Post on 31-Oct-2014
description
Porticor YOUR KEY TO CLOUD SECURITY
• Cloud Computing is happening NOW• The Pain• Cloud Data Security is a Must• Porticor Virtual Private Data
Agenda
Cloud computing is happening now
Cloud computing is happening now
*Source: Cisco Global Networking Survey
• Regulatory Compliance• Maintaining Flexibility• Effective Key Management
The Pain
The Pain
Cloud Data Security is a Must
Yet data security is a shared responsibility
We strive to keep Your Content secure, but cannot guarantee that we will be successful at doing so, given the nature of the Internet. Accordingly, without limitation to Section 4.3 above and Section 11.5 below, you acknowledge that you bear sole responsibility for adequate security, protection and backup of Your Content and Applications. We strongly encourage you, where available and appropriate, to (a) use encryption technology to protect Your Content from unauthorized access, (b) routinely archive Your Content, and (c) keep your Applications or any software that you use or run with our Services current with the latest security patches or updates. We will have no liability to you for any unauthorized access or use, corruption, deletion, destruction or loss of any of Your Content or Applications.
Cloud Data Security is a Must
A Typical Cloud Security Provider Agreement
Cloud provider
User account
Database server/s
Key Management SaaS vendor
key management server in the datacenter• Expensive: software licenses• Operational overhead • Defeats purpose of going to cloud in
the first place
key management in a cloud hosted by a security vendor• Problematic: puts your encryption keys in somebody
else’s hands
Porticor Virtual Private Data
What’s Porticor® Virtual Private Data™ System
• The industry’s first data encryption and key management system for the cloud that does not sacrifice trust
• The only solution that solves the unaddressed challenge of securely storing keys in the cloud
• No changes required on the application servers• Encrypts the entire data level (databases, file
servers, distributed storage, virtual disks)
Patented Key-Splitting Technology
The “Swiss Banker” metaphor Customer has a key, “Banker” has a key
Designed for Homomorphic key encryption
Cloud servers are up in minutes,with Porticor – so is data security
• Virtual appliance, provides key management and encryption• In cloud of customer’s choice• In customer’s account• Pay as you go
A Typical Cloud DeploymentPorticor Added
Cloud provider
User account
Database server/s
Porticor Virtual Key Manager™
• Installed in minutes• Cost-effective cluster
operations• Full data layer encryption• Proven encryption algorithms
• Secure, cloud-based key management• Patented split-key encryption technology• Designed for homomorphic key encryption
The master key remains the sole possession of the application owner and unknown to Porticor
Dist. Storage
Virtual Disks
Trust and control, while being 100% cloud-based
True confidentiality for data at rest, while being
100% cloud-based
Split-key encryption technology, built for homomorphic key
encryption
Data security across virtual disks, databases, distributed storage and
file systems
Only Porticor!
Thank You
Backup Slides
Product Screenshots
Data Security Needs Porticor Alternative solutionsHigh Security Patented split-key encryption
technology Secure cloud based key
management Designed for homomorphic key
encryption
• Install a key management system in the data center, or
• Key management as a service (transfer trust from business to a third party)
Ease of Use Deployed in minutes Cost-effective operations Fully “cloudy”, dynamic & elastic Requires no expertise in
encryption and key management Full data layer encryption Secure cloud API
• Installation takes hours to days
• Requires expertise• Do not cover entire data layer• Often have no cloud API
Scalability and Elasticity
Automatic scaling of encrypted environments
• Limited
The Porticor Advantage