Free-of-charge white paper informs about the ris... » London: Wherever secure transactions or network access are required, the person requesting access fi... KAICIID joins call by the global community to end ... » In northern Iraq, brutal violence has led to the murder of thousands of innocent civilians. Many rel... Former Army Air Corps pilot helps limbless veteran... » The Gazelle Military Helicopter Trust has been set up to restore Gazelle helicopters that have been ... Best Use of Stop and Search scheme » The Metropolitan Police Service [MPS] welcomes today's further announcement by the Home Secretary re... IPSecurityCenter chosen for Hospital PSIM Project ... » CNL Software has been chosen to provide a comprehensive security management system for a hospital fa... Check Point makes it again as a leader in the Gar... » Check Point has announced that it is again positioned as a Leader in the 2014 Gartner Magic Quadrant... NXT-ID approved for NASDAQ capital market listing » SHELTON, Conn.: NXT-ID, Inc. has announced that its shares of common stock and the warrants to purch... Notting Hill Housing Group chooses Guardian24 to p... » Belfast, UK: One of London’s leading housing associations continues investment in their staff’s pers... Parallels launches Parallels Desktop 10 for Mac ... » LONDON, UK: Parallels has launched Parallels Desktop® 10 for Mac and Parallels Desktop 10 for Mac En... Transactis wins Management Today award for work th... » Consumer insight and anti-fraud company Transactis has been named SME (Small and Medium Enterprise) ...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

BALTIMORE: At a time when confidence in perimeter security is waning, and organisations are increasingly facing business pressure to adopt cloud strategies and consolidate their data centre resources, the question of how to securely migrate data to public, private, or hybrid cloud environments has become a primary concern. As part of its Secure Breach strategy, SafeNet has announced limited availability of the SafeNet Crypto Hypervisor, enabling organizations to virtualise their crypto resources in an efficient and scalable way, and ensuring that all data can be safely encrypted, even as it moves in a virtualised environment, in order to prevent data loss.

 

With the SafeNet Crypto Hypervisor, IT departments and service providers can deliver on-demand, elastic key vaulting and encryption services for data protection across physical, virtual, and cloud environments in minutes instead of days. The solution’s high assurance encryption services fit the cloud operations model and the full cost and innovation advantages of virtualisation can be exploited without compromising security or compliance. IT maintains full, centralised control of the delivery of encryption services such as secure key storage. Users have full control of their encryption service, and can be assured that other tenants and administrators cannot access their encryption keys.

“Although encryption is becoming more common, data is only as safe as the keys protecting it,” said Christian A. Christiansen, Program Vice President of Security Products & Services with IDC. “Storing the keys in special-purpose hardware, such as a hardware security module, is the recommended best practice. However, until now, hardware encryption solutions have not provided sufficient agility and flexibility needed in virtualised and cloud environments. Rolling out a virtual application that requires encryption, signed digital certificates, or other PKI functions can often add days or weeks to a project.”

SafeNet’s Crypto Hypervisor solves these issues by extending and virtualising the market-leading SafeNet Luna SA 5 Hardware Security Module (HSM) to fit into the operational models of virtual and cloud environments. The Crypto Hypervisor can be centrally controlled and configured by crypto administrators using the new SafeNet Crypto Command Centre.