What is BYOE (bring your own encryption)? - Definition from WhatIs.com


BYOE (bring your own encryption)

Part of the Security management glossary:

BYOE (bring your own encryption) is a cloud computing security model that allows cloud service customers to use their own encryption software and manage their own encryption keys.  BYOE may also be referred to as "bring your own key" (BYOK).

BYOE works by allowing customers to deploy a virtualized instance of their own encryption software alongside the business application they are hosting in the cloud.  The business application is configured so that all its data is processed by the encryption application, which then writes the ciphertext version of the data to the cloud service provider’s physical data store

BYOE can help an organization that wishes to take advantage of cloud services to address both regulatory compliance and data privacy concerns in a third-party multi-tenant environment. This approach allows a customer to use the encryption technology that best suits the customer's needs, regardless of the cloud provider's underlying IT infrastructure.  

See also: cloud storage encryption, encryption key management

This was last updated in June 2015
Contributor(s): Mike Byrnes
Posted by: Margaret Rouse

Related Terms


  • access recertification

    - Access recertification is an information technology (IT) control that involves auditing user access rights to determine if they are correct and adhere to the organization’s internal policies and co... (WhatIs.com)

  • access governance (AG)

    - Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with excessive access rights, inactive users and orphan accounts. (WhatIs.com)

  • email spoofing

    - Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. (SearchSecurity.com)


  • Security management

    - Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorizati...

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About BYOE (bring your own encryption)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment



    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.