Story image

Gemalto integrates encryption solutions with Google Cloud

07 Dec 17

Gemalto’s SafeNet Data Encryption solutions are now fully integrated with Google Cloud Platform to give users what it says is more control over their data in the cloud.

Google customers are able to use SafeNet to manage and maintain control of their encryption keys on cloud platforms.

Gemalto’s SafeNet Luna Hardware Security Module (HSM) and SafeNet KeySecure both support Google Cloud Customer-Supplied Encryption Key (CSEK) feature, so customers can manage their keys for data and workloads in Google Cloud Storage and Compute Engine.

According to the Hosting and Cloud Study 2016 by 451 Research, at least one third of the 1700 polled organisations work with four or more cloud vendors.

Gemalto says that if organisations have the ability to control all data encryption and key management operations for all cloud service providers, this ensures companies have total control of their encrypted data.

“Many cloud service providers are offering variations of flexible key management such as bring-your-own-key (BYOK) and hold-your-own-key (HYOK).This is a big step in helping organisations leverage the growing number of cloud-based applications and services, while maintaining full control of their encryption keys across all of the cloud providers they use,” explains Todd Moore, senior vice president of encryption products at Gemalto.

Organisations that integrate with Google’s Customer-Supplied Encryption Key functionality can use an on-premise SafeNet Luna HSM to generate, manage and retain complete control of keys to secure sensitive data on Google Cloud Platform.

Companies can also choose what level of key ownership and control is desired when migrating operations, workloads and data to Google Cloud Platform.

Gemalto says its SafeNet data encryption solutions make it easy to work across multiple clouds by centralising encryption and key management allowing organisations to:

  • Gain visibility and control to consistently and effectively enforce security controls
  • Simplify monitoring and auditing of encryption and key management operations to demonstrate compliance with internal policies, industry standards like Payment Card Industry Data Security Standard (PCI-DSS) or HIPAA and government mandates like Europe’s General Data Protection Regulation (GDPR)
  • Reduce the burden on IT to manage multiple security services across each cloud platform

Last month Gemalto launched SafeNet Data Protection on Demand.

“The platform's cloud neutrality model also brings speed, agility and flexibility for users to deploy the data security services they need in minutes with flexible pay-as-you-go pricing,” comments Gemalto enterprise and cybersecurity executive vice president Sebastien Cano.

Gemalto says that SafeNet Data Protection On Demand makes enterprise-grade data protection accessible to companies of all of sizes.

How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
It's time to rethink your back-up and recovery strategy
"It is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations."