What is BYOE (bring your own encryption)? - Definition from WhatIs.com

Definition

BYOE (bring your own encryption)

Part of the Security management glossary:

BYOE (bring your own encryption) is a cloud computing security model that allows cloud service customers to use their own encryption software and manage their own encryption keys.  BYOE may also be referred to as "bring your own key" (BYOK).

BYOE works by allowing customers to deploy a virtualized instance of their own encryption software alongside the business application they are hosting in the cloud.  The business application is configured so that all its data is processed by the encryption application, which then writes the ciphertext version of the data to the cloud service provider’s physical data store

BYOE can help an organization that wishes to take advantage of cloud services to address both regulatory compliance and data privacy concerns in a third-party multi-tenant environment. This approach allows a customer to use the encryption technology that best suits the customer's needs, regardless of the cloud provider's underlying IT infrastructure.  

See also: cloud storage encryption, encryption key management

This was last updated in June 2015
Contributor(s): Mike Byrnes
Posted by: Margaret Rouse

Related Terms

Definitions

  • end-to-end encryption (E2EE)

    - End-to-end encryption is a secure method of transferring data from one end device to another without allowing third-party interference. (SearchSecurity.com)

  • security through obsolescence

    - Security through obsolescence is the use of obsolete technologies whose vulnerabilities are no longer well known among the public. Less common or obsolete software has fewer issues with malware as ... (WhatIs.com)

  • security through obscurity

    - Security through obscurity (STO) is reliance upon secrecy in software development to minimize the chance that weaknesses may be detected and targeted. (WhatIs.com)

Glossaries

  • Security management

    - Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorizati...

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About BYOE (bring your own encryption)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.