Porticor
YOUR KEY TO CLOUD SECURITY
Cloud computing is happening now
Cloud security is a must for:

• Regulatory Compliance
• Maintaining Flexibility
• Effective Key Management
Cloud Data Security is a shared
        responsibility




          Data security is your responsibility
Approaches to Cloud Key Management - A Challenge
                                                                          Cloud
                                                                         provider

                                                                       User account
key management server in the datacenter
• Expensive: software licenses
• Operational overhead
• Defeats purpose of going to cloud in
    the first place




                              Key Management
                                SaaS vendor

               key management in a cloud hosted by a security vendor
               • Problematic: puts your encryption keys in somebody
                   else’s hands
Porticor Virtual Private Data
What is Porticor® Virtual Private Data™ System?

• The industry’s first cloud encryption and key
  management system that does not sacrifice trust
• The only solution that solves the unaddressed
  challenge of securely storing keys in the cloud
• No changes required on the application servers
• Encrypts the entire data level (databases, file
  servers, distributed storage, virtual disks)
Patented Key-Splitting Technology




            The “Swiss Banker” metaphor
                  Customer has a key, “Banker” has a key
                   Designed for Homomorphic key encryption
Cloud servers are up in minutes.
    With Porticor – so is data security




•   Virtual appliance, provides key management and encryption
•   In cloud of customer’s choice
•   In customer’s account
•   Pay as you go
Only Porticor!
                           True confidentiality for
Trust and control, while
                           data at rest, while being
being 100% cloud-based
                              100% cloud-based



  Split-key encryption       Data security across
  technology, built for    virtual disks, databases,
   homomorphic key         distributed storage and
       encryption                 file systems
The Porticor Advantage
Data Security Needs                Porticor                      Alternative solutions
High Security          Patented split-key encryption       • Install a key management
                        technology                            system in the data center, or
                       Secure cloud based key              • Key management as a service
                        management                            (transfer trust from business
                       Designed for homomorphic key          to a third party)
                        encryption
Ease of Use            Deployed in minutes                 • Installation takes hours to
                       Cost-effective operations             days
                       Fully “cloudy”, dynamic & elastic   • Requires expertise
                       Requires no expertise in            • Do not cover entire data layer
                        encryption and key management       • Often have no cloud API
                       Full data layer encryption
                       Secure cloud API
Scalability and        Automatic scaling of encrypted      • Limited
Elasticity              environments
Visit our website
http://www.porticor.com

Cloud Security & Cloud Encryption Explained

  • 1.
    Porticor YOUR KEY TOCLOUD SECURITY
  • 2.
    Cloud computing ishappening now
  • 3.
    Cloud security isa must for: • Regulatory Compliance • Maintaining Flexibility • Effective Key Management
  • 4.
    Cloud Data Securityis a shared responsibility Data security is your responsibility
  • 5.
    Approaches to CloudKey Management - A Challenge Cloud provider User account key management server in the datacenter • Expensive: software licenses • Operational overhead • Defeats purpose of going to cloud in the first place Key Management SaaS vendor key management in a cloud hosted by a security vendor • Problematic: puts your encryption keys in somebody else’s hands
  • 6.
  • 7.
    What is Porticor®Virtual Private Data™ System? • The industry’s first cloud encryption and key management system that does not sacrifice trust • The only solution that solves the unaddressed challenge of securely storing keys in the cloud • No changes required on the application servers • Encrypts the entire data level (databases, file servers, distributed storage, virtual disks)
  • 8.
    Patented Key-Splitting Technology The “Swiss Banker” metaphor  Customer has a key, “Banker” has a key Designed for Homomorphic key encryption
  • 9.
    Cloud servers areup in minutes. With Porticor – so is data security • Virtual appliance, provides key management and encryption • In cloud of customer’s choice • In customer’s account • Pay as you go
  • 10.
    Only Porticor! True confidentiality for Trust and control, while data at rest, while being being 100% cloud-based 100% cloud-based Split-key encryption Data security across technology, built for virtual disks, databases, homomorphic key distributed storage and encryption file systems
  • 11.
    The Porticor Advantage DataSecurity Needs Porticor Alternative solutions High Security  Patented split-key encryption • Install a key management technology system in the data center, or  Secure cloud based key • Key management as a service management (transfer trust from business  Designed for homomorphic key to a third party) encryption Ease of Use  Deployed in minutes • Installation takes hours to  Cost-effective operations days  Fully “cloudy”, dynamic & elastic • Requires expertise  Requires no expertise in • Do not cover entire data layer encryption and key management • Often have no cloud API  Full data layer encryption  Secure cloud API Scalability and  Automatic scaling of encrypted • Limited Elasticity environments
  • 12.