Virtual Data Center and Cloud Security Solutions
On-premise data centers typically rely on physical, perimeter, and endpoint controls to secure data stores. In contrast, virtual data centers eliminate those traditional entrance and egress points, forcing organizations to take a new approach to security.
SafeNet delivers solutions that are tailored to the realities and risks of virtual environments—enabling security teams to control privileged user and super-admin access, guard against potential unauthorized copying, and mitigate the exposure of raw data.
With SafeNet, you can fully exploit the cost and innovation advantages of virtualization and the cloud—while addressing the most stringent security and compliance policies.
Virtual Machine Security Products
SafeNet enables you to encrypt and secure the entire contents of your virtual machines, protecting sensitive assets from theft or exposure. SafeNet also offers hardened virtual key management appliances that enable organizations to establish a persistent, secure root of trust in highly dynamic virtual and cloud environments.
Virtual Instance and Machine Encryption
ProtectV: Encrypt and secure the entire contents of your virtual machine and leverage the benefits of virtual storage while retaining control and ensuring privacy of your data.
Securely Migrate Data Center Resources to the Cloud
The industry's first comprehensive high-availability solution for protecting data in the cloud, ProtectV enables you to unify encryption and control across virtualized and cloud environments, improving your business agility and lowering your costs by securely migrating even your most private, highly regulated data to the cloud.
Organizations can be safe in the knowledge that they retain access to and control of encryption keys at all times. In addition, ProtectV enables organizations to address the specific security and compliance requirements in cloud environments.
Securely Increase Data Center Virtualization
Security of sensitive and regulated data has been a barrier to further virtualization of the data center. This reduces the cost savings enterprises can achieve by further virtualizing their data centers and limits their business agility including the ability to leverage the cloud in the future.
Securely Move Sensitive Workloads to the Cloud
Security of sensitive data is the number one barrier to cloud migration. Without the ability to maintain security and compliance in an environment they don’t control, enterprises can’t leverage the dramatically lower costs made possible by moving workloads to the cloud.
ProtectV for AWS and VMware
Whether using Amazon Web Services EC2 for easy-to-scale capacity or taking advantage of Amazon VPC to run AWS resources in a virtual network, or VMware EC2 in your virtual data center, ProtectV ensures cloud-ready security.
ProtectV encrypts entire virtual machine instances and attached storage volumes. Moreover, no virtual machine instance can be launched without proper authorization from ProtectV StartGuard pre-boot authentication.
Cloud Platforms Supported:
AWS EC2 and VPC
ProtectV supports APIs for automation and integration with virtual server provisioning systems and CLIs for scripting and bulk operations.
Minimal System Requirements:
t2.medium and larger (for production environments)/ 1 volume (auto created / 16 GB)
Ubuntu [Linux 64 bit], 2vCPUs, 4GB memory (minimum), 1 NIC (VMXNET 3), 16GB disk
m1.small or larger instance, 256MB RAM, 100MB free disk space
256MB RAM, 100MB free disk space
ProtectV Client-Supported Platforms
ProtectV for AWS and VMware platforms support the following operating systems/platforms:
CentOS Linux 6.2 (64-bit)
CentOS Linux 6.3 (64-bit)
CentOS Linux 6.4 (64-bit)
CentOS Linux 6.5 (64-bit)
Microsoft Windows Server 2003 R2 (64-bit)
Microsoft Windows Server 2008 (64-bit)
Microsoft Windows Server 2008 R2 (64-bit)
Microsoft Windows Server 2012 (64-bit)
Microsoft Windows Server 2012 R2 (64-bit)
Red Hat Enterprise Linux (RHEL) 6.2 (64-bit)
Red Hat Enterprise Linux (RHEL) 6.3 (64-bit)
Red Hat Enterprise Linux (RHEL) 6.4 (64-bit)
Red Hat Enterprise Linux (RHEL) 6.5 (64-bit)
SUSE Linux Enterprise Server (SLES) 11.2 (64-bit)
SUSE Linux Enterprise Server (SLES) 11.3 (64-bit)
Ubuntu Linux 12.04 (64-bit)
Ubuntu Linux 14.04 (64-bit)
Improve Control of Data Ownership and Operational Flexibility
All data is encrypted, even in archives including snapshots and backups
All copies and snapshots of virtual machine instances are tracked
Impossible to instantiate without authorized access
Audit trail of actions pertaining to all copies of data
Can revoke privilege/key/access in the event of a breach
StartGuard pre-boot authentication
Centrally define and enforce role-based authorizations for VM start with ProtectV Manager
Associate authorizations to administrator defined users and groups
Dual-phase boot loader separates bootstrapping and networking phases from OS loading
No need for special discovery of sensitive data
Separate duties between security and infrastructure administrators
ProtectV is the ONLY Comprehensive Data Protection Solution for Physical, Virtual, and Cloud
Comprehensive data protection and policy management for physical, virtual, and cloud infrastructure
Single pane of glass for controlling and monitoring your data, wherever it may reside
Lower costs by increasing data center virtualization and enabling cloud migration
Supports Windows and Linux
ProtectV Removes Regulatory Compliance as a Barrier to Virtualization and Cloud Migration
Migrate to virtualized and cloud infrastructure while maintaining compliance requirements across physical, virtual, and cloud infrastructure
Decouple compliance requirements from infrastructure requirements; maximize business agility without compromising regulatory compliance
Ensure notification of lawful seizure of data in shared and public environments
ProtectV Solution Components:
- ProtectV Manager – Centralized console for managing virtual machine instances and their encryption and decryption, as well as creation and management of security admin profiles, security groups and policies.
- ProtectV Client – Installed on your virtual machine instances or your servers in your datacenter, the Client enforces StartGuard pre-boot authentication based on associated ProtectV Manager security policies and permissions and encrypts data as it is written to storage.
- KeySecure – Hardened, highly available enterprise key/crypto management solution delivered as a hardware appliance (3a) or in a virtual platform as a virtual security appliance (3b).
Virtual Key Storage and Management
KeySecure: Hardened virtual security appliances for security and centralized management of encryption keys used for the protection of sensitive data in virtualized and cloud environments.
Additionally, Virtual KeySecure is now available on AWS Marketplace, enabling you to unify encryption and control across virtualized and cloud environments. Improve your business agility and lower your costs by securely migrating even your most sensitive and highly regulated data to the cloud.
Virtual Hardware Security Module (HSM) Root of Trust
Luna HSM Crypto Hypervisor: Delivers the security of hardware-based encryption with the scale, unified control, and agility to meet the demands of cloud and virtual infrastructure allowing for accelerated adoption of on-demand cryptographic service across data centers, virtualized infrastructures, and the cloud.
Secure Cloud Bursting
KeySecure with Crypto Pack: Encrypts your applications and information, and gives you full control of the encryption keys so your applications and services stay secure as you move from the virtual data center to the public cloud.