PorticorYOUR KEY TO CLOUD SECURITY
Cloud computing is happening now
Cloud security is a must for:• Regulatory Compliance• Maintaining Flexibility• Effective Key Management
Cloud Data Security is a shared        responsibility          Data security is your responsibility
Approaches to Cloud Key Management - A Challenge                                                                          ...
Porticor Virtual Private Data
What is Porticor® Virtual Private Data™ System?• The industry’s first cloud encryption and key  management system that doe...
Patented Key-Splitting Technology            The “Swiss Banker” metaphor                  Customer has a key, “Banker” ha...
Cloud servers are up in minutes.    With Porticor – so is data security•   Virtual appliance, provides key management and ...
Only Porticor!                           True confidentiality forTrust and control, while                           data a...
The Porticor AdvantageData Security Needs                Porticor                      Alternative solutionsHigh Security ...
Visit our websitehttp://www.porticor.com
Upcoming SlideShare
Loading in …5
×

Cloud Security & Cloud Encryption Explained

1,206 views
1,097 views

Published on

Cloud Security & Cloud Encryption Explained by Porticor the industry leader in Cloud Data Security. Learn from Porticor the issues for cloud security and how to protect your data in the cloud. Learn more about cloud security at http://www.porticor.com

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,206
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
64
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Cloud Security & Cloud Encryption Explained

  1. 1. PorticorYOUR KEY TO CLOUD SECURITY
  2. 2. Cloud computing is happening now
  3. 3. Cloud security is a must for:• Regulatory Compliance• Maintaining Flexibility• Effective Key Management
  4. 4. Cloud Data Security is a shared responsibility Data security is your responsibility
  5. 5. Approaches to Cloud Key Management - A Challenge Cloud provider User accountkey management server in the datacenter• Expensive: software licenses• Operational overhead• Defeats purpose of going to cloud in the first place Key Management SaaS vendor key management in a cloud hosted by a security vendor • Problematic: puts your encryption keys in somebody else’s hands
  6. 6. Porticor Virtual Private Data
  7. 7. What is Porticor® Virtual Private Data™ System?• The industry’s first cloud encryption and key management system that does not sacrifice trust• The only solution that solves the unaddressed challenge of securely storing keys in the cloud• No changes required on the application servers• Encrypts the entire data level (databases, file servers, distributed storage, virtual disks)
  8. 8. Patented Key-Splitting Technology The “Swiss Banker” metaphor  Customer has a key, “Banker” has a key Designed for Homomorphic key encryption
  9. 9. Cloud servers are up in minutes. With Porticor – so is data security• Virtual appliance, provides key management and encryption• In cloud of customer’s choice• In customer’s account• Pay as you go
  10. 10. Only Porticor! True confidentiality forTrust and control, while data at rest, while beingbeing 100% cloud-based 100% cloud-based Split-key encryption Data security across technology, built for virtual disks, databases, homomorphic key distributed storage and encryption file systems
  11. 11. The Porticor AdvantageData Security Needs Porticor Alternative solutionsHigh Security  Patented split-key encryption • Install a key management technology system in the data center, or  Secure cloud based key • Key management as a service management (transfer trust from business  Designed for homomorphic key to a third party) encryptionEase of Use  Deployed in minutes • Installation takes hours to  Cost-effective operations days  Fully “cloudy”, dynamic & elastic • Requires expertise  Requires no expertise in • Do not cover entire data layer encryption and key management • Often have no cloud API  Full data layer encryption  Secure cloud APIScalability and  Automatic scaling of encrypted • LimitedElasticity environments
  12. 12. Visit our websitehttp://www.porticor.com

×