The state of cloud encryption: From fiction to actionable reality

 that are adopting CRM, collaboration, file sharing and cloud storage applications.  Key retention by the enterprise ensures no third party — whether law