The Porticor Virtual Private Data solution includes two or three major components:



Similar documents
Securing Data in the Cloud

StorReduce Technical White Paper Cloud-based Data Deduplication

Cloud Panel Service Evaluation Scenarios

Vess A2000 Series HA Surveillance with Milestone XProtect VMS Version 1.0

XTM Web 2.0 Enterprise Architecture Hardware Implementation Guidelines. A.Zydroń 18 April Page 1 of 12

NCTA Cloud Architecture

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Best Practices for Using MySQL in the Cloud

Alfresco Enterprise on AWS: Reference Architecture

How To Use Aws.Com

What is Cloud Computing? Tackling the Challenges of Big Data. Tackling The Challenges of Big Data. Matei Zaharia. Matei Zaharia. Big Data Collection

Tivoli Storage Flashcopy Manager for Windows - Tips to implement retry capability to FCM offload backup. Cloud & Smarter Infrastructure IBM Japan

Solution for private cloud computing

Amazon Elastic Beanstalk

Abstract 1. INTRODUCTION

Server Virtualization with Windows Server Hyper-V and System Center

Securing the Service Desk in the Cloud

Managed Servers ASA Extract FY14

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

VMware Cloud Environment

Enabling Database-as-a-Service (DBaaS) within Enterprises or Cloud Offerings

Securing Cloud Computing by GED-i

PostgreSQL Performance Characteristics on Joyent and Amazon EC2

HP OO 10.X - SiteScope Monitoring Templates

IBM Cloud Manager with OpenStack

Hardware and Software Requirements for Installing California.pro

Server Virtualization with Windows Server Hyper-V and System Center

SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform Reference Architecture

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

Sistemi Operativi e Reti. Cloud Computing

Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok

Managed Encryption Service

An Introduction to Cloud Computing Concepts

Alfresco Enterprise on Azure: Reference Architecture. September 2014

Using ArcGIS for Server in the Amazon Cloud

SEP Disaster Recovery and Backup Restore: Best

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone

High Availability with Elixir

CLOUD COMPUTING & WINDOWS AZURE

Server Virtualization with Windows Server Hyper-V and System Center

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Veeam Backup and Replication Architecture and Deployment. Nelson Simao Systems Engineer

EMC DATA DOMAIN ENCRYPTION A Detailed Review

Live Vertical Scaling

BMC s Security Strategy for ITSM in the SaaS Environment

Hybrid Business Cloud Backup

How to Move Your Business to Big Data: The Next Generation Enterprise Architecture

This presentation provides an overview of the architecture of the IBM Workload Deployer product.

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Evaluation of Enterprise Data Protection using SEP Software

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Running VirtualCenter in a Virtual Machine

IAN MASSINGHAM. Technical Evangelist Amazon Web Services

High-Availability Fault Tolerant Computing for Remote and Branch Offices HA/FT solutions for Cisco UCS E-Series servers and VMware vsphere

Planning for IM Compliance

Alliance Key Manager Cloud HSM Frequently Asked Questions

VMware Virtual SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Chapter 11 Cloud Application Development

Deploying Windows Streaming Media Servers NLB Cluster and metasan

2) Xen Hypervisor 3) UEC

Storage Options in the AWS Cloud: Use Cases

Table of Contents Introduction and System Requirements 9 Installing VMware Server 35

Powerful Management of Financial Big Data

Astaro Deployment Guide High Availability Options Clustering and Hot Standby

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

SyncLockStatus Evaluator s Guide

How the Software-Defined Data Center Is Transforming End User Computing

How To Use Arcgis For Free On A Gdb (For A Gis Server) For A Small Business

5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007

How To Ensure Correctness Of Data In The Cloud

CLOUD COMPUTING. When It's smarter to rent than to buy

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

Background on Elastic Compute Cloud (EC2) AMI s to choose from including servers hosted on different Linux distros

GPFS-OpenStack Integration. Dinesh Subhraveti IBM Research

Getting Started with Database As a Service on OpenStack

Deployment Guide. How to prepare your environment for an OnApp Cloud deployment.

Web Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity

Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

Nimble Storage Replication

Encrypting Data at Rest

Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES WHITE PAPER

Boas Betzler. Planet. Globally Distributed IaaS Platform Examples AWS and SoftLayer. November 9, IBM Corporation

Automating Big Data Benchmarking for Different Architectures with ALOJA

CYCLOPS The Ultimate Billing Framework for Cloud Services Dr. Piyush Harsh, ICCLab InIT Zurich University of Applied Sciences Zürcher Fachhochschule

Deploying a distributed data storage system on the UK National Grid Service using federated SRB

Postgres Plus Cloud Database!

IBM Platform Computing Cloud Service Ready to use Platform LSF & Symphony clusters in the SoftLayer cloud

Transcription:

Architecture The Porticor solution offers a rich variety of cloud encryption capabilities. Your project s needs and characteristics will determine the right choices for your application. The Porticor Virtual Private Data solution includes two or three major components: Porticor s Virtual Key Management Service (PVKM) a unique and patented key management technology which is provided as a service. PVKM is stronger than hardware, thanks to patented technologies such as Split-Key Encryption and Homomorphic Key Management (read more about it in this white paper) A Porticor Virtual Appliance (one or more for high availability), implemented inside your cloud account and used as part of the scenarios below An (optional) Porticor Encryption Agent, which may be installed and used on one or more of your Virtual Machines (your servers)

The diagram above represents an overview of the deployment options. Some of the most common deployment types are discussed below.

One of the more common uses of Porticor is an inline full disk encryption. In such implementation, a protected server mounts an encrypted disk which is attached to a Porticor Virtual Appliance. This scenario is ideal for the following requirements: 3 4 When you want absolutely no change to applications running on the protected server it simply mounts a virtual encrypted disk. No encryption agent or other software is installed on the server. Porticor handles all encryption/decryption and key management transparently. Keys are never seen by your cloud server

A Porticor Encryption Agent is installed on the customer's server, and communicates with a Porticor Virtual Appliance to obtain encryption keys (using our split-key technology). Such communication rarely takes place, essentially only whenever a new disk is created, or when the server is restarted. This option is ideal for IaaS deployments with the following requirements: 3 if you wish none of the data to go through the Porticor Virtual Appliance; for example this alternative is a great fit for high-performance disks, such as directly attached SSD. No encryption agent or other software is installed on the server. The master key is never seen by your cloud server, and the Agent only sees low value and temporary API keys. No change to the application is needed, though you accept an installation on your cloud Server.

A protected application will use Porticor's RESTful API to manage its own cryptographic keys, and use those keys to encrypt particularly sensitive data items. A Porticor Key Management RESTful API enables greater flexibility. For example, by connecting directly to a database encryption scheme, or feeding an application with encryption keys securely. This solution is ideal for: A Key Management RESTful API solution can be clustered across multiple Porticor Virtual Appliances, both for capacity and reliability. The API is engineered so that operations in a single session can be directed to different appliances. Database level encryption. Using the RESTful API, Porticor can integrate directly with the database for encryption of data, even in AWS RDS. (See PostgreSQL example, or MySQL) A Key Management RESTful API solution can be clustered across multiple Porticor Virtual Appliances, both for capacity and reliability. The API is engineered so that operations in a single session can be directed to different appliances. Most of our customers find that one (or more) of these deployment types is ideal for them. In some cases, particularly complex security needs or regulatory compliance requirements dictate different setups. Please contact us to determine the right deployment for your particular needs.