Futurex and Google enable client-side Google Workspace encryption
Full-spectrum key management solution allows customer-controlled import and export of cryptographic keys
According to Google, client-side encryption renders customer data unreadable, boosting security. A user’s organization retains sole ownership and control over the cryptographic keys employed to encrypt files and documents on Google Workspace.
With Futurex's key management solution supporting Drive, Docs, Sheets, and Slides, enterprise users of Google Workspace can now enjoy unparalleled control over sensitive data, right from their browsers.
FIPS 140-2 Level 3-compliant, Futurex's key management enterprise server (KMES) series 3 is an all-in-one platform featuring symmetric key lifecycle management capabilities, code signing, data protection, and vaultless tokenization. Supported key types and protocols include DES, Triple DES, DUKPT, X.509, AES, RSA, and EMVCo.
Users can also leverage Futurex's VirtuCrypt cloud service to track and report suspicious activity. Aside from meeting SSAE (SOC 1, 2, and 3) standards, TIA-942 Tier 4, and HIPAA compliance, VirtuCrypt data centers support dual control environments backed by multi-tiered identity verification systems. In addition, integrated hardware security modules (HSMs) from Futurex simplify installation, eliminating the need for third-party services.
Commenting on its solution, Futurex said it only provides client-side encryption but also supports enterprise-wide data protection through public key infrastructure (PKI), certificate authority (CA), cryptographic key lifecycle management, and integration with third-party applications.
The complete guide to building a security awareness programme that works
How security leaders can drive real behaviour changeDownload now
"Google Workspace client-side encryption advancement marks an exciting time for encryption innovation," said Ryan Smith, vice president of global business development at Futurex.
"Our robust FIPS 140-2 Level 3-validated HSMs not only handle all the key management on the client side — making it easier for organizations to manage their cryptographic keys and retain better control of their data security — but deliver data protection across the enterprise."
Seven steps to connect and empower your frontline workers
How business leaders can improve communication with a secure platformFree download
Create what’s next
The future of collaboration and productivityFree Download
Leveraging the cloud without relinquishing control
Your data. Their cloud.Free download
Re-architecting for nonstop innovation
Unlocking productivity, scalability, and lower costs for cloud nativesFree Download