Secure Your AWS Cloud Data by Porticor

21
Porticor YOUR KEY TO CLOUD SECURITY

description

Keeping data private and secure has always been a business imperative for data privacy and regulatory compliance reasons, and as businesses seriously consider migrating to the cloud, data security is one of the most significant concerns. Once data is moved to the cloud, it becomes vulnerable to a number of new threats, and data security must be addressed jointly by the cloud provider and the customer itself. In our presentation we will discuss the shared responsibility module, review the pros and cons of current approaches to cloud data security, and discuss new and emerging technologies such as split-key encryption and partially homomorphic key encryption that enables organizations to maintain data privacy in a public cloud environment. This presentation brought to you by Ariel Dan, Co-Founder VP sales & Marketing at Porticor cloud security.

Transcript of Secure Your AWS Cloud Data by Porticor

Page 1: Secure Your AWS Cloud Data by Porticor

Porticor YOUR KEY TO CLOUD SECURITY

Page 2: Secure Your AWS Cloud Data by Porticor

• Cloud Computing is happening NOW• The Pain• Cloud Data Security is a Must• Porticor Virtual Private Data

Agenda

Page 3: Secure Your AWS Cloud Data by Porticor

Cloud computing is happening now

Page 4: Secure Your AWS Cloud Data by Porticor

Cloud computing is happening now

*Source: Cisco Global Networking Survey

Page 5: Secure Your AWS Cloud Data by Porticor

• Regulatory Compliance• Maintaining Flexibility• Effective Key Management

The Pain

Page 6: Secure Your AWS Cloud Data by Porticor

The Pain

Page 7: Secure Your AWS Cloud Data by Porticor

Cloud Data Security is a Must

Yet data security is a shared responsibility

Page 8: Secure Your AWS Cloud Data by Porticor

We strive to keep Your Content secure, but cannot guarantee that we will be successful at doing so, given the nature of the Internet. Accordingly, without limitation to Section 4.3 above and Section 11.5 below, you acknowledge that you bear sole responsibility for adequate security, protection and backup of Your Content and Applications. We strongly encourage you, where available and appropriate, to (a) use encryption technology to protect Your Content from unauthorized access, (b) routinely archive Your Content, and (c) keep your Applications or any software that you use or run with our Services current with the latest security patches or updates. We will have no liability to you for any unauthorized access or use, corruption, deletion, destruction or loss of any of Your Content or Applications.

Cloud Data Security is a Must

A Typical Cloud Security Provider Agreement

Page 9: Secure Your AWS Cloud Data by Porticor

Cloud provider

User account

Database server/s

Key Management SaaS vendor

key management server in the datacenter• Expensive: software licenses• Operational overhead • Defeats purpose of going to cloud in

the first place

key management in a cloud hosted by a security vendor• Problematic: puts your encryption keys in somebody

else’s hands

Page 10: Secure Your AWS Cloud Data by Porticor

Porticor Virtual Private Data

Page 11: Secure Your AWS Cloud Data by Porticor

What’s Porticor® Virtual Private Data™ System

• The industry’s first data encryption and key management system for the cloud that does not sacrifice trust

• The only solution that solves the unaddressed challenge of securely storing keys in the cloud

• No changes required on the application servers• Encrypts the entire data level (databases, file

servers, distributed storage, virtual disks)

Page 12: Secure Your AWS Cloud Data by Porticor

Patented Key-Splitting Technology

The “Swiss Banker” metaphor Customer has a key, “Banker” has a key

Designed for Homomorphic key encryption

Page 13: Secure Your AWS Cloud Data by Porticor

Cloud servers are up in minutes,with Porticor – so is data security

• Virtual appliance, provides key management and encryption• In cloud of customer’s choice• In customer’s account• Pay as you go

Page 14: Secure Your AWS Cloud Data by Porticor

A Typical Cloud DeploymentPorticor Added

Cloud provider

User account

Database server/s

Porticor Virtual Key Manager™

• Installed in minutes• Cost-effective cluster

operations• Full data layer encryption• Proven encryption algorithms

• Secure, cloud-based key management• Patented split-key encryption technology• Designed for homomorphic key encryption

The master key remains the sole possession of the application owner and unknown to Porticor

Dist. Storage

Virtual Disks

Page 15: Secure Your AWS Cloud Data by Porticor

Trust and control, while being 100% cloud-based

True confidentiality for data at rest, while being

100% cloud-based

Split-key encryption technology, built for homomorphic key

encryption

Data security across virtual disks, databases, distributed storage and

file systems

Only Porticor!

Page 16: Secure Your AWS Cloud Data by Porticor

Thank You

Page 17: Secure Your AWS Cloud Data by Porticor

Backup Slides

Page 18: Secure Your AWS Cloud Data by Porticor

Product Screenshots

Page 19: Secure Your AWS Cloud Data by Porticor
Page 20: Secure Your AWS Cloud Data by Porticor
Page 21: Secure Your AWS Cloud Data by Porticor

Data Security Needs Porticor Alternative solutionsHigh Security Patented split-key encryption

technology Secure cloud based key

management Designed for homomorphic key

encryption

• Install a key management system in the data center, or

• Key management as a service (transfer trust from business to a third party)

Ease of Use Deployed in minutes Cost-effective operations Fully “cloudy”, dynamic & elastic Requires no expertise in

encryption and key management Full data layer encryption Secure cloud API

• Installation takes hours to days

• Requires expertise• Do not cover entire data layer• Often have no cloud API

Scalability and Elasticity

Automatic scaling of encrypted environments

• Limited

The Porticor Advantage