Your SlideShare is downloading. ×
  • Like
Cloud Security & Cloud Encryption Explained
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Cloud Security & Cloud Encryption Explained

  • 827 views
Published

Cloud Security & Cloud Encryption Explained by Porticor the industry leader in Cloud Data Security. Learn from Porticor the issues for cloud security and how to protect your data in the cloud. Learn …

Cloud Security & Cloud Encryption Explained by Porticor the industry leader in Cloud Data Security. Learn from Porticor the issues for cloud security and how to protect your data in the cloud. Learn more about cloud security at http://www.porticor.com

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
827
On SlideShare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
49
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. PorticorYOUR KEY TO CLOUD SECURITY
  • 2. Cloud computing is happening now
  • 3. Cloud security is a must for:• Regulatory Compliance• Maintaining Flexibility• Effective Key Management
  • 4. Cloud Data Security is a shared responsibility Data security is your responsibility
  • 5. Approaches to Cloud Key Management - A Challenge Cloud provider User accountkey management server in the datacenter• Expensive: software licenses• Operational overhead• Defeats purpose of going to cloud in the first place Key Management SaaS vendor key management in a cloud hosted by a security vendor • Problematic: puts your encryption keys in somebody else’s hands
  • 6. Porticor Virtual Private Data
  • 7. What is Porticor® Virtual Private Data™ System?• The industry’s first cloud encryption and key management system that does not sacrifice trust• The only solution that solves the unaddressed challenge of securely storing keys in the cloud• No changes required on the application servers• Encrypts the entire data level (databases, file servers, distributed storage, virtual disks)
  • 8. Patented Key-Splitting Technology The “Swiss Banker” metaphor  Customer has a key, “Banker” has a key Designed for Homomorphic key encryption
  • 9. Cloud servers are up in minutes. With Porticor – so is data security• Virtual appliance, provides key management and encryption• In cloud of customer’s choice• In customer’s account• Pay as you go
  • 10. Only Porticor! True confidentiality forTrust and control, while data at rest, while beingbeing 100% cloud-based 100% cloud-based Split-key encryption Data security across technology, built for virtual disks, databases, homomorphic key distributed storage and encryption file systems
  • 11. The Porticor AdvantageData Security Needs Porticor Alternative solutionsHigh Security  Patented split-key encryption • Install a key management technology system in the data center, or  Secure cloud based key • Key management as a service management (transfer trust from business  Designed for homomorphic key to a third party) encryptionEase of Use  Deployed in minutes • Installation takes hours to  Cost-effective operations days  Fully “cloudy”, dynamic & elastic • Requires expertise  Requires no expertise in • Do not cover entire data layer encryption and key management • Often have no cloud API  Full data layer encryption  Secure cloud APIScalability and  Automatic scaling of encrypted • LimitedElasticity environments
  • 12. Visit our websitehttp://www.porticor.com