19.10.2013 Views

Safeguarding Sensitive Data in the Cloud and Virtual ... - ADN

Safeguarding Sensitive Data in the Cloud and Virtual ... - ADN

Safeguarding Sensitive Data in the Cloud and Virtual ... - ADN

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ProtectV is a virtual server-based<br />

solution, which enables it to<br />

adapt to <strong>the</strong> fluidity of virtual<br />

environments.<br />

• adm<strong>in</strong>istrative exposure. Ano<strong>the</strong>r potential challenge is posed by <strong>the</strong> chang<strong>in</strong>g dynamics<br />

of adm<strong>in</strong>istration <strong>in</strong> virtualized environments. Compared to prior comput<strong>in</strong>g models,<br />

cloud <strong>and</strong> virtualization ultimately <strong>in</strong>troduce more privileged users <strong>and</strong> a new class of<br />

adm<strong>in</strong>istrators. Typically, teams of adm<strong>in</strong>istrators focused on servers, storage, backups,<br />

<strong>and</strong> applications will have some level of access <strong>in</strong> virtual environments, <strong>and</strong> quite often<br />

security policies <strong>and</strong> adm<strong>in</strong>istrative functions are h<strong>and</strong>led <strong>in</strong>dependently by each<br />

group. Fur<strong>the</strong>r, companies who use <strong>the</strong> public cloud will have <strong>the</strong>ir data h<strong>and</strong>led by<br />

adm<strong>in</strong>istrators who usually work for <strong>the</strong> cloud provider, not for <strong>the</strong> company itself. These<br />

adm<strong>in</strong>istrators must be able to move <strong>the</strong> data but not be able to view or access it.<br />

Introduc<strong>in</strong>g SafeNet protectV<br />

Today, SafeNet ProtectV enables organizations to leverage <strong>the</strong> bus<strong>in</strong>ess benefits of<br />

virtualization <strong>and</strong> cloud services, while help<strong>in</strong>g to meet <strong>the</strong>ir governance, compliance, <strong>and</strong><br />

data protection requirements. With ProtectV, organizations can encrypt <strong>and</strong> secure entire<br />

virtualized mach<strong>in</strong>es, protect<strong>in</strong>g <strong>the</strong>se assets from <strong>the</strong>ft or exposure. Fur<strong>the</strong>r, with ProtectV,<br />

security teams can encrypt virtual storage, ensur<strong>in</strong>g cloud data is isolated <strong>and</strong> secured—even<br />

<strong>in</strong> shared, multi-tenant cloud environments. ProtectV can be deployed <strong>in</strong> public clouds, private<br />

clouds, <strong>and</strong> virtual datacenters.<br />

ProtectV is a virtual server-based solution, which enables it to adapt to <strong>the</strong> fluidity of virtual<br />

environments. At <strong>the</strong> same time, ProtectV is seamlessly <strong>in</strong>tegrated with SafeNet KeySecure,<br />

a high availability, appliance-based key management solution that provides a hardened root<br />

of trust with<strong>in</strong> <strong>the</strong> customer’s premises. With this comb<strong>in</strong>ation, <strong>the</strong> ProtectV solution enables<br />

security teams to enjoy <strong>the</strong>se advantages:<br />

• Leverage <strong>the</strong> deepest, most comprehensive visibility of virtual environments <strong>in</strong> order to<br />

enable effective governance.<br />

• Ensure <strong>the</strong> highest levels of compliance with all relevant policies <strong>and</strong> regulatory<br />

m<strong>and</strong>ates.<br />

• Apply maximum security <strong>and</strong> protection to sensitive data assets <strong>in</strong> virtual environments.<br />

protectV: Key Capabilities<br />

Through its <strong>in</strong>tegration with KeySecure, ProtectV enables organizations to leverage a<br />

hardened appliance for secur<strong>in</strong>g keys, policies, <strong>and</strong> cryptographic process<strong>in</strong>g. At <strong>the</strong> same<br />

time, <strong>the</strong> solution is efficiently deployed <strong>in</strong> highly dynamic virtual <strong>and</strong> cloud environments,<br />

so organizations can reta<strong>in</strong> complete control over keys <strong>and</strong> sensitive assets with<strong>in</strong> <strong>the</strong>ir<br />

premises—while embrac<strong>in</strong>g <strong>the</strong> opportunities provided by virtualization <strong>and</strong> cloud delivery<br />

models.<br />

Follow<strong>in</strong>g are a few of <strong>the</strong> solution’s key capabilities:<br />

• Flexible <strong>in</strong>tegration. ProtectV offers complete support for automated, highly dynamic<br />

virtual environments, which is vital <strong>in</strong> both ensur<strong>in</strong>g critical security mechanisms are<br />

consistently enforced <strong>and</strong> <strong>in</strong> streaml<strong>in</strong><strong>in</strong>g security adm<strong>in</strong>istration. A ProtectV API is<br />

available, which enables flexible <strong>in</strong>tegration <strong>in</strong> cloud <strong>and</strong> virtual environments. With <strong>the</strong><br />

API, organizations can configure a range of comm<strong>and</strong>s, <strong>in</strong>clud<strong>in</strong>g sett<strong>in</strong>g or retriev<strong>in</strong>g<br />

cloud credentials, list<strong>in</strong>g virtual mach<strong>in</strong>es secured, start<strong>in</strong>g or stopp<strong>in</strong>g virtual mach<strong>in</strong>es,<br />

<strong>and</strong> more.<br />

• Extensibility. Through its <strong>in</strong>tegration with KeySecure <strong>and</strong> o<strong>the</strong>r SafeNet security<br />

solutions, ProtectV can support exp<strong>and</strong>ed cryptographic services. Consequently, <strong>the</strong><br />

solution represents an <strong>in</strong>vestment that can be leveraged over <strong>the</strong> long term, even as<br />

<strong>in</strong>frastructures, bus<strong>in</strong>ess objectives, <strong>and</strong> security requirements evolve.<br />

<strong>Safeguard<strong>in</strong>g</strong> <strong>Sensitive</strong> <strong>Data</strong> <strong>in</strong> <strong>the</strong> <strong>Cloud</strong> <strong>and</strong> <strong>Virtual</strong> <strong>Data</strong>centers<br />

A Technical Overview of SafeNet ProtectV Whitepaper<br />

2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!