Symetrica presents compact and ultra-light weara... » Berkeley, CA: Symetrica has introduced a prototype wearable detector system that provides high-sensi... Encode launches first security analytics and res... » London, UK: Encode recently launched SaaS version and its managed security monitoring solution, offe... BeyondTrust CEO named finalist for the EY Entre... » PHOENIX: BeyondTrust has announced that its CEO, Kevin Hickey, has been named a finalist for the EY ... TALKTALK ADOPTS SKYGUARD’S MYSOS LONE WORKER ... » TalkTalk, the UK’s leading value for money provider of broadband, mobile and TV services, has turned... Tools, skills and budgets can help developers figh... » Tel Aviv, Israel: Checkmarx has  announced that three recent reports highlight the challenge faced b... Logicalis Europe announces membership of Global ... » London, UK: Logicalis Europe has announced that it has become the first corporate member of Unlockin... Tectrade brings copy data management to the UK w... » Woodcliff Lake, NJ: Catalogic Software has  announced that Tectrade has joined the Catalogic partner... ASC meets evidence-proof recording and archiving r... » Hoesbach/Germany: ASC Technologies has announced its neo recording suite will help to meet the needs... Thales hardware security modules achieve common cr... » Plantation, Fla.: Thales has announced that its nShield hardware security modules (HSMs) have receiv... Hongqiao Airport uses Qognify’s solution to ensure... » Qognify, formerly NICE Security, has announced that Hongqiao Airport in Shanghai, China, is marking ...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

BALTIMORE: At a time when confidence in perimeter security is waning, and organisations are increasingly facing business pressure to adopt cloud strategies and consolidate their data centre resources, the question of how to securely migrate data to public, private, or hybrid cloud environments has become a primary concern. As part of its Secure Breach strategy, SafeNet has announced limited availability of the SafeNet Crypto Hypervisor, enabling organizations to virtualise their crypto resources in an efficient and scalable way, and ensuring that all data can be safely encrypted, even as it moves in a virtualised environment, in order to prevent data loss.

 

With the SafeNet Crypto Hypervisor, IT departments and service providers can deliver on-demand, elastic key vaulting and encryption services for data protection across physical, virtual, and cloud environments in minutes instead of days. The solution’s high assurance encryption services fit the cloud operations model and the full cost and innovation advantages of virtualisation can be exploited without compromising security or compliance. IT maintains full, centralised control of the delivery of encryption services such as secure key storage. Users have full control of their encryption service, and can be assured that other tenants and administrators cannot access their encryption keys.

“Although encryption is becoming more common, data is only as safe as the keys protecting it,” said Christian A. Christiansen, Program Vice President of Security Products & Services with IDC. “Storing the keys in special-purpose hardware, such as a hardware security module, is the recommended best practice. However, until now, hardware encryption solutions have not provided sufficient agility and flexibility needed in virtualised and cloud environments. Rolling out a virtual application that requires encryption, signed digital certificates, or other PKI functions can often add days or weeks to a project.”

SafeNet’s Crypto Hypervisor solves these issues by extending and virtualising the market-leading SafeNet Luna SA 5 Hardware Security Module (HSM) to fit into the operational models of virtual and cloud environments. The Crypto Hypervisor can be centrally controlled and configured by crypto administrators using the new SafeNet Crypto Command Centre.