During the past few months, we’ve seen more and more healthcare oriented organizations reviewing cloud capabilities, migrating applications, and planning ahead to further migrate additional applications to the cloud. The challenge is not a simple one – on one hand, the cloud approach is very appealing. Its flexibility (and cost) increases accessibility to information and [...]
Background Back in 2009, Amazon introduced its Virtual Private Cloud offering, allowing customers an isolated virtual environment tied up to your on-premise network using VPN. VPC is a great step towards privacy in a public cloud, as it essentially put the instances access control back in the hands of the corporate security group. But it’s [...]
Encryption in the cloud obviously requires encryption keys. To be really secure, you need lots of keys, a different one for each significant object (each file, each disk, and so one). But where do you put them? If you read the literature on the web, you’ll find two options, both far from optimal: let someone [...]
Porticor’s solution for Cloud Security, Cloud Privacy and Cloud Encryption fully supports Amazon’s Identity and Access Management (AWS IAM) facility. A user may enter his or her personal credentials, instead of the AWS account’s global credentials. Of course, we also support using the account credentials. And all this is fully integrated with our Key Management [...]
This week we were speaking at CloudCon, on the practicalities of data security in the cloud and achieving compliance. Porticor – Data Security – meeting the standards View more presentations from giladpn.
AWS is a pretty big name in the Cloud world, and it is always nice to get recognition. AWS recently recognized Porticor as an official Amazon Web Services Encryption Solution Provider. Here is the link to their solution provider catalog. And here is a note we wrote about how Porticor Virtual Private Data and Amazon Web [...]
Shlomi Dinoor, of Cyber-Ark, writes that Cloud Security should be viewed neither as pure revolution (“re-write everything”) nor as pure evolution (“just more of the same… let’s move our apps and secure it using current controls”) but as a mixture of both. I like his thinking and the way he said it. Recently at the Cloud Security [...]