Securing Communications in the Cloud Security Guide

3
Securing Communications in the Cloud Security Guide TRUSTED CLOUD FABRIC

description

Whether an organization is moving aggressively or cautiously into cloud-based services,the reality is that just about every enterprise will have a hybrid mix of services—includingon-premise, private cloud, and public cloud—in place at any given time. As a result,an organization’s sensitive assets will often need to be transported across a wide areanetwork (WAN) as data and processing are shared across these geographically distributeddeployments. To build a trusted hybrid multi-site infrastructure, enterprises need to employencryption to secure the transport of data across their WANs, while at the same time, ensuringhigh-speed and low-latency communications between these distributed sites.

Transcript of Securing Communications in the Cloud Security Guide

Page 1: Securing Communications in the Cloud Security Guide

Securing Communications in the Cloud

Security Guide

TRUSTED CLOUDFABRIC

Page 2: Securing Communications in the Cloud Security Guide

Securing Communications in the Cloud Security Guide 1

Overview

Whether an organization is moving aggressively or cautiously into cloud-based services, the reality is that just about every enterprise will have a hybrid mix of services—including on-premise, private cloud, and public cloud—in place at any given time. As a result, an organization’s sensitive assets will often need to be transported across a wide area network (WAN) as data and processing are shared across these geographically distributed deployments. To build a trusted hybrid multi-site infrastructure, enterprises need to employ encryption to secure the transport of data across their WANs, while at the same time, ensuring high-speed and low-latency communications between these distributed sites.

The Role of Network Encryption in the Cloud

Today, SafeNet offers advanced Layer 2 encryption solutions that enable organizations to secure WAN communications in a virtualized cloud environment—while eliminating the challenges and obstacles presented by traditional IPsec encryption approaches. High-speed Layer 2 encryption technology introduces zero-protocol overhead so that maximum bandwidth is available for data to move to the cloud – up to 50% more effi cient than competing technologies. This solution provides the fastest network encryption available for real-time communications and data transfer, operating at true line speed.

SafeNet Ethernet Encryptors provide the administrative effi ciency, and optimized performance and bandwidth utilization that make it ideally suited to enterprise hybrid cloud environments.

Boost user productivity. • Through its high performance and reliability, SafeNet enables authorized users to quickly and securely transfer communications, media, and other data from the enterprise to the cloud—optimizing productivity.

Lower costs.• By eliminating costly overhead for expensive transport pipes and providing full throughput, SafeNet offers immediate cost savings in the cloud and across the enterprise. In addition, as your cloud model evolves, new devices can be added easily into your existing cloud environment by centralizing and streamlining security administration, management, and enforcement.

Increase business agility. • Inherently, cloud offerings enable organizations to scale or contract much more quickly and cost-effectively than if they were relying on internally hosted infrastructures. Through its support of dynamic cloud environments, SafeNet provides organizations with an unparalleled ability to take advantage of the cloud’s fl exibility to more quickly adapt to changing requirements.

On-premise

High Speed Encryptor

Private

Securing Communications in the Cloud

SECURITY GUIDE

Page 3: Securing Communications in the Cloud Security Guide

Securing Communications in the Cloud Security Guide 2

Contact Us: For all offi ce locations and contact information, please visit www.safenet-inc.com

Follow Us: www.safenet-inc.com/connected

©2011 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. ScG (EN)-02.10.11

Benefi ts of SafeNet Ethernet Encryptors in Cloud Environments

With SafeNet Ethernet Encryptors, organizations can ensure trusted communications across all of their cloud-based and internally hosted sites, resulting in a range of benefi ts:

Boost user productivity.• Through its high performance and reliability, SafeNet enables authorized users to quickly and securely transfer communications, media, and other data from the enterprise to the cloud—optimizing productivity.

Protect massive amounts of data with high throughput, zero latency, and minimal • protocol overhead

Lower costs. • By eliminating costly overhead for expensive transport pipes and providing full throughput, SafeNet offers immediate cost savings in the cloud and across the enterprise. As your cloud model evolves, new devices can be added easily by centralizing and streamlining security administration, management, and enforcement.

Simple to deploy and require little maintenance, thus reducing implementation and • operational costs

Encrypting at Layer 2 greatly improves bandwidth effi ciency•

Increase business agility. • Inherently, cloud offerings enable organizations to scale or contract much more quickly and cost-effectively than if they were relying on internally hosted infrastructures. Through its support of dynamic cloud environments, SafeNet provides organizations with an unparalleled ability to take advantage of the cloud’s fl exibility to more quickly adapt to changing requirements.

Central control and management across multiple remote stations using SafeNet’s • Security Management Center (SMC)

Five minute installation and deployment—With SMC’s point-and-click interface and • confi guration wizards, it’s easy to visualize, confi gure, modify, and manage network security

Why Encrypt at Layer 2 in a

Virtualized Environment?

SafeNet offers advanced Layer 2 encryption solutions that eliminate the challenges and obstacles presented by Layer 3 encryption approaches.

Minimal CostSimple policy for fast setup • and integration

Minimal ongoing maintenance •

Better bandwidth utilization • (up to 50%)

Simple Management•

IPv4 transparent to encryption • policy

Encryption can have no effect • on high-layer IP routing design

Protects legacy layer 3 • protocols

Maximum PerformanceLow overhead – Needed for • new bandwidth intensive applications

No GRE or complex QoS • schemes

Low latency – microseconds • vs. milliseconds