian provides powerful solutions that help organizations take control of their business critical data and financial transactions.

mxHERO

mxHERO

mxHERO reduces the risks inherent with ransom and cyber-security threats specific to email.

Orpheus Cyber

Orpheus Cyber

Orpheus Cyber provides predictive and actionable intelligence to our clients - enabling them to anticipate, prepare for and respond to the cyber threats they face.

Aegis Cyber Defense Systems

Aegis Cyber Defense Systems

AEGIS is a powerful cybersecurity tool that can help protect your devices and networks from cyber threats, and increase performance.

CyberForce Global

CyberForce Global

CyberForce Global are at the forefront of start-up technology recruitment in areas including cybersecurity, IT infrastructure, software, fintech, blockchain and more.

Office of Cyber Security and Information Assurance (OCSIA) - Isle of Man

Office of Cyber Security and Information Assurance (OCSIA) - Isle of Man

OCSIA acts as the focal point in developing the Isle of Man’s cyber resilience, working in partnership with private and third sector organisations across the Island alongside the wider population.

Scytale

Scytale

Scytale is the global leader in security compliance automation, helping companies get compliant and stay compliant.