CipherCloud achieves FIPS 140-2 Validation

FIPS 140-2 compliance assures companies and government agencies that CipherCloud’s products meet the highest levels of security for protecting sensitive data in the cloud.

CipherCloud has achieved the Federal Information Processing Standards (FIPS) 140-2 validation from the Cryptographic Module Validation Program (CMVP), a joint effort between the National Institute of Standards and Technology (NIST) and the Communications Security Establishment (CSE) of the government of Canada. CipherCloud’s Searchable Strong Encryption (SSE) solution is the first in the cloud visibility and data protection industry to earn this distinction.

Considered the benchmark for security, the FIPS 140-2 validation assures U.S. and Canadian companies, agencies, systems integrators and resellers that CipherCloud’s SSE technology delivers the highest level of protection for sensitive information and meets the strictest government security regulations.

This milestone demonstrates CipherCloud’s continued technical leadership and further validates the robustness of the company’s security technologies. Now, CipherCloud adds FIPS 140-2 validation to its arsenal of technical merits, which includes 13 patents for preserving operations for structured and unstructured data in the cloud.

“We began our cloud security journey by solving the cryptographer’s dilemma – enabling the breakthrough of searchable strong encryption while preserving the operations of cloud applications,” said Pravin Kothari, founder and CEO of CipherCloud. “Today, with FIPS certification, we extend our leadership in cloud encryption and set the bar for the rest of the industry. Companies and government agencies can be assured that our products have passed the most rigorous testing."

FIPS 140-2 validates that cryptographic operations performed by the CipherCloud platform passed rigorous testing under the Cryptographic Module Validation Program and can be used to secure sensitive information. CipherCloud interfaces with clients (e.g., web browsers, mobile applications, APIs, etc.), and leverages format and operations preserving encryption technology to secure sensitive information in real time, before it is sent to cloud applications (e.g., web servers, API services, databases, etc.), without impacting usability or performance.
 

INNIO has secured an order from VoltaGrid, strengthening their collaboration on scalable power...
Illumio and Armis enhance their collaboration, focusing on improved IT and OT security through...
Tenable's 2026 report reveals growing AI exposure and supply chain vulnerabilities, posing serious...
Scale Computing enhances its product offerings with the acquisition of Adaptiv Networks,...
Veeam appoints Nick McAlister as UKI Channel Director to strengthen its channel strategy across...
Pure Storage, now Everpure, expands into cloud data management with the acquisition of 1touch,...
BMC has partnered with AWS to enhance intelligent automation, emphasising data orchestration at a...
Check Point has unveiled an AI-focused security strategy, supported by three acquisitions.