Cyber attacks target ISIS in a new line of comba... » Security experts react to The New York Times article, “US Cyberattacks Target ISIS in New Line of Co... FAST and V.i. Labs join forces to educate market... » The Federation Against Software Theft (FAST) and long-term industry member V.i. Labs, have launched ... Wick Hill Wins ‘Distributor of the Year’ at IT E... » Woking, Surrey: Wick Hill has won the strongly contested ‘Distributor of the Year’ title at the IT E... Thales delivers digital trust across connected ... » Samsung Developer Conference, San Francisco, CA: Thales has announced that the SAMSUNG ARTIK™ platfo... BeyondTrust contributes threat analytics to the ... » PHOENIX: BeyondTrust has announced today that the 2016 Verizon Data Breach Investigations Report (DB... Construction hoist standard for transporting ... » BSI, the business standards company has revised BS 7212:2016 Code of practice for the safe use of co... FireMon delivers record 2015 Revenue...adds secu... » London, UK: FireMon CEO Jim Lewandowski has announced the security management firm achieved record g... PALFINGER achieves new record levels of revenue » - Revenue grew by 9.1 per cent to EUR 318.8 million - EBIT showed extraordinarily strong increase o... Industry leader covers nearly 700 compliance pol... » London, UK: Tripwire, Inc. has announced that Tripwire® Enterprise coverage for security policy and ... Varonis to stifle ransomware with new threat model... » London, UK: Varonis Systems, Inc. has announced the beta availability of more than 20 new threat mod...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

BALTIMORE: At a time when confidence in perimeter security is waning, and organisations are increasingly facing business pressure to adopt cloud strategies and consolidate their data centre resources, the question of how to securely migrate data to public, private, or hybrid cloud environments has become a primary concern. As part of its Secure Breach strategy, SafeNet has announced limited availability of the SafeNet Crypto Hypervisor, enabling organizations to virtualise their crypto resources in an efficient and scalable way, and ensuring that all data can be safely encrypted, even as it moves in a virtualised environment, in order to prevent data loss.

 

With the SafeNet Crypto Hypervisor, IT departments and service providers can deliver on-demand, elastic key vaulting and encryption services for data protection across physical, virtual, and cloud environments in minutes instead of days. The solution’s high assurance encryption services fit the cloud operations model and the full cost and innovation advantages of virtualisation can be exploited without compromising security or compliance. IT maintains full, centralised control of the delivery of encryption services such as secure key storage. Users have full control of their encryption service, and can be assured that other tenants and administrators cannot access their encryption keys.

“Although encryption is becoming more common, data is only as safe as the keys protecting it,” said Christian A. Christiansen, Program Vice President of Security Products & Services with IDC. “Storing the keys in special-purpose hardware, such as a hardware security module, is the recommended best practice. However, until now, hardware encryption solutions have not provided sufficient agility and flexibility needed in virtualised and cloud environments. Rolling out a virtual application that requires encryption, signed digital certificates, or other PKI functions can often add days or weeks to a project.”

SafeNet’s Crypto Hypervisor solves these issues by extending and virtualising the market-leading SafeNet Luna SA 5 Hardware Security Module (HSM) to fit into the operational models of virtual and cloud environments. The Crypto Hypervisor can be centrally controlled and configured by crypto administrators using the new SafeNet Crypto Command Centre.