MySQL encryption is one of the most common use cases we’re seeing in infrastructure clouds. Enterprises or software as a service (SaaS) vendors store sensitive or regulated data in the cloud using MySQL, and the immediate consequence is a requirement for data encryption. Below, I’ll cover the MySQL encryption options used by our customers, analysis […]
Cloud Database Security
Porticor provides encryption and management of encryption keys that works with the major databases, such as Oracle, MySQL, MS SQL and IBM DB2. Cloud Security for databases requires Cloud Encryption.
In this page we discuss Full Disk Encryption as it is used by databases, while Transparent Data Encryption (TDE) is discussed here.
Encryption of databases is a must for compliance, privacy and security. The major databases have built-in encryption capabilities. Specifically, Oracle has a built-in Transparent Data Encryption capability. As cloud computing evolves, these features are being used to try and create secure cloud database solutions enjoying cloud encryption. TDE is a basic building block for such […]
Cloud encryption is a key component when it comes to cloud compliance. Surprisingly, companies we speak with, are many times confused themselves, and aren’t always certain what would be the best strategy for cloud encryption. As most sensitive data resides in a structured – database format, we’re often asked about the “best” cloud encryption approach […]
Infrastructure as a Service (IaaS) database deployment is one of the most common cloud implementations we encounter, yet cloud encryption for databases remains a complex challenge. We often get questions around cloud database encryption methods (row/column level, vs. full disk, vs. application level encryption), and I would like to spend some time reviewing pros and […]
Cloud security and cloud encryption are a significant challenge for any organization migrating to the cloud. Deploying proper cloud encryption while maintaining control of the encryption keys is an issue we’ve covered in previous blogs as well as in this whitepaper. But when it comes to big data, there are several additional challenges due to […]
Healthcare data security has been around for a long time, but as cloud computing gains more and more traction, healthcare providers as well as healthcare software vendors, would like to use the cloud advantages and migrate healthcare data, or run healthcare software from a cloud infrastructure. In this blog I’ll focus on specific cloud computing […]