SafeNet looks to secure data in the cloud
- 04 March, 2010 01:23
Encryption vendor SafeNet is now offering technologies that help enterprises securely store and access information held in third-party data centers.
Companies are increasing shifting their computing to vendor-hosted data centers, which poses new challenges for how information is stored, moved and accessed, said Peter Schill, SafeNet's director of channel sales, at Cebit on Wednesday.
Since company networks no longer have a traditional perimeter, the data itself must be controlled, he said.
"If you start to rent storage space here and computing power there, there is no control of who actually can access your data or manipulate your data," Schill said. "Cloud computing is not a threat to security. It can be solved if you have the right technologies in place."
SafeNet's strategy is to focus on access control and encryption. The technology in one of the new products -- intelligent authentication tokens -- comes from SafeNet's acquisition in January 2009 of Aladdin Knowledge Systems.
The tokens allow administrators to control who accesses data at any point in the cloud, the company said.
Another component is encryption. SafeNet has a hardware appliance that can manage the keys used to encrypt databases, applications and other information, Schill said. The appliance centralizes encryption processing and performs other functions such as logging, auditing and policy administration.
SafeNet doesn't have a name for its cloud security technologies. The products can be bought as a bundle of separate complimentary products including the DataSecure encryption family, eToken multi hybrid authentication solution and the Luna Hardware Security Modules. SafeNet also offers a "virtual appliance" that can be installed on another server.
SafeNet has many competitors in the areas of authentication tokens or encryption, but Schill said SafeNet has an edge as its central management and encryption system can be used with different databases such as IBM's DB2, Microsoft's SQL or Oracle products.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.
IDC: Delivering Customer Value with Enterprise Flash Deployments
When it comes to flash, “one size does not fit all.” IDC examines recent flash trends in enterprise storage deployments. This includes: highlighting how SSDs are filling in gaps of existing storage systems when coupled with intelligent archiving and automated tiering, the pros and cons of different SSD approaches, and tips to overcome concerns of reliability, manageability and scalability.
The Foundation for Cloud Management
For businesses looking to provide real-time business solutions to employees and customers alike, you need to have a comprehensive network management strategy. The network is the foundation of all successful cloud services; it must be robust to meet traffic, efficiency, and performance demands. Download today the four steps to get your network operations cloud-ready.