Intelligent CISO: CNTXT Empowers Google Cloud Customers in Saudi Arabia with Sovereign Controls

Published:

CNTXT announces partnership with Google Cloud to introduce Sovereign Controls in Saudi Arabia

CNTXT, a prominent cloud and Digital Transformation company in Saudi Arabia, has partnered with Google Cloud to introduce a new premium cybersecurity offering to the Saudi market: Sovereign Controls by CNTXT. This groundbreaking solution is tailored to support organisations in the region that must adhere to strict data sovereignty, regulatory, and security requirements.

By offering managed External Key Management (EKM) with Key Access Justifications (KAJ) service, as well as localised support, CNTXT aims to help local organisations meet digital sovereignty requirements. The EKM with KAJ encrypts customer data at rest with keys stored outside Google Cloud’s infrastructure, providing detailed justifications for key access requests. This added layer of control ensures that customers can deny access for any reason, including extraterritorial data requests.

Partnering with SITE, CNTXT’s offering, ‘DATA SHIELD powered by Fortanix,’ enables users to create, store, and manage encryption keys outside the Google Cloud environment. This ensures that encryption keys are always under customer control and stored inside a FIPS 140-2 level 3 certified HSM, away from the cloud.

Abdullah Jarwan, CEO at CNTXT, expressed excitement about bringing Cloud External Key Manager to Saudi Arabia, emphasizing the high standards of security and encryption provided by this integration. Majed Alamri, Chief Business Solutions Officer at SITE, added that Sovereign Controls by CNTXT empowers organisations to securely transition their most sensitive workloads to the cloud.

Bader Almadi, Google Cloud Country Manager for Saudi Arabia, highlighted the commitment to assist customers in meeting digital sovereignty requirements through this offering. Sovereign Controls by CNTXT promises to enable Saudi-based organisations to accelerate their Digital Transformation journeys while maintaining control over their data and meeting regulatory requirements.

Related articles

Recent articles