Protecting Your Data in Your Cloud with the Baffle Data Privacy Cloud

As organizations continue to build out their cloud-based data lakes and analytics environments, there’s a huge push to implement data privacy and de-identification methods for their data. At Baffle, we’ve always held the belief that customers should control their keys and their data, which is why it has been a bit of a shock to see SaaS solutions emerge where providers are holding a company’s most sensitive data.

The notion of giving your most sensitive data to a trusted third party seems fraught with security challenges and potentially bordering on insanity.

That’s why we’re pleased to announce Baffle’s Data Privacy Cloud. Our solution gives control to your organization to protect your data with your keys in your own private cloud. The Data Privacy Cloud offers you the ability to establish a data protection service for your organization for any data store and for any application. The solution also supports operations on encrypted data to provide secure computation.

The deployment architecture is depicted below where serverless Amazon Lambda functions are instantiated to perform encrypt, decrypt, and computation operations on encrypted data. The serverless functions interoperate with key management stores to support BYOK / HYOK via Baffle’s key virtualization layer.

Below is a video of the Baffle Data rivacy Cloud working in conjunction with Amazon Redshift. The integration was developed with guidance from the Amazon Redshift team.

You can learn more about our capabilities with the following links:

 

The post Protecting Your Data in Your Cloud with the Baffle Data Privacy Cloud appeared first on Baffle.

*** This is a Security Bloggers Network syndicated blog from Baffle authored by Harold Byun, VP Products. Read the original post at: https://baffle.io/blog/protecting-your-data-in-your-cloud/

Tags: CloudPrivacy

Recent Posts

Understanding Cybersecurity Vulnerabilities

What is a cybersecurity vulnerability, how do they happen, and what can organizations do to avoid falling victim? Among the…

3 hours ago

Bridging the Gap: Uniting Development and AppSec

We recently hosted a webinar on integrating development and security functions to increase organizational resilience. Industry leaders from Repsol, SAP,…

4 hours ago

USENIX Security ’23 – Union Under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain

Authors/Presenters: Xueqiang Wang, Yifan Zhang, XiaoFeng Wang, Yan Jia, Luyi Xing Many thanks to USENIX for publishing their outstanding USENIX…

5 hours ago

Agile by Design: Cybersecurity at the Heart of Transformation

Unlock the dynamic interplay between cybersecurity and agility in today’s business landscape. Explore how organizations can fortify their defenses, foster…

7 hours ago

Cybersecurity Insights with Contrast CISO David Lindner | 4/26/24

Insight #1 AI is clearly becoming a problem, with headlines capturing incidents such as a deepfake audio impersonating a Chief…

7 hours ago

Segregation of Duties Remediation in Oracle ERP Cloud

Segregation of Duties in Oracle ERP Cloud: A Comprehensive Guide to RemediationControlling Risk: An Approach to Automating the Management ofSegregation…

7 hours ago