SafeNet ProtectV Product Brief
SafeNet ProtectV VMware Product Brief
SafeNet ProtectV Amazon Web Services Product Brief
Data Protection for the Cloud
Moving to virtual datacenters or the cloud enables the utilization of resources on-demand providing significant business benefits. However, these are coupled with challenges for the IT and security teams tasked with effectively and persistently meetings the organization’s governance, compliance, and data protection mandates in these environments.
Conventional infrastructure security controls designed for dedicated hardware do not always map well to virtual environments. There are risks specifically related to the virtual data lifecycle and the data itself, where there are multiple snapshots and backups of data, which are easy to move and even easier to copy or steal without detection. Admins and other privileged users often operate independently, raising issues such as data commingling in multi-tenant environments, and difficulties ensuring separation of duties between cloud service provider and the organization’s own super-users. Even in private clouds and more isolated environments like virtual datacenters, data is still often stored in plain text and is at risk of exposure.
ProtectV provides the industry’s first comprehensive high-assurance solution for securing data in the virtual datacenter and the cloud, enabling organizations the freedom to migrate to virtual and cloud while maintaining full ownership, compliance and control of data.
ProtectV bridges the physical to virtual security gap providing adaptive virtualized security controls that allows organizations to secure their data and maintain a consistent security policy as they transition to virtual datacenters, such as VMware vCenter, and into the cloud. Whether using Amazon Web Services EC2 for easy-to-scale capacity, or taking advantage of Amazon VPC to run AWS resources in a virtual network, ProtectV ensures cloud-ready security. With complete encryption of virtual machines and storage volumes coupled with pre-launch authentication, security teams can properly isolate sensitive assets and maintain ownership of their data always —even in shared, multi-tenant clouds.
To ensure that organizations sustain their compliance status with a slew of industry and governmental regulations such as PCI DSS and HIPAA HITECH, security admins have to be able to enforce proper controls and present a trusted audit trail, regardless of where the data is hosted or who is hosting it. ProtectV together with SafeNet KeySecure provides a high-assurance data compliance solution for undisputed command and proof of ownership for data and keys.
Proof of Governance
In virtual and cloud environments, security policy admins and IT admins need to ensure maintain separation of duties and control over sensitive assets. And in the cloud environments, this problem is compounded as security teams need to overcome their inherently limited visibility while still maintaining control over their sensitive assets. With ProtectV, enterprises and their compliance auditors are assured proof of governance through the deepest visibility through a single and centralized policy enforcement and audit point.
Whether data is stored in a virtual datacenter such as VMware vCenter, a public cloud such as Amazon Web Services EC2, or a private cloud such as Amazon VPC, ProtectV Manager can be easily deployed using pre-defined images. ProtectV equips users with a user-friendly GUI to manipulate policies, users and roles, system monitoring and event managements. Moreover, it offers APIs for automation and integration with virtual server provisioning systems and CLIs for scripting and bulk operations for improved agility and rapid provisioning.
|Supported Platforms||Supported Operating Systems|
|Amazon Web Services EC2
|Microsoft Windows Server 2008 32-bit
Microsoft Windows Server 2008 R2 64-bit
Microsoft Windows Server 2003 R2 64-bit
Linux CentOS 5.5 64-bit, CentOS 5.6 64-bit
Linux CentOS 5.6 32-bit
Red Hat Enterprise Linux (RHEL) 5.6 32-and 64-bit
Features & Benefits
Security = the freedom to move to the Cloud
The FIRST trusted “lockbox” ensures complete protection of data throughout its lifecycle
Root of trust for virtual machines (VMs)
Enables granular encryption of entire VMs and storage volumes associated with them
No data is written to disk without first being encrypted.
Even data stored in the OS partition is protected!
No data is accessible without proper authorization
Granular access control at the data level
Enables security teams to properly isolate sensitive assets and maintain ownership—even in shared, multi-tenant environments.
The ONLY high-assurance solution for data compliance provide undisputed command and proof of ownership for data and keys, protecting data and preventing super-user abuse.Separation of duties between administrators and users:
Launch of a protected VM is enabled only for authorized and authenticated users through role-based encryption polices
Segregated on-premise, hardware-based key management
Enable transparency and reduce time to comply with rapid API-based provisioning and script automation.
The DEEPEST visibility into cloud security through a single and centralized policy enforcement and audit point.Proof of governance:
Illegitimate/hidden copies of data are rendered useless
Trusted audit logs for access events