Mixed cloud Security: H-P key split encryption

Source: Internet
Author: User
Keywords Cloud computing cloud security cloud security

To be able to better enterprise data security, away from the growing number of experienced hacker attacks, HP's new capabilities help IT staff encrypt data from the points they create, regardless of whether the data is in the cloud or local. HP Atalla Cloud Encryption protects a range of unstructured data, such as payment information, electronic health files, and core critical systems of financial institutions, and can run through their entire lifecycle.

With the current Hacking Team collaboration, each of them has their own skills, can penetrate into the security central, extract key corporate assets, it is difficult to protect such information.

At the HP Discover conference, the general manager and senior vice president of HP's corporate security, art Gilliland, said: "There has been a very important development among these villains; they are not alone, they are now working together to buy and sell services and actively deepen their expertise." ”

Gilliland explains that the hacker team has also gained momentum from it's emphasis on cloud and mobile devices because it means exposing core enterprise data. This imposes new pressure on business data center professionals who now need to deal with additional problems.

According to HP's data, large companies face 120 successful attacks a week. Under this pressure, most corporate security teams are not concerned about whether their businesses will be compromised, but the assumptions are already being undermined. It is also a trend for IT experts to increasingly encrypt the use of cryptography as a forward-looking action.

An IT expert receives HP's encouragement to redouble efforts to secure data, but will not immediately start using HP's solutions. "I want to see how products like this work, and to bind some HP servers, but it's really new," said the CDO at a large accounting firm, "We've spent a lot of money on security products, many of them short-term, forcing us to break more money to strengthen it, or to buy something completely different. ”

HP believes that cloud encryption is attractive to corporate users because it reduces the complexity of key management in public, private, and mixed cloud environments, mainly through its key split, which combines and splits keys in the initial encryption phase. Users can use HP's Enterprise security Key Manager for consolidation, automate management, and protect local master keys.

"The difference is that these keys generate some encryption, so HP doesn't generate all the encryption, and the user is the only person with the master key," says Gilliland. ”

Cloud Split key Encryption

While Hewlett-Packard patented its split key, the same kind of encryption was not first seen. Porticor is a very small company that provides similar services to VMware and AWS and is patented.

Porticor's technology enables its virtual devices to provide data storage access for applications without exposing the master key in unencrypted state. This technology also ensures that once the master key is stolen, it cannot be used to access the victim's data store.

With Porticor technology, each data object can be stored in a Porticor virtual device and encrypted using a split key. Each key has two parts: the master key is held by the application owner, does not exist on the cloud or Porticor Key Management Server, and the project key is stored on the Key Management server.

Analysts believe key split method encryption will make it easier for more IT departments to buy HP products and also help other competitor products. This gives users more confidence in deploying a mixed cloud environment.

"For businesses, it's free to choose the hybrid cloud option, where security is always consistent and flexible," said Dana Gardner, chief analyst at Interarbor FX, "using split-key encryption to solve some potential problems, Users can manage encryption keys across public and mixed cloud environments. ”

HP has also released Atalla information homeowner and control (IPC), which is designed to run through the sensitive data declaration cycle and protect it, regardless of whether the data is stored in the cloud or locally.

HP security encryption with centralized management is now available, but users must also order HP's ProLiant Gen 8 server, HP Smart storage, and HP Atalla Enterprise Key Management and client licenses.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.