Perimeter
8/27/2012
12:23 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

SafeNet Enables Security For Mission-Critical Apps In VMware Environments

ProtectV provides a complete data encryption solution for virtualized and cloud environments

Baltimore – August 27, 2012 – Efficiency, automation, and availability are some of the key benefits of cloud computing. However, many organizations may not be able to take advantage of these benefits due to concerns with regulatory compliance and security risks such as provider access to tenant data.

As more data moves to private or public clouds, the number of super-users with access to an organization’s data multiplies, the risk of VMs being copied without the owner knowing increases, the possibility of temporary file trails rises, and the organization’s data is more vulnerable to being compromised. To address the data security issues and deliver control and governance of data in the cloud, SafeNet, a global leader in data protection introduces ProtectV, an encryption solution that has achieved VMware Ready™ status.

ProtectV enables virtual machines and storage volumes to be as secure as physical servers and storage in robust, secure on-premise environment. Customers can reap the full benefits of agility and cost savings by turning their virtual datacenter or cloud into a trusted environment with data governance, control and security.

SafeNet ProtectV is compatible with VMware vShield™ and VMware vCenter™. In addition, SafeNet ProtectV can be used by Amazon Web Services customers to secure their critical data in the cloud.

According to Mike Rothman of Securosis, “The flexibility and abstraction of the cloud means many privileged users can create new virtual instances or copies of virtual environments outside of the management console. They can also change access keys, add access or entitlements, or change permissions. This means that organizations don’t have the same level of control over network access and it’s easier for new virtual servers to be created out of thin air, significantly increasing the risk of data exposure. Security needs to be implemented directly within the virtualized instances, and organizations cannot rely solely on the cloud infrastructure to provide it.”

SafeNet ProtectV helps organizations address these challenges with a solution that centralizes the management of encrypting VMs in AWS and VMware environments. Users can manage the policy of what VMs encrypt and who should have access and by doing so, ensuring unified security policies throughout. In this way, it is possible to enjoy the advantages of the cloud and virtualization, while at the same time, achieving full, auditable compliance with regulations and maintaining the visibility for governance.

ProtectV delivers:

Complete VM Security and Data Isolation: SafeNet ProtectV provides granular, full-VM encryption, pre-launch authentication and an on-premise hardware root of trust, delivering comprehensive protection throughout the information lifecycle. ProtectV enables you to run your systems as if it was your own private data center, even in co-mingled or multi-tenant environments. Security teams are now able to properly isolate sensitive assets and maintain ownership of their data throughout its lifecycle.

Protection from Rogue Admins: All VMs and associated storage volumes are encrypted, from the VM instances, snapshots and backups, across locations and disaster recovery sites. Super User Admins, who may have control of the virtualization infrastructure, cannot access the encrypted VMs.

Enforced Compliance: ProtectV provides undisputed control and proof of data governance through audit logs. ProtectV enables organizations to enforce the proper controls, present a trusted audit control regardless of where the data is hosted or stored and sustain compliance with regulations, including PCI DSS, HIPAA and HITECH.

Data Governance and Visibility: ProtectV affords cloud security visibility through a centralized policy enforcement and audit point. SafeNet provides a trusted, high assurance key management environment, delivering undisputed ownership of data and keys. As a result, organizations and their compliance auditors are assured complete control of their keys to their data and ownership with the complete logs for the necessary visibility.

Cross-Platform Key Management: Even the best encryption is meaningless without proper key management. As part of SafeNet’s data protection portfolio, SafeNet ProtectV integrates with SafeNet’s Enterprise Key Management solution, KeySecureTM. KeySecure enables security teams to centrally and uniformly manage cryptographic keys across a wide variety of their organization’s encryption platforms, streamlining key and policy administration.

SafeNet Executive Commentary:

“Virtualization and cloud computing offer tremendous benefits in cost and agility, but organizations cannot use the same security approach they use for a physical datacenter. Today, organizations have more data than ever before – more data means more threats, and some of the biggest threats are right there in the organization. ProtectV is the first security solution for cloud and virtual datacenters that enables control, compliance and governance of critical data. By encrypting the data itself, organizations maintain control of high-value assets throughout the information lifecycle, including protecting against rogue admins, and have the ability ‘digitally shred’ data in the event of a breach, ensuring the safety of critical assets. With ProtectV, organizations achieve the same control and security level in their virtual environment as they had in their physical datacenter.”

- Sangeeta Anand, corporate vice president and general manager, Data Protection Business Unit, SafeNet, Inc.

Supporting Resources:

· ProtectV product: http://www.safenet-inc.com/cloud/virtual-machine-security/

· SafeNet Cloud Security: http://www.safenet-inc.com/cloud

· KeySecure product: http://www.safenet-inc.com/data-protection/key-management/key-secure/

· ProtectV: Securing Sensitive Data in Virtual and Cloud Environments: http://www.safenet-inc.com/resource/ResourceRequest.aspx?ID=8589946637&resourcelang=1033

· ProtectV Product Overview: VM & AWS Encryption: http://www.youtube.com/watch?v=PpvOAh-7okk

· Data Governance in the Cloud: http://www.youtube.com/watch?v=-jCgHR64Q1g

· Compliance for the Cloud: http://www.youtube.com/watch?v=AIlEA8z3N3A

· For more details about ProtectV VMware, please visit the VMware Solution Exchange (VSX) at https://solutionexchange.vmware.com/store/products/protectv.

· Follow SafeNet on Follow SafeNet on Twitter, Facebook, YouTube and LinkedIn

About SafeNet

Founded in 1983, SafeNet, Inc. is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organizations around the globe. SafeNet’s data-centric approach focuses on the protection of high-value information throughout its lifecycle, from the data center to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.