Martech Edge | Best News on Marketing and Technology
GFG image

cybersecurity

Trent Telford on Zero-Trust and Quantum-Resistant Encryption at Qanapi

Trent Telford on Zero-Trust and Quantum-Resistant Encryption at Qanapi

cybersecurity 18 Jun 2025

1. How is your organization adapting its data security strategies to incorporate zero-trust principles, especially in the context with Google Workspace?

Zero-trust isn't just a buzzword for us—it’s a foundational principle. At Qanapi, we've embraced zero-trust principles by ensuring that robust security is enforced at the most granular level—applying our three core principles of encryption, policy and identity at the data object level. Our Key Management Service integrates with Google Workspace to enable Client-Side Encryption (CSE), empowering organizations to maintain exclusive control over their encryption keys, ensuring that sensitive data remains protected even from the platform provider. This approach aligns with zero-trust by verifying every access request, thereby enhancing overall data security. 

2. How are you leveraging solutions to enhance control over data encryption and meet regulatory requirements such as GDPR, and CMMC? 

We started by asking, “What’s the point of encrypting your data if you don’t know who has access to the keys?” That question drives everything we do at Qanapi. Our platform is built to give organizations full control over where their encryption keys reside and how they’re governed—helping organizations ensure data sovereignty and meet compliance requirements across diverse sectors. Our Key Management Service, which enables Google Workspace Client-Side Encryption, enhances organizations' security posture and compliance. That separation of keys from data is crucial for meeting frameworks like GDPR, HIPAA, and CMMC. Our granular level access permissions and policies ensure only authorized users have access to sensitive data, and our auditing and monitoring capabilities allow real-time visibility into who is accessing what data and when. It’s also now available within ATX Defense’s CMMC Space certified environment, extending our support for defense contractors handling Controlled Unclassified Information.

3. What technologies are currently employed to manage encryption keys, and how do they integrate with your existing cloud infrastructure?

Our Key Management Service is built to give organizations full control over their encryption keys—without slowing anything down. It’s FIPS-validated, cloud-agnostic, and integrates directly with Google Workspace Client-Side Encryption, so data gets encrypted before it even hits Google’s servers. Designed for simplicity and scale, our KMS integrates smoothly into the native Google Workspace experience—supporting Docs, Sheets, Slides, Drive, Meet, and Calendar—so users can keep working without disruption, while security and compliance teams maintain complete visibility and control.

4. In what ways are you streamlining the deployment of encryption solutions to improve efficiency and reduce operational bottlenecks?

One of the biggest challenges with encryption has always been the complexity. We’ve worked hard to remove that. With Qanapi, teams can integrate data-level encryption and key management using just a few lines of code—it’s quick to deploy and doesn’t require reworking existing systems. We’ve also made sure it fits into the environments our customers are already using, whether that’s in the cloud or on-prem. And from a user perspective, it’s designed to run in the background. People can keep using the tools they know, while security and compliance teams maintain full control under the hood. It’s about making strong encryption easy to adopt—not something that slows everything down.

5. How are you ensuring that your encryption and key management approaches remain adaptable to changes in technology and regulatory landscapes?

We designed our API to be crypto-agile and library-agnostic. We support popularly used frameworks in cyber security like AES-256 or RSA-2048 and are ready for the post quantum world with FIPS-140-2 and quantum resistant encryption formats, so organizations can apply their choice of encryption standards to new and legacy data as threats and regulatory frameworks evolve.  

6. How is your organization preparing for emerging trends in data security, such as quantum-resistant encryption and advanced key management solutions? 

Quantum computing will break a lot of the encryption we rely on today—it’s not a question of if, but when. At Qanapi, we’re helping advance with NIST compliant, quantum-hardened FIPS validated algorithms. We’re also tackling the “store now, decrypt later” threat imposed by malicious actors by building infrastructure that supports cryptographic agility, empowering organizations to apply the latest NIST-recommended encryption standards to both new and legacy data. We’re also focused on securing data in the era of AI. Our technology allows organizations to innovate safely—protecting against AI exposure and data poisoning without slowing progress. 

Get in touch with our MarTech Experts.

Proactive Security: Leveraging Data for Advanced Threat Detection by Justin Borland

Proactive Security: Leveraging Data for Advanced Threat Detection by Justin Borland

cybersecurity 2 May 2025

1. How can businesses leverage applied security data to enhance threat detection and incident response? 

The book is a great reference guide for measuring maturity and leveraging what you have effectively.  It provides several easily adoptable methodologies to help holistically manage and utilize your security data.  From discovery, to ingestion, to analysis and reporting, these methodologies provide sustainable frameworks upon which to improve and build.  Learning how to measure your detection hypotheses and the required data to signal effectively will lead threat detection teams down a much shorter path. Real world examples of streamlining ingestion, processing and analysis will quickly enable your teams. 

2. What best practices should companies follow to ensure secure data collection, storage, and analysis? 

Know your requirements!  Governance is critical, not just to maintaining compliance, but to developing an effective program which can quickly evolve to counter threat actors with new hypotheses.  

By ensuring governance, engineering, and operations teams are all embedded in your security data strategy you enable both rapid response and innovation safely. 

We want all teams to be able to evolve quickly, run with scissors safely, and affect change within your wider organization to achieve desired outcomes. 

3. What are the critical metrics and KPIs for evaluating the effectiveness of a security data strategy? 

Seek to understand your own organization, your risks, exposures, and adversaries. Building processes, procedures, and adopting methodologies to measure this repeatably is paramount.  

 Start with basic health and observability: 

- Feed fidelity & health (up/down time) 

- Feed usage (number of detections per feed) 

- Feed efficacy (number of true positives per feed) 

 What can be done with what you have: 

 - What can I effectively signal on? What can’t I effectively signal on?  Why not?  

- Where do these detection blind spots exist on the risk register? What should be prioritized? 

- The number of secondary investigations initiated by signal. 

- The number of secondary signals for N-level triage (forensic images, DFIR-as-code) 

- Detection & countermeasures blind spots mapped to a common framework (ATT&CK, etc.) 

Finally understand how well you are performing: 

- How effective are the signals? What about signals per feed? Have they ever triggered? How often have you tested or tuned them? 

- Are the tests fully automated? Do they always fire as intended?  

- Do you test for false negative scenarios? 

This isn’t an exhaustive list, but I would start by answering those questions, and ensuring you have supportable frameworks in place to facilitate effective changes. 

4. How can organizations transition from reactive security measures to proactive threat intelligence? 

Organizations need to be able to evolve their countermeasures more quickly than their adversaries, in a safe, effective manner. Hypotheses need to be able to prove, or disprove, a theory so that lessons can be learned and applied more quickly. That starts with ensuring you have some ability to flexibly ingest and process your data. When incidents occur, sustainable mechanisms to detect the needles in the haystacks need to be quickly developed and implemented.  Ensuring easy, governed, detection development and quick iterations are critical to building an adaptable security operations and intelligence program. 

5. How is cloud adoption influencing security data strategies?

Organizations need to have a game plan to effectively navigate and balance the risks and rewards associated with cloud adoption. Most organizations have some form of hybrid environment which requires a more holistic approach towards collecting, managing, and analyzing data. Understanding what the requirements are from a business, governance, and operations standpoint will better enable your overall execution. 

6. How can businesses integrate security data strategies into their overall digital transformation efforts? 

Adopting methodologies for each stage of your security data program will enable your organization to measure and improve your internal processes and their effectiveness.  By implementing these frameworks, solid foundations can be built to capture the full value of your data.

   

Page 1 of 1