Story image

Gemalto integrates encryption solutions with Google Cloud

07 Dec 17

Gemalto’s SafeNet Data Encryption solutions are now fully integrated with Google Cloud Platform to give users what it says is more control over their data in the cloud.

Google customers are able to use SafeNet to manage and maintain control of their encryption keys on cloud platforms.

Gemalto’s SafeNet Luna Hardware Security Module (HSM) and SafeNet KeySecure both support Google Cloud Customer-Supplied Encryption Key (CSEK) feature, so customers can manage their keys for data and workloads in Google Cloud Storage and Compute Engine.

According to the Hosting and Cloud Study 2016 by 451 Research, at least one third of the 1700 polled organisations work with four or more cloud vendors.

Gemalto says that if organisations have the ability to control all data encryption and key management operations for all cloud service providers, this ensures companies have total control of their encrypted data.

“Many cloud service providers are offering variations of flexible key management such as bring-your-own-key (BYOK) and hold-your-own-key (HYOK).This is a big step in helping organisations leverage the growing number of cloud-based applications and services, while maintaining full control of their encryption keys across all of the cloud providers they use,” explains Todd Moore, senior vice president of encryption products at Gemalto.

Organisations that integrate with Google’s Customer-Supplied Encryption Key functionality can use an on-premise SafeNet Luna HSM to generate, manage and retain complete control of keys to secure sensitive data on Google Cloud Platform.

Companies can also choose what level of key ownership and control is desired when migrating operations, workloads and data to Google Cloud Platform.

Gemalto says its SafeNet data encryption solutions make it easy to work across multiple clouds by centralising encryption and key management allowing organisations to:

  • Gain visibility and control to consistently and effectively enforce security controls
  • Simplify monitoring and auditing of encryption and key management operations to demonstrate compliance with internal policies, industry standards like Payment Card Industry Data Security Standard (PCI-DSS) or HIPAA and government mandates like Europe’s General Data Protection Regulation (GDPR)
  • Reduce the burden on IT to manage multiple security services across each cloud platform

Last month Gemalto launched SafeNet Data Protection on Demand.

“The platform's cloud neutrality model also brings speed, agility and flexibility for users to deploy the data security services they need in minutes with flexible pay-as-you-go pricing,” comments Gemalto enterprise and cybersecurity executive vice president Sebastien Cano.

Gemalto says that SafeNet Data Protection On Demand makes enterprise-grade data protection accessible to companies of all of sizes.

How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.