February 13, 2020

-
min read

Cloud Data Encryption

Encrypt your data in the cloud and keep the keys to assure security and compliance.

Lookout Searchable Strong Encryption (SSE) – FIPS 140-2 validated – delivers the benefits of the cloud, while assuring security and compliance for your most sensitive information. Lookout cloud encryption solutions make it easy to protect any type of data with standards-based encryption that only you can unlock – because no one else can access your encryption keys. And  Lookout does this without disabling your applications – maintaining business-critical functions while keeping your data fully protected.

Advanced Cloud Encryption Security

Lookout cloud encryption gateway uses AES 256-bit encryption, FIPS 140-2 validated, and featuring  the highest commercially available level of encryption. AES (Advanced Encryption Standard) was established by the U.S. National Institute of Standards and Technology (NIST) and is widely deployed by government and private organizations globally. AES is a symmetric-key algorithm, using the same key is used for both encrypting and decrypting the data, providing high performance and scalability.

Cloud Encryption Solutions that Preserve Search Functions

Lookout encryption solutions are unique in delivering the highest levels of security, while preserving the functionality of encrypted data and the user experience. Patented SSE technology provides secure virtual indexing at the cloud encryption gateway while sending the strongly encrypted data to the cloud. This unique solution enables natural language searches, wild cards, Boolean phrases and support for flexible search terms, such as “starts with” or “ends with,” compatible with today’s Internet search conventions.

FIPS Validation

Lookout is the first and only cloud data protection vendor to have achieved FIPS 140-2 validation for its cryptographic module.  Lookout was granted certificate #2261 in October 2014 after completing a lengthy and rigorous testing and validation process.

Encryption in the Cloud Possible with Granular, Field-Level Control

Lookout lets you control security precisely on a per-field basis. With the widest range of encryption options, you can set the level of security and search-ability for each data type, supporting both structured and unstructured fields. Specialized encryption options support dates, phone numbers, decimal numbers, timestamps, email addresses, credit cards and social security numbers.

High Performance Architecture

Lookout encryption gateways are deployed in many of the world’s largest enterprises. Highly scalable, these encryption gateways deliver high-throughput with extremely low latency. A high-performance stateless architecture requires no local database, making it practical to encrypt any amount of data.

Cloud Encryption Solutions That Preserve Format and Function

Many database fields require that the format and structure of the data remain intact while encrypted. For example, a field for credit card numbers expects a 16-digit numeric number, not a longer string of random characters.  Lookout makes it possible to preserve the length and format of your data while maintaining the highest possible levels of security.  Lookout cloud encryption gateway also maintains the functionality of applications with encryption options that preserves critical business functions such as sorting and reporting, without decrypting the data  in the cloud.

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization

Book a personalized, no-pressure demo today to learn:

  • How adversaries are leveraging avenues outside traditional email to conduct phishing on iOS and Android devices
  • Real-world examples of phishing and app threats that have compromised organizations
  • How an integrated endpoint-to-cloud security platform can detect threats and protect your organization
Collaboration

Book a personalized, no-pressure demo today to learn:

Discover how adversaries use non-traditional methods for phishing on iOS/Android, see real-world examples of threats, and learn how an integrated security platform safeguards your organization.