ServiceNow Edge Encryption replacement

What organizations need to know before 2028

Krista Case  profile picture
Krista Case

April 08, 20266 min read

ServiceNow has placed Edge Encryption into end-of-renewal status, with full end-of-life planned for December 2028. Organizations that relied on Edge Encryption to protect sensitive data before it reached the ServiceNow platform will need to transition to a new encryption model.

ServiceNow’s recommended path forward is Platform Encryption, which bundles Cloud Encryption and Field Encryption Enterprise, and performs cryptographic operations inside the ServiceNow cloud.

For many organizations, this shift represents a significant architectural change. Moving encryption from a customer-controlled edge proxy to in-cloud encryption affects how organizations manage sensitive data, encryption keys, and security policies across SaaS environments.

If your organization relied on edge-based encryption to maintain control over sensitive data and encryption keys, you may now be evaluating a ServiceNow Edge Encryption replacement that preserves this security model.

What is ServiceNow Edge Encryption – and why is it going away?

ServiceNow Edge Encryption was designed as a SaaS encryption proxy that protected sensitive data before it entered the ServiceNow cloud.

In this architecture, sensitive data fields were encrypted within the customer’s environment before transmission to the SaaS platform. The ServiceNow platform stored only encrypted values for those fields while the customer retained control of the encryption keys.

This model allowed organizations to:

  • Maintain customer-managed encryption
  • Protect sensitive data before it reaches the SaaS platform
  • Enforce internal security policies and data governance controls
  • Support compliance requirements such as GDPR encryption compliance or PCI-DSS cloud encryption

ServiceNow has now shifted its strategy toward in-cloud encryption, directing customers to migrate to Platform Encryption instead.

While this approach simplifies encryption within the platform itself, it also changes where encryption occurs and who controls key operations.

Edge Encryption vs. Platform Encryption: What actually changed?

The primary difference between Edge Encryption and Platform Encryption is where encryption takes place.

Edge Encryption

  • Encryption performed in the customer environment
  • Encryption keys remain customer controlled
  • ServiceNow stores only encrypted values

Platform Encryption

  • Encryption occurs inside the ServiceNow cloud
  • Supports BYOK ServiceNow key management
  • Sensitive data will enter over TLS and then be processed in the clear before entering the storage platform

Removing the edge proxy eliminates the separation between the customer’s encryption environment and the SaaS platform—a control that many organizations relied on to manage sensitive data.

Four compliance and security risks introduced by ServiceNow’s Platform Encryption transition

Moving encryption from the edge to the cloud introduces several potential considerations.

1. Data sovereignty: where does your sensitive data actually live?

When encryption occurs inside the ServiceNow cloud, sensitive data may be processed within infrastructure outside the organization’s direct control.

For organizations concerned with data sovereignty in ServiceNow environments, this can raise questions about where sensitive data is handled and how it is protected.

Edge Encryption ensured sensitive data could be encrypted before leaving the organization’s environment, providing stronger control over how data entered SaaS platforms.

2. Key custody: BYOK isn’t enough if the keys are used inside someone else’s cloud

ServiceNow Platform Encryption supports Bring Your Own Key (BYOK) models.

However, there is a difference between owning encryption keys and controlling where those keys are used. Even with BYOK ServiceNow, encryption operations still occur within ServiceNow infrastructure.

Organizations that prefer strict customer-managed encryption may want to evaluate whether this model aligns with their internal security policies.

3. Regulatory compliance: does in-cloud encryption satisfy GDPR, PCI-DSS, DORA, and NIS2?

Organizations should review whether in-cloud encryption satisfies their regulatory obligations.

Frameworks such as:

  • GDPR
  • PCI-DSS
  • DORA
  • NIS2

often require strong controls around how sensitive data is encrypted and processed.

For organizations that adopted Edge Encryption to support GDPR encryption compliance or PCI-DSS cloud encryption, reviewing the architectural change is an important step.

4. Single-purpose solution: what about your other SaaS applications?

Platform Encryption protects only the ServiceNow platform.

However, most enterprises operate multi-SaaS environments including platforms such as Salesforce, Workday, and SAP SuccessFactors.

Using separate encryption tools for each application can increase operational complexity and fragment security policies. Many organizations prefer a SaaS encryption proxy that can apply consistent protection across multiple platforms.

