When it comes to enterprise, IT compliance has been and always will be a headache to one degree or another. The issue in the cloud computing era is that end users can now store almost any type of file anywhere. The good news is that most of those places are a service that exposes an API.
Looking to leverage all those APIs, Sookasa today formally introduced a service that encrypts files regardless of where they are stored. Sookasa CEO Asaf Cidon says Sookasa Compliance as a Service provides a file system that encrypts data whether it resides inside the enterprise, on a mobile computing device or in the cloud.
Whether it’s complying with Healthcare Insurance Portability and Accountability Act (HIPAA) or Family Education Rights and Privacy Act (FERPA) regulations, Cidon says the fact that the files are encrypted means most organizations are going to easily comply with just about any regulation. The Sookasa Compliance Service itself runs on Amazon Web Services (AWS). The real challenge developing the system was not so much using RESTful APIs to read data but to actually write data across those APIs, says Cidon.
Image Credit: Sookasa
By encrypting files wherever they are, Cidon says Sookasa is essentially defusing a ticking time bomb that exists in most organizations. End users now routinely make use of shadow IT services in the cloud to access and share files. The vast majority of that data is not encrypted, which not only means that data can be stolen these days by what seems like almost anyone, but if discovered by regulators it could wind up resulting in millions of dollars in fines being levied against the organization.
Companies of all sizes today dedicate a significant amount of resources to managing all aspect of compliance. At the same time, many of those organizations have been reluctant to embrace encryption because of the overhead associated with processing encrypted files and the complexity associated with tracking the keys needed to unlock encrypted files. Cidon, however, says modern processors have embedded capabilities to process encrypted files and that the cloud provides a mechanism for essentially outsourcing the management of encryption to a file system that is delivered as a service.
Whether IT organizations that today spend an inordinate amount of time and money trying to comply with regulations will take to a cloud service to manage that process remains to be seen. But given the risk that most organizations are now exposed to via the cloud it’s hard to see how any other approach is going to be nearly as effective.