Gemalto is now part of the Thales Group, find out more.
연락처

Bring Your Own Key (BYOK) with SafeNet KeySecure and ProtectApp

Using Gemalto's SafeNet KeySecure with SafeNet ProtectApp, enterprises can bring their own encryption keys (BYOK), to a growing number of cloud environments. Gemalto currently has Bring Your Own Key integrations with Amazon Web Services Key Management Services (AWS KMS), Salesforce.com, Microsoft Azure, and a CSEK integration with Google Cloud Platform, with more cloud services and applications coming soon.

Enterprises that are hosting their sensitive data in these clouds are able to further protect their data by securely creating and managing their own encryption keys, separate from the cloud service provider’s where their sensitive data is being hosted.

Enterprises can securely create and manage their own encryption keys with SafeNet Key Secure and SafeNet ProtectApp

Enterprises can use SafeNet KeySecure to create encryption keys in their own environment, and then securely wrap and export those keys to the cloud. SafeNet KeySecure simplifies the management of these encryption keys and can make automated policy-driven operations easy for tasks such as key expiry.

  • Centralized management of encryption keys
  • Full lifecycle key support and automated operations
  • Consolidated administration of granular access, authorization controls, and separation of duties
Bring Your Own Key - KeySecure ProtectApp BYOK

Gemalto's Bring Your Own Key/Customer Supplied Encryption Keys Solution - Features and Benefits:

Utilizing Gemalto’s BYOK/CSEK solution provides greater control of your encryption keys, and helps strengthen the security of your key management, while still realizing the benefits that hosting your data in the cloud has to offer. 


  BYOK/CSEK FEATURE BENEFITS

SafeNet KeySecure allows organizations to utilize a secure appliance (physical or virtual), to manage and maintain ownership of their keys, data encryption, and enforce access controls across cloud environments

Simplifies the management of encryption keys across the entire lifecycle including: secure key generation, storage/backup, distribution, deactivation and deletion

Generate and wrap your own encryption keys that are then securely delivered to the cloud service provider’s environment

By generating your own keys, you can verify the origin and quality of the keys you are providing to the cloud service provider, strengthening the security of your organization’s key management practices

Securely archive and remove encryption keys and key caches from the cloud environment that your sensitive data is hosted in 

Using keys that you did not provide can grant unauthorized  access to your encryption key material – securely generating, delivering and managing your own encryption keys helps eliminate this risk

Help meet security mandates and compliance with a more auditable usage model

SafeNet KeySecure enables you to prove ownership and management of your encryption keys, and provides audit logs that are securely stored and signed for non-repudiation and can be consumed by leading 3rd party SIEM tools


Featured Resources:

Alphabet Soup HYOK, BYOK, CSEK: Deciphering Multi-Cloud Security

On-Demand Webinar: "Alphabet Soup HYOK, BYOK, CSEK: Deciphering Multi-Cloud Security”

Learn more about the benefits of centralized key management and the differences between BYOK, HYOK and CSEK in the on-demand version Gemalto’s joint webinar with 451 Research: "Alphabet Soup HYOK, BYOK, CSEK: Deciphering Multi-Cloud Security”. Topics include:

  • Building a multi-cloud security strategy
  • Best practices, benefits and pitfalls of managing your own keys
  • Impact of regulations on data protection in the next few years
  • Understanding the different cloud service provider’s requirements for key management
Watch the Webinar

요청 정보

 

당사의 제품에 관심을 보여주셔서 감사합니다. 해당 항목들을 기재해주시면 Gemalto 에 대한 상세 자료나 Gemalto 전문가가 연락드리겠습니다.

 

개인 정보

* 이메일 주소:  
* 이름:  
* 성:  
* 회사:  
* 전화:  
* 국가:  
* State (US Only):  
* Province (Canada/Australia Only):  
* 시:  
내용:  
 

우리의 개인정보 보호 준칙에 기술되는 있는 바와 같이 다운로드를 클릭함은 젬알토로부터 이메일 수신을 동의한 것으로 인정됩니다.