Introducing OpenText Data Privacy & Protection Sentry: a direct ServiceNow Edge Encryption replacement

OpenText™ Data Privacy & Protection Sentry (Sentry) provides a modern ServiceNow Edge Encryption replacement that restores edge-based encryption while supporting today’s SaaS environments.

Sentry encrypts or tokenizes sensitive data before it reaches ServiceNow, ensuring the platform stores only protected values while encryption keys remain under customer control.

This architecture preserves a hold-your-own-key (HYOK) model that maintains stronger control over data and encryption operations.

Because Sentry supports format-preserving encryption (FPE) and Secure Stateless Tokenization (SST), protected values retain their structure, so workflows, searches, and integrations continue to function normally.

How Sentry works

Sentry operates as a transparent encryption gateway between users and SaaS applications.

Sensitive fields and files are intercepted and protected before being transmitted to the ServiceNow platform.

Key capabilities include:

  • Format-preserving encryption for SaaS data
  • Tokenization and encryption for sensitive fields and files
  • Customer-managed encryption keys that remain outside SaaS infrastructure
  • Centralized policies across multiple SaaS applications

This makes Sentry a practical edge encryption proxy alternative for organizations replacing ServiceNow Edge Encryption.

What’s included in the Sentry migration package

OpenText offers a migration package designed specifically for Edge Encryption customers.

This includes:

  • Sentry deployment and configuration
  • Prebuilt templates supporting field encryption for ServiceNow
  • Functional testing and production cutover support
  • Migration of historical ServiceNow Edge-encrypted data
  • Documentation and operational training

Sentry vs. ServiceNow Platform Encryption: a side-by-side comparison

CapabilityServiceNow Platform EncryptionSentry
Encryption locationServiceNow cloudCustomer environment
Key custodyBYOK used in cloudFull customer control
Data sovereigntyPotential exposureMaintained at edge
Format-preserving encryptionLimitedFull FPE and SST
SaaS coverageServiceNow onlyMulti-SaaS support plus non-SaaS applications, too

Don’t let a vendor decision become your compliance problem

ServiceNow’s retirement of Edge Encryption reflects a broader shift toward cloud-native encryption models.

For organizations that relied on edge-based encryption to control how sensitive data enters SaaS environments, the change is more than a product migration, it’s an architectural and security shift.

OpenText Data Privacy & Protection Sentry restores the customer-managed encryption proxy model that Edge Encryption originally provided while extending protection across modern SaaS environments.

Organizations currently using Edge Encryption should begin evaluating their ServiceNow Edge Encryption replacement strategy early to ensure a smooth transition.

Visit our our ServiceNow Edge Encryption replacement strategy page to learn more or contact us directly.

Share this post

Share this post to x. Share to linkedin. Mail to
Krista Case avatar image

Krista Case

Krista Case leads product marketing for the OpenText™ Data Security portfolio, driving global go-to-market strategy across solutions that help enterprises discover, protect, and manage sensitive data everywhere it lives. With a focus on unified data security, AI-driven visibility, and compliance at scale, Krista translates complex security challenges into business outcomes – empowering CISOs and data leaders to reduce risk and unlock the value of trusted data. Having spent more than 15 years as a cybersecurity industry analyst prior to joining OpenText, Krista is grounded in deep market insight and strategic perspective.

See all posts

More from the author

AI data security starts with controlling access to your crown jewels

AI data security starts with controlling access to your crown jewels

In the AI era, if you don’t control the keys, you don’t control the data. Here’s why that matters.

January 29, 2026

3 min read

Data security’s next chapter: from siloed controls to a unified growth engine

Data security’s next chapter: from siloed controls to a unified growth engine

Enterprises are racing to modernize multi-hybrid cloud infrastructures and to operationalize AI. The result: data volume, velocity, and value are exploding. But so is risk….

November 17, 2025

4 min read

The AWS outage: A wake-up call for cyber resilience

The AWS outage: A wake-up call for cyber resilience

Cyber-attacks dominate headlines, but the October 20, 2025, AWS service disruption is a stark reminder that all forms of IT and cloud service outages can…

October 30, 2025

3 min read

Stay in the loop!

Receive regular insights, updates, and resources—right in your inbox.