12
Porticor YOUR KEY TO CLOUD SECURITY

Cloud Security & Cloud Encryption Explained

Embed Size (px)

Citation preview

Porticor YOUR KEY TO CLOUD SECURITY

Cloud computing is happening now

• Regulatory Compliance

• Maintaining Flexibility

• Effective Key Management

Cloud security is a must for:

Cloud Data Security is a shared responsibility

Data security is your responsibility

Cloud provider

User account

Key Management SaaS vendor

key management server in the datacenter • Expensive: software licenses • Operational overhead • Defeats purpose of going to cloud in

the first place

key management in a cloud hosted by a security vendor • Problematic: puts your encryption keys in somebody

else’s hands

Approaches to Cloud Key Management - A Challenge

Porticor Virtual Private Data

What is Porticor® Virtual Private Data™ System?

• The industry’s first cloud encryption and key management system that does not sacrifice trust

• The only solution that solves the unaddressed challenge of securely storing keys in the cloud

• No changes required on the application servers • Encrypts the entire data level (databases, file

servers, distributed storage, virtual disks)

Patented Key-Splitting Technology

The “Swiss Banker” metaphor Customer has a key, “Banker” has a key

Designed for Homomorphic key encryption

Cloud servers are up in minutes. With Porticor – so is data security

• Virtual appliance, provides key management and encryption • In cloud of customer’s choice • In customer’s account • Pay as you go

Trust and control, while being 100% cloud-based

True confidentiality for data at rest, while being

100% cloud-based

Split-key encryption technology, built for homomorphic key

encryption

Data security across virtual disks, databases, distributed storage and

file systems

Only Porticor!

Data Security Needs Porticor Alternative solutions

High Security Patented split-key encryption technology

Secure cloud based key management

Designed for homomorphic key encryption

• Install a key management system in the data center, or

• Key management as a service (transfer trust from business to a third party)

Ease of Use Deployed in minutes Cost-effective operations Fully “cloudy”, dynamic & elastic Requires no expertise in

encryption and key management Full data layer encryption Secure cloud API

• Installation takes hours to days

• Requires expertise • Do not cover entire data layer • Often have no cloud API

Scalability and Elasticity

Automatic scaling of encrypted environments

• Limited

The Porticor Advantage

Visit our website

http://www.porticor.com