Cloud Storage Encryption

Cloud Storage Encryption

Transparently encrypt your data in the cloud

Provision Encryption Resources to Virtual Data Centre, Private and Public Cloud Environments




Administrators can create a centralised pool of high assurance cryptographic resources that can be provisioned out to the people and lines of business in their organisation that need them.



> Easily provision HSMs and HSM partitions

Network attached HSMs can be partitioned in a way that makes a single appliance behave as if it is many appliances with cryptographic keys kept secure from other partitions. This means a single appliance can serve many lines of business and applications at once, and the keys will always remain in the control of their rightful owner, even in multi-tenant environments.


> Ensure only authorised applications can access encryption keys

Host Trust Links (HTL) provide a mechanism (the host or virtual machine) for ensuring only authorised applications can access encryption keys on an HSM. The keys will become inaccessible if connects are broken until re-established. This prevents unknown copies of virtual instances from accessing keys when they are not approved to do so.


> Audit your infrastructure

Configurable 'who, what, when' audit logs are securely generated and time-stamped inside the FIPS validated HSM.







Also see

> Secure Storage
Solution data on any data storage device or location

> Encryption solutions
Protect any data, anywhere, any time.





Contact us today to discuss your requirements in more detail.



+44(0)7714 209927


info@securenetconsulting.co.uk