Story image

Gemalto integrates encryption solutions with Google Cloud

07 Dec 17

Gemalto’s SafeNet Data Encryption solutions are now fully integrated with Google Cloud Platform to give users what it says is more control over their data in the cloud.

Google customers are able to use SafeNet to manage and maintain control of their encryption keys on cloud platforms.

Gemalto’s SafeNet Luna Hardware Security Module (HSM) and SafeNet KeySecure both support Google Cloud Customer-Supplied Encryption Key (CSEK) feature, so customers can manage their keys for data and workloads in Google Cloud Storage and Compute Engine.

According to the Hosting and Cloud Study 2016 by 451 Research, at least one third of the 1700 polled organisations work with four or more cloud vendors.

Gemalto says that if organisations have the ability to control all data encryption and key management operations for all cloud service providers, this ensures companies have total control of their encrypted data.

“Many cloud service providers are offering variations of flexible key management such as bring-your-own-key (BYOK) and hold-your-own-key (HYOK).This is a big step in helping organisations leverage the growing number of cloud-based applications and services, while maintaining full control of their encryption keys across all of the cloud providers they use,” explains Todd Moore, senior vice president of encryption products at Gemalto.

Organisations that integrate with Google’s Customer-Supplied Encryption Key functionality can use an on-premise SafeNet Luna HSM to generate, manage and retain complete control of keys to secure sensitive data on Google Cloud Platform.

Companies can also choose what level of key ownership and control is desired when migrating operations, workloads and data to Google Cloud Platform.

Gemalto says its SafeNet data encryption solutions make it easy to work across multiple clouds by centralising encryption and key management allowing organisations to:

  • Gain visibility and control to consistently and effectively enforce security controls
  • Simplify monitoring and auditing of encryption and key management operations to demonstrate compliance with internal policies, industry standards like Payment Card Industry Data Security Standard (PCI-DSS) or HIPAA and government mandates like Europe’s General Data Protection Regulation (GDPR)
  • Reduce the burden on IT to manage multiple security services across each cloud platform

Last month Gemalto launched SafeNet Data Protection on Demand.

“The platform's cloud neutrality model also brings speed, agility and flexibility for users to deploy the data security services they need in minutes with flexible pay-as-you-go pricing,” comments Gemalto enterprise and cybersecurity executive vice president Sebastien Cano.

Gemalto says that SafeNet Data Protection On Demand makes enterprise-grade data protection accessible to companies of all of sizes.

Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.