Top Banner
Porticor YOUR KEY TO CLOUD SECURITY
12
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cloud Security & Cloud Encryption Explained

Porticor YOUR KEY TO CLOUD SECURITY

Page 2: Cloud Security & Cloud Encryption Explained

Cloud computing is happening now

Page 3: Cloud Security & Cloud Encryption Explained

• Regulatory Compliance

• Maintaining Flexibility

• Effective Key Management

Cloud security is a must for:

Page 4: Cloud Security & Cloud Encryption Explained

Cloud Data Security is a shared responsibility

Data security is your responsibility

Page 5: Cloud Security & Cloud Encryption Explained

Cloud provider

User account

Key Management SaaS vendor

key management server in the datacenter • Expensive: software licenses • Operational overhead • Defeats purpose of going to cloud in

the first place

key management in a cloud hosted by a security vendor • Problematic: puts your encryption keys in somebody

else’s hands

Approaches to Cloud Key Management - A Challenge

Page 6: Cloud Security & Cloud Encryption Explained

Porticor Virtual Private Data

Page 7: Cloud Security & Cloud Encryption Explained

What is Porticor® Virtual Private Data™ System?

• The industry’s first cloud encryption and key management system that does not sacrifice trust

• The only solution that solves the unaddressed challenge of securely storing keys in the cloud

• No changes required on the application servers • Encrypts the entire data level (databases, file

servers, distributed storage, virtual disks)

Page 8: Cloud Security & Cloud Encryption Explained

Patented Key-Splitting Technology

The “Swiss Banker” metaphor Customer has a key, “Banker” has a key

Designed for Homomorphic key encryption

Page 9: Cloud Security & Cloud Encryption Explained

Cloud servers are up in minutes. With Porticor – so is data security

• Virtual appliance, provides key management and encryption • In cloud of customer’s choice • In customer’s account • Pay as you go

Page 10: Cloud Security & Cloud Encryption Explained

Trust and control, while being 100% cloud-based

True confidentiality for data at rest, while being

100% cloud-based

Split-key encryption technology, built for homomorphic key

encryption

Data security across virtual disks, databases, distributed storage and

file systems

Only Porticor!

Page 11: Cloud Security & Cloud Encryption Explained

Data Security Needs Porticor Alternative solutions

High Security Patented split-key encryption technology

Secure cloud based key management

Designed for homomorphic key encryption

• Install a key management system in the data center, or

• Key management as a service (transfer trust from business to a third party)

Ease of Use Deployed in minutes Cost-effective operations Fully “cloudy”, dynamic & elastic Requires no expertise in

encryption and key management Full data layer encryption Secure cloud API

• Installation takes hours to days

• Requires expertise • Do not cover entire data layer • Often have no cloud API

Scalability and Elasticity

Automatic scaling of encrypted environments

• Limited

The Porticor Advantage

Page 12: Cloud Security & Cloud Encryption Explained

Visit our website

http://www.porticor.com