Secure Your AWS Cloud Data by Porticor

Post on 31-Oct-2014

891 views 0 download

Tags:

description

Keeping data private and secure has always been a business imperative for data privacy and regulatory compliance reasons, and as businesses seriously consider migrating to the cloud, data security is one of the most significant concerns. Once data is moved to the cloud, it becomes vulnerable to a number of new threats, and data security must be addressed jointly by the cloud provider and the customer itself. In our presentation we will discuss the shared responsibility module, review the pros and cons of current approaches to cloud data security, and discuss new and emerging technologies such as split-key encryption and partially homomorphic key encryption that enables organizations to maintain data privacy in a public cloud environment. This presentation brought to you by Ariel Dan, Co-Founder VP sales & Marketing at Porticor cloud security.

Transcript of Secure Your AWS Cloud Data by Porticor

Porticor YOUR KEY TO CLOUD SECURITY

• Cloud Computing is happening NOW• The Pain• Cloud Data Security is a Must• Porticor Virtual Private Data

Agenda

Cloud computing is happening now

Cloud computing is happening now

*Source: Cisco Global Networking Survey

• Regulatory Compliance• Maintaining Flexibility• Effective Key Management

The Pain

The Pain

Cloud Data Security is a Must

Yet data security is a shared responsibility

We strive to keep Your Content secure, but cannot guarantee that we will be successful at doing so, given the nature of the Internet. Accordingly, without limitation to Section 4.3 above and Section 11.5 below, you acknowledge that you bear sole responsibility for adequate security, protection and backup of Your Content and Applications. We strongly encourage you, where available and appropriate, to (a) use encryption technology to protect Your Content from unauthorized access, (b) routinely archive Your Content, and (c) keep your Applications or any software that you use or run with our Services current with the latest security patches or updates. We will have no liability to you for any unauthorized access or use, corruption, deletion, destruction or loss of any of Your Content or Applications.

Cloud Data Security is a Must

A Typical Cloud Security Provider Agreement

Cloud provider

User account

Database server/s

Key Management SaaS vendor

key management server in the datacenter• Expensive: software licenses• Operational overhead • Defeats purpose of going to cloud in

the first place

key management in a cloud hosted by a security vendor• Problematic: puts your encryption keys in somebody

else’s hands

Porticor Virtual Private Data

What’s Porticor® Virtual Private Data™ System

• The industry’s first data encryption and key management system for the cloud that does not sacrifice trust

• The only solution that solves the unaddressed challenge of securely storing keys in the cloud

• No changes required on the application servers• Encrypts the entire data level (databases, file

servers, distributed storage, virtual disks)

Patented Key-Splitting Technology

The “Swiss Banker” metaphor Customer has a key, “Banker” has a key

Designed for Homomorphic key encryption

Cloud servers are up in minutes,with Porticor – so is data security

• Virtual appliance, provides key management and encryption• In cloud of customer’s choice• In customer’s account• Pay as you go

A Typical Cloud DeploymentPorticor Added

Cloud provider

User account

Database server/s

Porticor Virtual Key Manager™

• Installed in minutes• Cost-effective cluster

operations• Full data layer encryption• Proven encryption algorithms

• Secure, cloud-based key management• Patented split-key encryption technology• Designed for homomorphic key encryption

The master key remains the sole possession of the application owner and unknown to Porticor

Dist. Storage

Virtual Disks

Trust and control, while being 100% cloud-based

True confidentiality for data at rest, while being

100% cloud-based

Split-key encryption technology, built for homomorphic key

encryption

Data security across virtual disks, databases, distributed storage and

file systems

Only Porticor!

Thank You

Backup Slides

Product Screenshots

Data Security Needs Porticor Alternative solutionsHigh Security Patented split-key encryption

technology Secure cloud based key

management Designed for homomorphic key

encryption

• Install a key management system in the data center, or

• Key management as a service (transfer trust from business to a third party)

Ease of Use Deployed in minutes Cost-effective operations Fully “cloudy”, dynamic & elastic Requires no expertise in

encryption and key management Full data layer encryption Secure cloud API

• Installation takes hours to days

• Requires expertise• Do not cover entire data layer• Often have no cloud API

Scalability and Elasticity

Automatic scaling of encrypted environments

• Limited

The Porticor Advantage