Intelligent CISO Issue 87 | Page 35

PREDICTIVE intelligence as it’ s written to disk using OS-level encryption keys, while at the inner layer, the Kiteworks application applies a separate encryption layer with distinct file-level keys that are never shared with the operating system. This dual-protection strategy follows an assumed-breach security philosophy, ensuring that even if an attacker compromises the operating system layer, they encounter only encrypted data blobs that remain indecipherable without the separate file-level keys. The architecture ensures that neither Kiteworks employees nor system administrators can access unencrypted data without proper authorisation, providing organisations with sole encryption key ownership and complete control over their sensitive information.

This layered encryption model delivers significant benefits for organisations in regulated industries by exceeding standard compliance requirements for data protection while simplifying security audits and certifications. Organisations gain enhanced protection against sophisticated threats
Kiteworks enables users to edit and collaborate on sensitive documents without the file ever leaving the secure server environment.
including advanced persistent threats, malicious insiders and supply chain compromises that might bypass single-layer encryption systems. Additionally, this encryption architecture integrates seamlessly with Kiteworks’ Private Data Network to provide comprehensive protection for data across its entire lifecycle, whether at rest in storage, in transit across networks, or during collaborative workflows, without compromising performance or introducing operational friction that would impede productivity.
WWW. INTELLIGENTCISO. COM 35