How joining Google Gmail with encryption system helps high-tech firm meet gov't security rules
Novati Technologies complies with federal "International Traffic in Arms" rules through CipherCloud
Network World - When a relatively small high-tech company with some big aerospace and defense customers wanted to adopt cloud-based email for its employees, it faced the challenge that whatever choice of cloud service it adopted, it had to meet the government's security regulations known as ITAR, or the "International Traffic in Arms Regulations."
The firm, Novati Technologies, found a way to do that through cloud-based encryption of Google Gmail in which only Novati, and not Google, can directly access and decrypt any Novati email information held encrypted in the cloud.
The reason that feature was especially important is because some of the rules in ITAR say anyone authorized to access ITAR-regulated data has to be a U.S. citizen, among other requirements. Novati determined that by encrypting its employee Gmail accounts using the CipherCloud gateway appliance, the nanotechnology firm could meet ITAR demands.
"We're required to be ITAR-compliant," explains Patrick Meyer, director if IT at Austin, Texas-based Novati, emphasizing this was a main consideration as the company went about evaluating how it could migrate to the cloud from Microsoft Exchange servers in-house and the hosted service it had, which was not particularly reliable, functional or stable.
Encryption has long been a common practice at the nanotechnology firm there where a number of encryption methods, including PGP and ZixCorp, are used to secure data and share it confidentially with business partners.
When Meyer looked into Microsoft Office 365 as a possible cloud email option, he found there was an "Office 365 for ITAR" on the market. But "their focus was 25,000 accounts or more," he adds, noting Novati was looking at transitioning to less than 150 email boxes for its purposes.
Unlike Microsoft, Google didn't make specific statements about any ITAR-support in its cloud email offering, says Meyer. But by using the CipherCloud appliance, which supports Gmail among a few other cloud-based services, Novati could basically exert encryption control over all Gmail held in Google's cloud. So Novati made the migration to Google Gmail for about 130 mailboxes at the end of last year.
"We encrypt all of our email," says Meyer, and so far, the arrangement has been reliable, with Google Gmail having a lot of flexibility in vaulting, searching and archiving, he adds. The cost advantage has also been rewarding for Novati, with reduced operational expense of 45% in comparison to its pre-cloud deployment.
Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: @MessmerE. Email: firstname.lastname@example.org.
Read more about wide area network in Network World's Wide Area Network section.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts