• Regulatory Compliance
• Maintaining Flexibility
• Effective Key Management
Cloud security is a must for:
Cloud provider
User account
Key Management SaaS vendor
key management server in the datacenter • Expensive: software licenses • Operational overhead • Defeats purpose of going to cloud in
the first place
key management in a cloud hosted by a security vendor • Problematic: puts your encryption keys in somebody
else’s hands
Approaches to Cloud Key Management - A Challenge
What is Porticor® Virtual Private Data™ System?
• The industry’s first cloud encryption and key management system that does not sacrifice trust
• The only solution that solves the unaddressed challenge of securely storing keys in the cloud
• No changes required on the application servers • Encrypts the entire data level (databases, file
servers, distributed storage, virtual disks)
Patented Key-Splitting Technology
The “Swiss Banker” metaphor Customer has a key, “Banker” has a key
Designed for Homomorphic key encryption
Cloud servers are up in minutes. With Porticor – so is data security
• Virtual appliance, provides key management and encryption • In cloud of customer’s choice • In customer’s account • Pay as you go
Trust and control, while being 100% cloud-based
True confidentiality for data at rest, while being
100% cloud-based
Split-key encryption technology, built for homomorphic key
encryption
Data security across virtual disks, databases, distributed storage and
file systems
Only Porticor!
Data Security Needs Porticor Alternative solutions
High Security Patented split-key encryption technology
Secure cloud based key management
Designed for homomorphic key encryption
• Install a key management system in the data center, or
• Key management as a service (transfer trust from business to a third party)
Ease of Use Deployed in minutes Cost-effective operations Fully “cloudy”, dynamic & elastic Requires no expertise in
encryption and key management Full data layer encryption Secure cloud API
• Installation takes hours to days
• Requires expertise • Do not cover entire data layer • Often have no cloud API
Scalability and Elasticity
Automatic scaling of encrypted environments
• Limited
The Porticor Advantage
Top Related