CIO Influence
CIO Influence News Networking Security

Companies Can Now Search Encrypted Data With IronCore Labs’ New Cloaked Search Product

Companies Can Now Search Encrypted Data With IronCore Labs' New Cloaked Search Product
Breakthrough tech allows companies to use their existing search capabilities while keeping data safe from hackers already in their network.

IronCore Labs, the leading provider of data security for modern cloud applications, announced the launch of Cloaked Search, a drop-in encrypted search solution to protect sensitive data held in existing search services, and a partnership with OpenSearch, a community-driven, open-source search service.

“Encrypting data is the best way to protect data from ransomware, hackers, and curious administrators,” said Patrick Walsh, CEO of IronCore Labs. “With Cloaked Search, you can now expand your vital data security measures to cover the data in your search service using encryption you can actually search on.”

How Cloaked Search Works

Cloaked Search by IronCore Labs is a transparent encryption proxy, which means that it encrypts sensitive data before it goes to the search service and decrypts search results as they flow back from the search service. Anyone looking at the stored search data and the search indices who doesn’t have the proper key will only see random bytes instead of meaningful information.PREDICTIONS SERIES 2022

Top iTechnology Digital Transformation News: Virtana Taps Kamelia Gouchev to Spearhead Customer Success

Protecting Multi-tenant Customer Data

With native support for modern cloud applications, Cloaked Search includes features that allow separate master keys to protect different segments of data. This allows multi-tenant architectures to virtually isolate customer data and to eliminate any risk of accidentally leaking data between customers. Cloaked Search works out of the box with OpenSearch and Elasticsearch, the two most popular search services in use today. It also works with managed services that are built on top of OpenSearch or Elasticsearch.

Getting Started

To use Cloaked Search, developers simply point their code to the proxy instead of the search service. Rankings and results operate much the same as before. When indexing or searching documents, the proxy will automatically encrypt the documents and queries as needed.

Cloaked Search Features

  • Easy-to-use no-code approach allows for quick setup.
  • Encrypted search that integrates with an existing search system.
  • Supports wildcard searches, phrase searches, complex queries, phonetic matches, field boosting, and more.
  • Multi-key support allows inexpensive segmentation of data, virtual isolation of the data segments, and protection against search injection attacks.
  • Selective protection allows admins to choose which fields to secure, while other fields pass through as normal. Admins can increase the number of fields protected over time.
  • Integrates with IronCore Labs’ SaaS Shield product so SaaS customers can hold and manage their own encryption keys while getting full audit trails for all access to their data. SaaS applications can charge a premium for this Bring Your Own Key (BYOK) or Customer Managed Keys (CMK) functionality.
  • Simple deployment options integrate well with kubernetes and other cloud orchestration.
  • Self-trial means anyone can try it by downloading and running a docker container locally.

Top iTechnology IT and DevOps News: Kingston FURY Line Unleashes Its PCIe 4.0 NVMe Performance SSD

Partnership With OpenSearch

IronCore Labs is an official partner of OpenSearch, bringing strong data security functionalities to the entire OpenSearch community.

“We’re proud to partner with OpenSearch to extend the broader OpenSearch ecosystem with application-layer encryption and encrypted search,” said Riah Solomon, Marketing Director at IronCore Labs. “Our approach with Cloaked Search puts control of sensitive data into the hands of its rightful owners.”

The Importance of Cloaked Search

“Cloaked Search plugs a critical hole in the market and in most organizations’ layered defense strategy,” Walsh said. “Before now, protecting data meant encrypting it, and encrypting it meant making it hard to find and use. With Cloaked Search, organizations can encrypt their data without sacrificing functionality.”

In the broader context, laws like GDPR and CCPA mandate that the private data of consumers be well protected. GDPR requires both secure processing and security by design, which generally means encryption of personal data. When user data is encrypted at a higher layer, hackers who gain access to servers and systems will only see random bytes. Without access to the keys, those random bytes are useless to the attackers. And if no unencrypted personal information was accessed, then there is n************ to publicly disclose the incident.

Today, search services are typically encrypted only at the lowest level with transparent disk encryption. This approach blocks data theft when hard drives are stolen but does not protect data on a running machine.

Cloaked Search brings meaningful data protection to search indices by making the search services blind to the data they hold. View the live demo of Cloaked Search on the IronCore Lab’s website and watch the webinar on Nov. 4 to learn more.

Top iTechnology Automation News: eGain Knowledge Hub Now Available on Genesys AppFoundry

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Reference Customers “Praise” Boomi’s Ease of Use and Speed of Integration in Independent iPaaS Report

Business Wire

FPT Software and Viessmann Join Hands, Tapping APAC Market

Business Wire

Globys Announces Addition of Former T-Mobile CIO Robert Strickland to its Advisory Board

CIO Influence News Desk

Leave a Comment