Data protection for the cloud with ProtectV
As more data moves to private or public clouds, the number of super-users with access to an organization’s data multiplies, the risk of VMs being copied without the owner knowing increases, the possibility of temporary file trails rises, and the organization’s data is more vulnerable to being compromised.
To address the data security issues and deliver control and governance of data in the cloud, SafeNet introduces ProtectV, an encryption solution with VMware Ready status.
ProtectV enables virtual machines and storage volumes to be as secure as physical servers and storage in an on-premise environment. Customers can reap the benefits of agility and cost savings by turning their virtual datacenter or cloud into a trusted environment with data governance, control and security.
The solution is compatible with VMware vShield and VMware vCenter. In addition, it can be used by Amazon Web Services customers to secure their critical data in the cloud.
According to Mike Rothman of Securosis, “The flexibility and abstraction of the cloud means many privileged users can create new virtual instances or copies of virtual environments outside of the management console. They can also change access keys, add access or entitlements, or change permissions. This means that organizations don’t have the same level of control over network access and it’s easier for new virtual servers to be created out of thin air, significantly increasing the risk of data exposure. Security needs to be implemented directly within the virtualized instances, and organizations cannot rely solely on the cloud infrastructure to provide it.”
SafeNet ProtectV helps organizations address these challenges with a solution that centralizes the management of encrypting VMs in AWS and VMware environments. Users can manage the policy of what VMs encrypt and who should have access and by doing so, ensuring unified security policies throughout. In this way, it is possible to enjoy the advantages of the cloud and virtualization, while at the same time, achieving full, auditable compliance with regulations and maintaining the visibility for governance.
ProtectV delivers:
VM security and data isolation: SafeNet ProtectV provides granular, full-VM encryption, pre-launch authentication and an on-premise hardware root of trust, delivering protection throughout the information lifecycle. ProtectV enables you to run your systems as if it was your own private data center, even in co-mingled or multi-tenant environments. Security teams are now able to properly isolate sensitive assets and maintain ownership of their data throughout its lifecycle.
Protection from rogue admins: All VMs and associated storage volumes are encrypted, from the VM instances, snapshots and backups, across locations and disaster recovery sites. Super User Admins, who may have control of the virtualization infrastructure, cannot access the encrypted VMs.
Enforced compliance: ProtectV provides control and proof of data governance through audit logs. ProtectV enables organizations to enforce the proper controls, present a trusted audit control regardless of where the data is hosted or stored and sustain compliance with regulations, including PCI DSS, HIPAA and HITECH.
Data governance and visibility: ProtectV affords cloud security visibility through a centralized policy enforcement and audit point. SafeNet provides a trusted, high assurance key management environment, delivering ownership of data and keys. As a result, organizations and their compliance auditors are assured complete control of their keys to their data and ownership with the complete logs for the necessary visibility.
Cross-platform key management: Even the best encryption is meaningless without proper key management. As part of SafeNet’s data protection portfolio, SafeNet ProtectV integrates with SafeNet’s Enterprise Key Management solution, KeySecure. KeySecure enables security teams to centrally and uniformly manage cryptographic keys across a wide variety of their organization’s encryption platforms, streamlining key and policy administration.