data protection - bkm...•oracle tde •sql tde •cyberark •dig sig hsm on demand protectv vm...

19
Wietse Kransfeld Pre-sales Engineer Benelux Data Protection In a multi-cloud environment A Brief Introduction For Enterprises

Upload: others

Post on 06-Sep-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

Wietse KransfeldPre-sales EngineerBenelux

Data ProtectionIn a multi-cloud environmentA Brief Introduction For Enterprises

Page 2: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

The Move to Cloud is Not Going to Stop……

Data ProtectionIn a multi-cloud environment

2

Page 3: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

Cloud Adoption: 4 Facts

1Move to

Cloud Continues

2Multi-Cloud

Use Is Favored

4Cybersecurity is high on the

agenda

Source: Capgemini Financial Services Analysis 2018

3Hybrid

Environments Will Prevail

Source: 451 Group

Data ProtectionIn a multi-cloud environment3

Page 4: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

There will be

1.8 M unfilled cybersecurity positions by 2020

of executives cite shortage of skills as a top challenge when considering cloud solutions

Cloud Skills Shortages Impede Move to Cloud

68 Percent

of organizations face skills shortages in cloud expertise, adversely impacting digital transformation

57%

Data ProtectionIn a multi-cloud environment

4

Source: Capgemini Perspectives

Source: 451 Research

Source: Frost & Sullivan

Page 5: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

GOAL: All data is secured

• Multiple borders and data silos

• Too many solutions, high management overhead

• Skills scarce and investment is prohibitive

• Individual SaaS providers become Crypto custodians

• Struggle to define a unified security policy

• Lost of portability and control

• Migration over time requires hybrid models

Result: 60% of data is NOT protected

……. which makes Data Protection and thus compliance TOUGH!!

The Customer Challenge: Compliance in a Cloudy World

SaaS ApplicationsInnovation

IoT

Data ProtectionIn a multi-cloud environment

5

Page 6: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

Multiple clouds deliver infinite possibilities….

6

What about security?

What about your data?

What about your data protection?

Page 7: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

Move security beyond the perimeter

OWN & SECURE ENCRYPTION

KEYS

• Manage key lifecycle

• Store keys securely

• Manage cryptographic resources

MANAGE & CONTROL ACCESS

• Verify a user’s identity, assess and apply

the right access policy and enforce the

appropriate access controls using single

sign-on

ENCRYPT SENSITIVE DATA

• Secure data at rest and data in motion

• Secure data across cloud, virtual, and

on-premises environments

Page 8: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

Data protection in multi-cloud environment

8

SafeNet

KeySecure

SafeNet Network

HSM

Gemalto DPoD

Service Provider

Datacenter

Storage

Application

Database

File / OS

Virtual Machine

Network

ProtectApp | Tokenization | FPE

PKCS#11

ProtectDB

TDE (Native DB Encryption)

ProtectFile | KMIP

PreBoot Enc. | Full Disk Enc.

ProtectV | KMIP

KMIP | ProtectApp

HSE | ProtectApp

Gemalto DPoD

Service Provider

On-Premise On-Premise

Service Provider

Private

Datacenter

Data Location Data Protection Key Management Root-Of-Trust

Public Cloud

Public Datacenter BYOK / HOYK

Page 9: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

To Subscribe

To Evaluate

To Choose Your Service

To Protect Your Data

To Add More Protection

SafeNet Data

Protection On Demand

automates

processes so you

can sit back and

focus on your business

Data Protection On Demand

Page 10: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

Data Protection ….. Now Available On Demand

Virtual

Cloud

Data Center

Protect Everywhere

Network

Payments &Transactions

IoT

Big Data

Protect Everything

PersonalData

SAFENET DATA PROTECTION ON DEMAND

Applications

ROOT OF

TRUST

KEY

MANAGEMENT

ENCRYPTION

MARKETPLACE

POLICY

MANAGEMENT &

REPORTING

SaaS

PaaS

IaaS

APIs

Taking Traditional HSM and Encryption and Making it Consumable as a ServiceData ProtectionIn a multi-cloud environment

11

Page 11: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

HSM on Demand Services

Key Management on Demand Services

New Services launched regularly

Including 3rd party program based

services

Don’t find what you are looking for?

Contact us and it might be available already or coming

soon…

DPOD MarketPlace & Services

Page 12: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

Multi-Tier Structure

13

Corporate

Admin

Entity

Admin

Application Owners, SecOps/DevOps,Business lines:-• Customer service, • Finance• HR…..

