Bring Your Own Key (BYOK)

Bring Your Own Key (BYOK) allows users of cloud services to generate, manage, and provide their own cryptographic keys. BYOK offers end-users significant control over their encryption keys, unlike the model where encryption keys are solely generated and managed by the cloud service provider (CSP). This control enables users to avoid potential issues related to key management and access when switching between providers.

With BYOK, users can securely transfer their encryption keys to their CSP, ensuring the protection of their data across various cloud environments, including multi-cloud deployments. This approach enhances data security and governance by allowing organizations to apply their own encryption policies while utilizing cloud resources.

BYOK enables organizations migrating to the cloud to achieve:

  • Flexibility, convenience, and cost-effectiveness.
  • Strong control of sensitive data and applications.
  • Full visibility over the use of your keys in the cloud.
  • Highest level of data security, integrity, and trust.

BYOK at Piwik PRO

At Piwik PRO, we see great value in implementing Bring Your Own Key (BYOK), which enables customers to enhance the security of their data.

Piwik PRO has long offered BYOK in the private cloud (dedicated hardware). In the standard setup, private cloud instances are hosted on Piwik PRO’s Azure and/or Orange FE account. Piwik PRO retains a billing relationship with cloud providers.

In 2024, we also decided to implement BYOK for the private cloud (dedicated database), which is available with Orange. In that case, the database is set for each client and encrypted with the client’s key.

Additional reading:


  • How can server-side tracking help your business?

    Alternatives to client-side tracking, such as server-side tracking, are becoming increasingly important in online marketing, especially as third-party cookies are gradually being phased out. Although Google has recently canceled its planned deprecation of third-party cookies, many browsers like Safari have already been blocking them since 2003. As a result, businesses seeking reliable and actionable information…

    Read more

  • How to use raw data in web analytics

    Raw data offers infinite potential as a resource, as it comes in diverse forms from a wide range of sources. While it is highly valuable, raw data can also be challenging to organize and understand. It takes time, resources, and technical expertise to draw actionable insights from it. Before organizations can harness the power of raw…

    Read more