I!P White logo SVG

I4P Blog

Boosting Google’s client-side encryption feature with Trident HSM

Google has made it possible for users to use a client-side encryption function in the Workspace. However, you must ensure that you store the encryption keys in a proper and secure manner. Our Trident HSM helps you manage those keys in a highly secure way, allowing you to ensure that your encrypted data is accessible when needed with minimal hassle. 

New feature for stronger security

In a world where data privacy is an increasingly important topic, Google has launched a new Google Workspace Client-side encryption function in order to help its clients enhance the security of their information. In addition to using the latest cryptographic standards to encrypt all data of the customers, Google now offers customers control over encryption keys and the identity services they use to access the keys. Users can continue to take advantage of Google’s web-based collaboration, access content on any device, and share encrypted files externally even, just like before, but they have less to worry about data security and even the service provider is unable to decrypt their data. Because of these capabilities, customers can strengthen the protection of their Google Workspace data.  

This is an important leap forward and a useful option for anyone who wants to keep their sensitive data from Google. You can continue to use Google’s cloud services (which are accessible from anywhere from your mobile phone, tablet or desktop computer and scale automatically, according to your needs), while maintaining your authority over your sensitive data by retaining control of your encryption key.

Google client side encryption with I4P graphics

Need a place to store keys?

Client-side encryption is a useful thing for security, but it is important to have a reliable method for storing the encryption keys. Our Trident HSM provides the necessary technology and features for this purpose. It allows you to keep control of the encryption keys and encryption operations, while keeping them physically in your possession. 

If you are considering using the client-side encryption function, it is wise to examine the opportunities an HSM provides with this feature. If you would like more information about our support for client-side encryption, please contact us today. We are happy to answer any questions that you may have regarding and we look forward to hearing from you!

Share this POST

blog POSTS

Get your free ebook:

Why every company needs HSM modules?

Download this ebook to find out:

  • What is a Hardware Security Module (HSM)?
  • Why do you need an HSM?
  • Why is an HSM beneficial for your company?
  • What type of HSMs are available and what are they useful for?
  • How do you choose the right HSM for your organization?
  • How do you deploy and use an HSM?