End Customer

Tenant

Admin

Application

Owners

Gemalto

Partner

Entity 2Entity 1

Tenant 2Tenant 1

Service 2Service 1

Page 13: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

Subscribe, Deploy Made Simple and Frictionless

5

MANAGE

4

CHECK/AUDIT

3

CREATE

2

AUTHENTICATE

1

SUBSCRIBE

Minutes

Data ProtectionIn a multi-cloud environment

14

Page 14: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

SafeNet Data Protection On Demand Features

Cost effective "pay as you go" pricing model Infinite scalability to meet localand global growth

Certifications and standards: SOC2, ISO27001, FIPS 140-2 Level 3

Crypto agility (quickly adjusts to meetnew and emerging cryptographic algorithms )

No hardware or software to buy, support and update

Easy deployment in multi-cloud/hybridenvironments

Data ProtectionIn a multi-cloud environment

15

Page 15: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

Unrivalled Tech Partner Ecosystem

Data ProtectionIn a multi-cloud environment

3Our existing HSM eco-system provides a proven base for new tiles

2DPoD team is regularly adding popular tiles into DPoD marketplace

1We regularly review use Cases that are migrating to Cloud

The closer to red, the higher the applicability

today

4Continually identifying new use cases and partners to extend our eco-system

16

Page 16: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

Zero upfront

investment and low

risk

Simple to wrap

into a centrally

managed service

Cloud-basedpricing with high margin potential

White label with

your brand

Multi-Tier capabilities put you in control

Third-party API

support

Easy bundling with

hundreds of apps for

quick cross selling

Marketplace

means easy sales

process

Automated

means low TCO

everywhere

Designed to offer security-as-a-service quickly and easily

Primary DPoD Features & Benefits

Page 17: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

DPoD2019

Capability Summary

HSM Scalable HSM

ProtectV,ProtectFile, ...

DC

Private Cloud

Hybrid

Public Cloud

Key Secure Distributed KeyManagement

Compute Objects StorageSDK

Organization Data

CloudMigration

Cloud Data Protection Services

Po

licy/

Rep

ort

AP

Is

Mar

ketp

lace

Orc

hes

trat

ion

Bill

ing

Data Protection On Demand

Root ofTrust

Client

• Key Vaulting• Generic• Oracle TDE • SQL TDE• CyberArk

• Dig Sig

HSMOn Demand

ProtectV

VM EncryptOn Demand

Key BrokerOn Demand

OTTAWA EMEAAMER

Page 18: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

GOAL: Underpin Cloud 1st Strategy

• Reduced Cost of Delivering Crypto

• Security scales to match needs

• Zero up front investment

• Investment in skills gap is minimized

• Agnostic approach to multi-cloud plans

• Availability assures customer trust

• Hybrid model underpins migration plans

• Simplicity encourages adoption

Result: A New Approach To Building The Foundations For a Zero Trust Cloud Framework

The Result: Data Protection Services Bring Significant Benefits

SaaS ApplicationsInnovation

IoT

DPOD

SafeNet Data Protection On Demand for Financial Services19

Page 19: Data Protection - BKM...•Oracle TDE •SQL TDE •CyberArk •Dig Sig HSM On Demand ProtectV VM Encrypt Key Broker On Demand AMER OTTAWA EMEA GOAL: Underpin Cloud 1st Strategy •

For Further Information………..

451 Web Session Cloud trends. Cloud transformation dynamics. Channel dynamics. CLICK

BrightTALK Session Security Heretic: What got us here, won't get us there CLICK

CSA Web Session Redefining Security: Data Protection On Demand CLICK

BrightTALK Session Cloud Transformation: Security in the Age of Digital Disruption CLICK

Secure The Breach Latest information on breaches affecting our industry CLICK

Cloud HSM TCO Choosing the Most Cost-Effective Solution for Your Crypto Security CLICK

Mind The Breach GapBusinesses overly confident about keeping hackers out of networks, but not about keeping data safe

CLICK

DPoD Site For further information about Data Protection On Demand CLICK

DPoD for CyberArk Services solution brief CLICK

451 White Paper Independent analysis of Data Protection On Demand CLICK

DPoD in your coffee break Setting up DPoD in less time than in takes to make a cup of coffeeCLICK

Demo of DPoD and Microsoft CA Configure a Microsoft Root CA for DPoD (HSMoD) CLICK

Free Evaluation Access to your own free 30 day evaluation Scan Here

OR CLICK

We

bin

ars

Ma

rke

tS

erv

ice

De

mo

sE

va

l

SafeNet Data Protection On Demand for Financial Services20