Intelligent CISO: CNTXT Empowers Google Cloud Customers in Saudi Arabia with Sovereign Controls

Published:

spot_img

CNTXT announces partnership with Google Cloud to introduce Sovereign Controls in Saudi Arabia

CNTXT, a prominent cloud and Digital Transformation company in Saudi Arabia, has partnered with Google Cloud to introduce a new premium cybersecurity offering to the Saudi market: Sovereign Controls by CNTXT. This groundbreaking solution is tailored to support organisations in the region that must adhere to strict data sovereignty, regulatory, and security requirements.

By offering managed External Key Management (EKM) with Key Access Justifications (KAJ) service, as well as localised support, CNTXT aims to help local organisations meet digital sovereignty requirements. The EKM with KAJ encrypts customer data at rest with keys stored outside Google Cloud’s infrastructure, providing detailed justifications for key access requests. This added layer of control ensures that customers can deny access for any reason, including extraterritorial data requests.

Partnering with SITE, CNTXT’s offering, ‘DATA SHIELD powered by Fortanix,’ enables users to create, store, and manage encryption keys outside the Google Cloud environment. This ensures that encryption keys are always under customer control and stored inside a FIPS 140-2 level 3 certified HSM, away from the cloud.

Abdullah Jarwan, CEO at CNTXT, expressed excitement about bringing Cloud External Key Manager to Saudi Arabia, emphasizing the high standards of security and encryption provided by this integration. Majed Alamri, Chief Business Solutions Officer at SITE, added that Sovereign Controls by CNTXT empowers organisations to securely transition their most sensitive workloads to the cloud.

Bader Almadi, Google Cloud Country Manager for Saudi Arabia, highlighted the commitment to assist customers in meeting digital sovereignty requirements through this offering. Sovereign Controls by CNTXT promises to enable Saudi-based organisations to accelerate their Digital Transformation journeys while maintaining control over their data and meeting regulatory requirements.

spot_img

Related articles

Recent articles

Russian Hackers Target Email and VPN Flaws to Infiltrate Ukraine Aid Operations

Cyber Espionage by Russian APT28: Targeting Western Logistics and Technology Entities In recent developments, the cyber landscape has been significantly impacted by a state-sponsored campaign...

UAE and Serbia Seek $351M Trade Boost with New CEPA Agreement

UAE-Serbia CEPA: A New Era of Economic Collaboration The recently activated Comprehensive Economic Partnership Agreement (CEPA) between the United Arab Emirates (UAE) and Serbia marks...

FBI and Europol Take Down Lumma Stealer Malware Network Behind 10 Million Infections

Disruption of Lumma Stealer Malware: A Major Operation in Cybersecurity Overview of the Operation A significant global effort spearheaded by law enforcement agencies and various private...

Transforming Exposure Management Through AI, Analytics, and Collaboration

Shaping the Future of Exposure Management: Insights from Nanitor's CEO at GISEC Global 2025 A Catalyst for Change in Cybersecurity As the global cybersecurity landscape evolves,...