As the infrastructure cloud market (IaaS and PaaS) continues to grow rapidly, we are seeing quite a few customers who are delivering an application – whether it is a mission-critical or SaaS application – and basing their solution on VMware. Some of these are deploying VMware in their private data center, while others are leveraging [...]
Cloud encryption is recognized as a basic building block of cloud security. Data at rest is no longer between the proverbial "four walls" of the enterprise; the data owner is managing their own data with browsers and cloud APIs, and the concern is a hacker may do the same.
In this collection of articles, we explore topics such as the risk scenarios; cloud encryption for cloud database security, transparent data encryption in the cloud, integrity protection for cloud data security, and S3 encryption for Amazon Simple Storage Service.
I was recently involved in some interesting discussions around cloud encryption as an added value service for IaaS and DRaaS service providers. According to the service providers we’ve talked with, data encryption is critical for compliance oriented customers, as well as for ISVs’ deploying their software as a service offering on an Infrastructure cloud. While [...]
Encryption of databases is a must for compliance, privacy and security. The major databases have built-in encryption capabilities. Specifically, Oracle has a built-in Transparent Data Encryption capability. As cloud computing evolves, these features are being used to try and create secure cloud database solutions enjoying cloud encryption. TDE is a basic building block for such [...]
Cloud compliance is always a hot topic, but recent updates to the HIPAA and PCI regulations, have further enhanced the need to clarify some important points around cloud compliance and regulatory compliance. In this blog post, I would like to address some issues as highlighted in the valuable PCI DSS Cloud Computing Guidelines (available here), [...]
We’ve released a new video describing how to initialize a new Porticor Virtual Appliance in AWS. The video describes the steps needed to create a new Porticor Virtual Appliance, create an encrypted disk, and mount it to the application: For a product overview click here For the white paper click here
As a company focusing on cloud security, we’re often asked about regulations, and how to achieve cloud encryption while maintaining regulatory compliance. In this post, I’d like to review some of these issues and provide a high level guide to best practice. But first – a brief background on issues around cloud encryption: unlike on-premise [...]
Cloud security and cloud compliance are one of the hottest topics in cloud computing. During the course of 2012 we’ve seen many companies, specifically software vendors providing healthcare solutions, migrating or implementing their software in the cloud. While cloud computing brings many advantages to such ISVs’ (pay per use, scalability, and automation to name a [...]