Want to securely transit data from on-premises to Google Cloud Platform?
The private keys of the code-signing certificate can be stored in an HSM to eliminate the risks associated with stolen, corrupted, or misused keys.
New
while the data is protected via Format Preserving Encryption (FPE) or has been masked. Cloud Data Protector hides all sensitive information to maintain compliance while the migration takes place.
Features
![]() |
Open Source Download Software | Enterprise Features Request a demo |
---|---|---|
Redaction | ||
Replacement | ||
Masking | ||
Format Preserving Encryption | ||
Software-based Key generation | ||
Key Management in Google Cloud Platform | ||
Logging | ||
Enhanced Key Protection using nCipher, Thales , Utimaco and Futurex HSM | ||
24×7 Customer Support | ||
FIPS 140-2 Level 3 Compliant | ||
Download Software | Request a demo |
Cloud Data Protector works with the help of the Google Cloud Platform. The user will create a JSON file that would contain a path to the CSV file, which needs to be protected.
It will also include the name of a key inside GCP’s KMS that we will use for wrapping the user-generated key. Then you will pass the JSON as a parameter to the cloud data platform.
Cloud Data Platform is open-source. Thus you can add your extensions. Moreover, it can be tied with scripts and automated to be a part of a much bigger migration. You can extend it further to attach with your tools and workflow by running a terminal command.
Want to securely transit data from on-premises to Google Cloud Platform?
Please submit your
Leave your message and we'll get back to you shortly.
Please submit your
You're one step away
Please submit your details to
Please submit your details to
Please submit your details to
Please submit your details to
Get in Touch
Please submit your details to
Please submit your details to
Please submit your details to
Please submit your details to
Please submit your
Please provide your contact details
Register to watch the
The private keys of the code-signing certificate can be stored in an HSM to eliminate the risks associated with stolen, corrupted, or misused keys.
Client-side hashing ensures build performance and avoids unnecessary movement of files to provide a greater level of security
The command line signing tool provides a faster method to sign requests in bulk
Robust access control systems can be integrated with LDAP and customizable workflows to mitigate risks associated with granting wrong access to unauthorized users, allowing them to sign code with malicious certificates
Support for customized workflows of an “M of N” quorum with multi-tier support of approvers
Support for InfosSec policies to improve adoption of the solution and enable different business teams to have their own workflow for Code Signing
Validation of code against UpToDate antivirus definitions for virus and malware before digitally signing it will mitigate risks associated with signing malicious code