Cloud Security & Cloud Encryption Explained by Porticor the industry leader in Cloud Data Security. Learn from Porticor the issues for cloud security and how to protect your data in the cloud. Learn more about cloud security at http://www.porticor.com
3. Cloud security is a must for:
• Regulatory Compliance
• Maintaining Flexibility
• Effective Key Management
4. Cloud Data Security is a shared
responsibility
Data security is your responsibility
5. Approaches to Cloud Key Management - A Challenge
Cloud
provider
User account
key management server in the datacenter
• Expensive: software licenses
• Operational overhead
• Defeats purpose of going to cloud in
the first place
Key Management
SaaS vendor
key management in a cloud hosted by a security vendor
• Problematic: puts your encryption keys in somebody
else’s hands
7. What is Porticor® Virtual Private Data™ System?
• The industry’s first cloud encryption and key
management system that does not sacrifice trust
• The only solution that solves the unaddressed
challenge of securely storing keys in the cloud
• No changes required on the application servers
• Encrypts the entire data level (databases, file
servers, distributed storage, virtual disks)
8. Patented Key-Splitting Technology
The “Swiss Banker” metaphor
Customer has a key, “Banker” has a key
Designed for Homomorphic key encryption
9. Cloud servers are up in minutes.
With Porticor – so is data security
• Virtual appliance, provides key management and encryption
• In cloud of customer’s choice
• In customer’s account
• Pay as you go
10. Only Porticor!
True confidentiality for
Trust and control, while
data at rest, while being
being 100% cloud-based
100% cloud-based
Split-key encryption Data security across
technology, built for virtual disks, databases,
homomorphic key distributed storage and
encryption file systems
11. The Porticor Advantage
Data Security Needs Porticor Alternative solutions
High Security Patented split-key encryption • Install a key management
technology system in the data center, or
Secure cloud based key • Key management as a service
management (transfer trust from business
Designed for homomorphic key to a third party)
encryption
Ease of Use Deployed in minutes • Installation takes hours to
Cost-effective operations days
Fully “cloudy”, dynamic & elastic • Requires expertise
Requires no expertise in • Do not cover entire data layer
encryption and key management • Often have no cloud API
Full data layer encryption
Secure cloud API
Scalability and Automatic scaling of encrypted • Limited
Elasticity environments