Cloud

11/6/2017
02:20 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Gemalto Launches On-Demand Security Platform for Data Protection

SafeNet Data Protection On Demand is a data security-as-a-service solution for enterprises and managed service providers to protect data anywhere.

Amsterdam, November 6, 2017 - Gemalto, the world leader in digital security, today announced the launch of SafeNet Data Protection On Demand, a centralized cloud-based services platform for companies to protect data, meet compliance mandates and manage the security of all their sensitive information in every location with unparalleled simplicity.

Today, businesses are increasingly challenged by the cost and complexity of protecting data across disparate IT infrastructures and hybrid cloud environments. SafeNet Data Protection On Demand helps solve these issues by providing a single data security-as-a-service platform that integrates easily with existing IT systems, DevOps tools and cloud services to protect wherever data is created, accessed or stored.

Robust, Scalable Security Designed for Higher Order Business Cases and Operational Benefits

SafeNet Data Protection On Demand makes enterprise-grade data protection accessible to companies of all of sizes - from the smallest to the largest of enterprises. With no hardware and software to buy, configure or manage and simple pay-as-you-go pricing, companies can more cost effectively and quickly deploy data protection to secure sensitive information in any environment on demand. This empowers them to easily integrate security across all company IT systems and removes barriers between business and DevOps, expediting go-to-market timelines. Companies can scale their security operations to protect critical data in established business initiatives and new growth markets and address priorities like Big Data, Blockchain, Cloud Computing, Internet of Things and Digital Payments.

The SafeNet Data Protection On Demand Marketplace is expanding its portfolio of security services to include:

  • Hardware Security Module On Demand: Provides protection for transactions, identities and applications by securing cryptographic keys and provisioning encryption, decryption, authentication and digital signing services. 
  • Key Broker On Demand:  Enables you to manage your keys to provide simple and secure control between your enterprise-controlled security and your SaaS and cloud service vendors such as Salesforce. 
  • Key Management on Demand: Provides a central way to manage encryption keys throughout their full lifecycle, supports Key Management Interoperability Protocol (KMIP) services and acts as a key broker for organizations extending their security policies into multi-cloud environments through “Bring Your Own Key” (BYOK).
  • Encryption on Demand: Protects sensitive data wherever it resides including files, folders, databases, storage environments, and virtual machines.

Companies also benefit from Gemalto’s extensive partner ecosystem which helps accelerate the integration of data security across their multi-cloud applications. The platform is designed to work with many of the most widely utilized IT products and technology companies such as Amazon Web Services, Dell EMC, Google, IBM, Microsoft, NetApp, Huawei, Oracle and Salesforce. In addition, customers can quickly develop and build secure higher order use cases through proprietary and/or third-party APIs.

Supporting Quotes

“SafeNet Data Protection On Demand simplifies data security operations by lowering the cost of ownership, reducing deployment times and eliminating the need to manage multiple solutions,” said Sebastien Cano, executive vice president for Enterprise & Cybersecurity at Gemalto. “The platform’s cloud neutrality model also brings speed, agility and flexibility for users to deploy the data security services they need in minutes with flexible pay-as-you-go pricing.”

“Complexity has always been a pain point for organizations when it comes to deploying encryption and key management, and the growth of cloud computing and the Internet of Things (IoT) will only magnify this challenge,” said Garrett Bekker, Principal Analyst at 451 Research. “By providing organizations with a single consolidated platform accessible through an online marketplace, Gemalto’s SafeNet Data Protection On Demand can allow companies of all sizes to deploy encryption, key management and hardware security module offerings with only a mouse click, eliminating the burdens of physical deployments and also helping resource-constrained enterprises address the growing shortage of skilled security personnel.”

“NTT Group clients are increasingly asking for on-demand usage based data protection services such as encryption and key management, and Gemalto has uniquely responded with a whole suite of cloud-native solutions that allow us to respond to those needs quickly. We see this new way of managing security as an industry game changer for companies to build upon their cloud-based strategy by including easy-to-use cloud native security applications, said Frank Balow, Senior Manager at NTT Security Germany, the specialized security company of NTT Group. “As a result, we can respond to NTT Group clients’ needs faster, reduce their IT headaches, all in an affordable way enabling them to scale as they grow.”

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products
Curtis Franklin Jr., Senior Editor at Dark Reading,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3812
PUBLISHED: 2019-02-19
QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.
CVE-2019-8933
PUBLISHED: 2019-02-19
In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on ...
CVE-2019-7629
PUBLISHED: 2019-02-18
Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.
CVE-2019-8919
PUBLISHED: 2019-02-18
The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2019-8917
PUBLISHED: 2019-02-18
SolarWinds Orion NPM before 12.4 suffers from a SYSTEM remote code execution vulnerability in the OrionModuleEngine service. This service establishes a NetTcpBinding endpoint that allows remote, unauthenticated clients to connect and call publicly exposed methods. The InvokeActionMethod method may b...