Tripwire announces Asset Discovery Solution » London, UK: Tripwire, Inc.announced the debut of Tripwire® Asset Discovery Appliances, a high-perfor... HP unveils data-centric security protection enhanc... » New enterprise data security offerings from HP Atalla and HP Security Voltage address collaboration,... Tripwire announces asset discovery solution » PORTLAND, Ore.: Tripwire, Inc., has announced the debut of Tripwire® Asset Discovery Appliances, a h... Master Locksmiths Association joins powered gate... » The Master Locksmiths Association (MLA), the UK's leading trade association for the locksmith indust... Collyer Bristow is Deploying Enterprise Resource P... » LONDON, U.K LexisNexis® Enterprise has announced that Collyer Bristow LLP, a London-based law firm s... gateprotect listed in the Magic Quadrant for UTM F... » Hamburg: gateprotect, a German IT security specialist within the Rohde & Schwarz company group, was ... Duo to raise money for Blesma as part of Deloitte’... » Mark Powell, 42, and Matthew Toye, 43, will be cycling nearly 1000 miles from Land’s End to John O’G... Why so many security breaches in and around the ... » Thought it was time to get back in touch now that the summer seems to be over. Kids, or in my case g... Wrightstyle and escaping from prison fires » Wrightstyle Limited is a leading UK supplier of integrated steel and aluminium glazing systems and e... UK lockmakers meet lock attack challenge » UK police are continuing to warn householders about the vulnerability of domestic entrance door lock...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

BALTIMORE: At a time when confidence in perimeter security is waning, and organisations are increasingly facing business pressure to adopt cloud strategies and consolidate their data centre resources, the question of how to securely migrate data to public, private, or hybrid cloud environments has become a primary concern. As part of its Secure Breach strategy, SafeNet has announced limited availability of the SafeNet Crypto Hypervisor, enabling organizations to virtualise their crypto resources in an efficient and scalable way, and ensuring that all data can be safely encrypted, even as it moves in a virtualised environment, in order to prevent data loss.

 

With the SafeNet Crypto Hypervisor, IT departments and service providers can deliver on-demand, elastic key vaulting and encryption services for data protection across physical, virtual, and cloud environments in minutes instead of days. The solution’s high assurance encryption services fit the cloud operations model and the full cost and innovation advantages of virtualisation can be exploited without compromising security or compliance. IT maintains full, centralised control of the delivery of encryption services such as secure key storage. Users have full control of their encryption service, and can be assured that other tenants and administrators cannot access their encryption keys.

“Although encryption is becoming more common, data is only as safe as the keys protecting it,” said Christian A. Christiansen, Program Vice President of Security Products & Services with IDC. “Storing the keys in special-purpose hardware, such as a hardware security module, is the recommended best practice. However, until now, hardware encryption solutions have not provided sufficient agility and flexibility needed in virtualised and cloud environments. Rolling out a virtual application that requires encryption, signed digital certificates, or other PKI functions can often add days or weeks to a project.”

SafeNet’s Crypto Hypervisor solves these issues by extending and virtualising the market-leading SafeNet Luna SA 5 Hardware Security Module (HSM) to fit into the operational models of virtual and cloud environments. The Crypto Hypervisor can be centrally controlled and configured by crypto administrators using the new SafeNet Crypto Command Centre.