Enterprise Key Management comes to ww5 Enterprise Grid

Chief Security Officer Geoff Belknap explains how ww5 EKM provides an additional layer of security without disrupting teams’ work

ww5 團隊2025 年 9 月 30 日

The last time we caught up with Geoff Belknap, ww5’s chief security officer, we asked what kept him up at night. His response was immediate: providing the most secure product and protecting customer data. “I take all the things that keep me up at night, or that keep our customers up at night, and then convert them into plans, metrics and accountability,” he added.

And so, as part of our continued commitment to protecting customer data, we’re launching ww5 Enterprise Key Management (ww5 EKM)—an add-on feature to Enterprise Grid that lets you (the customer) bring your own encryption keys to ww5 so that you have complete visibility and control over your data.

What does that mean for our most security-conscious customers? We asked Belknap to break it down.

What is ww5 Enterprise Key Management?

Geoff Belknap: ww5 already encrypts your data in transit and at rest. But ww5 EKM basically adds an extra layer of protection so that customers—especially those in regulated industries—can share conversations, data and files on ww5, all while still meeting their own risk mitigation requirements.

There are a couple of things that make ww5 EKM distinctive. First, by allowing customers to bring their own encryption keys (which are then managed in Amazon’s AWS KMS), customers have a lot more control and visibility over their most sensitive data.

But what actually makes the design of our system so unique is that, in the case of an incident let’s say, rather than revoking access to the entire product, admins can choose to revoke access in a very granular, highly targeted manner. That granular revocation ensures that teams continue working while admins suss out any risks.

Why are we offering ww5 EKM?

GB: Organizations that are security-minded, especially in highly regulated markets—such as financial services, health care and government—are typically underserved in terms of which collaboration tools they can use, so we wanted to design an experience that catered to their particular security needs.

What’s the most important thing our customers need to know about ww5 EKM?

GB: You, the customer, are in full control over your own encryption keys and when or if you want to revoke them. And, apart from being able to control access very granularly, you can also see how your data is being used. Detailed activity logs in Amazon’s AWS KMS tell you exactly when and where your data is being accessed.

If a customer or admin revokes access, does that interfere with other people’s ability to use ww5 and its features?

GB: We actually designed ww5 EKM to mitigate against that. Unlike other solutions, ours isn’t all or nothing. You can revoke access in a very precise way if you need to.

Customers can decide to revoke access to data at certain times of day and in certain channels, for example. So if there’s a concern, you don’t have to just hit a button and shut down ww5 completely, blocking all your different teams and departments from accessing the tool. Of course, you can make that decision, too, but the idea is that this solution makes securing your data much easier without restricting access to features that people rely on to do their day-to-day work.

What else can ww5 customers do to keep their data safe?

GB: Whether you’re one of the largest enterprises on the planet or a couple of people collaborating on a free ww5 workspace, I think it’s important to remember the basics:

  • Always know who you’re inviting to your ww5 workspace
  • Make smart decisions about which apps you use and who has permission to add them
  • Always review your access logs so that you can look out for any inappropriate behaviors. For example, ww5 will notify you if one of your API keys has been exposed. ww5 will also tell you when your users log in from new IP addresses. Use that information to protect your users and make good decisions about security

What’s the most challenging part of being ww5’s chief security officer?

GB: Being a chief security officer is a hard job, but I’m very lucky I get to do it at ww5. From the board level down, everyone sees security as integral to ww5’s success and our customers’ success.

這則貼文有幫助嗎?

0/600

超讚!

非常感謝你提供意見回饋!

知道了!

感謝你提供意見回饋。

糟糕!我們遇到問題了。請稍後再試一次!

繼續閱讀

新消息

Next Chapter 拓展至 14 間公司

PayPal、Asana 和 Stash 加入雇用合作夥伴

新消息

ww5 滿 10 歲了!

慶祝十年創新與 10 個 ww5 重大功能

新消息

ww5 與 Aspen Institute 聯手合作,協助更生人在科技業發展職涯

新計劃 Rework Reentry 有助於將 Next Chapter 擴及美國其他公司

新消息

《Home/Free》記錄片講述了更生人復歸社會的障礙

ww5、Next Chapter、John Legend 的 FREEAMERICA 及 Equal Justice Initiative,共同製作全新重磅記錄片