•   SUPPORT +49 89 420447-30
  •   This email address is being protected from spambots. You need JavaScript enabled to view it.   |
  •   SALES +49 89 420447-20
  •   This email address is being protected from spambots. You need JavaScript enabled to view it.

Trial Version

Do you want to test the product?
It´s a pleasure for us to provide you with a trial version.
Please get in contact with us.

Request a trial version

SafeNet-Logo

SafeNet ProtectV Product Brief

Datasheet - PDF

SafeNet ProtectV VMware Product Brief

Datasheet - PDF

SafeNet ProtectV Amazon Web Services Product Brief

Datasheet - PDF

SafeNet ProtectV

Data Protection for the Cloud

Overview

Moving to virtual datacenters or the cloud enables the utilization of resources on-demand providing significant business benefits. However, these are coupled with challenges for the IT and security teams tasked with effectively and persistently meetings the organization’s governance, compliance, and data protection mandates in these environments. 

Conventional infrastructure security controls designed for dedicated hardware do not always map well to virtual environments. There are risks specifically related to the virtual data lifecycle and the data itself, where there are multiple snapshots and backups of data, which are easy to move and even easier to copy or steal without detection.  Admins and other privileged users often operate independently, raising issues such as data commingling in multi-tenant environments, and difficulties ensuring separation of duties between cloud service provider and the organization’s own super-users. Even in private clouds and more isolated environments like virtual datacenters, data is still often stored in plain text and is at risk of exposure. 

ProtectV provides the industry’s first comprehensive high-assurance solution for securing data in the virtual datacenter and the cloud, enabling organizations the freedom to migrate to virtual and cloud while maintaining full ownership, compliance and control of data.  

Data protection

ProtectV bridges the physical to virtual security gap providing adaptive virtualized security controls that allows organizations to secure their data and maintain a consistent security policy as they transition to virtual datacenters, such as VMware vCenter, and into the cloud.  Whether using Amazon Web Services EC2 for easy-to-scale capacity, or taking advantage of Amazon VPC to run AWS resources in a virtual network, ProtectV ensures cloud-ready security.  With complete encryption of virtual machines and storage volumes coupled with pre-launch authentication, security teams can properly isolate sensitive assets and maintain ownership of their data always —even in shared, multi-tenant clouds. 

Data compliance

To ensure that organizations sustain their compliance status with a slew of industry and governmental regulations such as PCI DSS and HIPAA HITECH, security admins have to be able to enforce proper controls and present a trusted audit trail, regardless of where the data is hosted or who is hosting it. ProtectV together with SafeNet KeySecure provides a high-assurance data compliance solution for undisputed command and proof of ownership for data and keys.

Proof of Governance

In virtual and cloud environments, security policy admins and IT admins need to ensure maintain separation of duties and control over sensitive assets.  And in the cloud environments, this problem is compounded as security teams need to overcome their inherently limited visibility while still maintaining control over their sensitive assets.  With ProtectV, enterprises and their compliance auditors are assured proof of governance through the deepest visibility through a single and centralized policy enforcement and audit point.

Specifications

Technical Specifications

Whether data is stored in a virtual datacenter such as VMware vCenter, a public cloud such as Amazon Web Services EC2, or a private cloud such as Amazon VPC, ProtectV Manager can be easily deployed using pre-defined images. ProtectV equips users with a user-friendly GUI to manipulate policies, users and roles, system monitoring and event managements. Moreover, it offers APIs for automation and integration with virtual server provisioning systems and CLIs for scripting and bulk operations for improved agility and rapid provisioning.

Supported PlatformsSupported Operating Systems 
Amazon Web Services EC2
Amazon VPC
VMware vCenter
Microsoft Windows Server 2008 32-bit
Microsoft Windows Server 2008 R2 64-bit
Microsoft Windows Server 2003 R2 64-bit
Linux CentOS 5.5 64-bit, CentOS 5.6 64-bit
Linux CentOS 5.6 32-bit
Red Hat Enterprise Linux (RHEL) 5.6 32-and 64-bit 

Features & Benefits

Security = the freedom to move to the Cloud

The FIRST trusted “lockbox” ensures complete protection of data throughout its lifecycle


Complete encryption of virtual machines and storage volumes:
  • Root of trust for virtual machines (VMs)

  • Enables granular encryption of entire VMs and storage volumes associated with them

  • No data is written to disk without first being encrypted.

  • Even data stored in the OS partition is protected!

"Tamper-proof" pre-launch authentication:
  • No data is accessible without proper authorization

  • Granular access control at the data level

  • Enables security teams to properly isolate sensitive assets and maintain ownership—even in shared, multi-tenant environments.

The ONLY high-assurance solution for data compliance provide undisputed command and proof of ownership for data and keys, protecting data and preventing super-user abuse.

Separation of duties between administrators and users:
  • Launch of a protected VM is enabled only for authorized and authenticated users through role-based encryption polices

  • Segregated on-premise, hardware-based key management

Smooth integration:
  • Enable transparency and reduce time to comply with rapid API-based provisioning and script automation.

The DEEPEST visibility into cloud security through a single and centralized policy enforcement and audit point.

Proof of governance:
  • Illegitimate/hidden copies of data are rendered useless

  • Trusted audit logs for access events

Our Philosophy

Our goal is to assist you in solving specific security problems on the Internet, IT networks and in telecommunications.

We achieve this goal by the quality and actuality of our security products, as well as competence and commitment of our team.

Contact Options

Contact Sales (inquiries,
licenses, orders, ...)
  • +49 89 420447-20
  • This email address is being protected from spambots. You need JavaScript enabled to view it.
Contact Support (settings, ...)
  • +49 89 420447-30
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

Company Details

CyProtect AG - Internet Security

 

Address
Schatzbogen 58
81829 Munich
Germany
Facsimile
  • +49 89 420447 79

Contact Form

Email:
Subject:
Message:
How many hours are in a day?