|By Gilad Parann-Nissany||
|July 17, 2014 01:00 PM EDT||
In a post Snowden world it is clear that for cloud data security, we need strong encryption. When properly implemented, encryption in the cloud reduces risk to levels acceptable for sensitive data.
There is no doubt data protection in the cloud computing era is never going to be a ‘one size fits all’ kind of a solution. It requires a 360-degree view of the company with 365-days a year dedication.
The best place to start is with a risk analysis so you know what kind of data you have, its levels of sensitivity, who’s using it, where it’s used and stored, and how and where and over what technologies it’s going to ‘commute’. You need to understand your company’s data – in terms of technology and human weaknesses. Data should be unreadable to an attacker. It must be incoherent at all times to anyone other than you and your trusted personnel: while it’s travelling – or you are; whether it’s in transit, storage, stopping, or resting, data is safest in encrypted form.
Once you’ve decided to encrypt your data, your next concern should definitely be the encryption key. If the encryption key is stolen or mislaid, the bad guys can crack the encryption code. You can’t let that happen, can you? You have to keep your encryption key safer than your house or car keys – as safe, say, as a Swiss Bank. In particular, you don’t want to hand over your cloud encryption key to your cloud or any other service provider, nor will you want it openly stored in the cloud or on the desktop of a laptop or any other device that could fall into the wrong hands within your company or outside its physical walls.
A handful of companies out there offer different flavors of encryption key storage and management. Here at Porticor, we opted for a solution that gives peace of mind and the highest level of encryption and encryption key protection to companies that must comply with the most stringent data and privacy protection standards in the world, notably HIPAA, PCI DSS, Safe Harbor and SOX, as well as many other global and regional legal requirements. As a result, our patented split-key encryption technology will make your encrypted data safe.
How do we protect the key?
With the Porticor solution, a unique key is used to encrypt each object of data and the key is split in two. The first half, call it the master key, will be in use by all the objects in the application. It’s your half of the key and we have no knowledge of it, nor do we store it. The second half, that part that is unique to the particular data object, is stored by our key management service. Both parts of the key are essential to dynamically encrypt and decrypt the data whenever you need to access it. The good news is that only you know of the half of the key in the cloud, stored by the Porticor Key Management Service. It is encrypted by our homomorphic key encryption algorithm, making it ‘bulletproof’ and more as it cannot be stolen or hacked. You can find the detail by downloading our Key Management White Paperhere.
This goes together with standards-based data encryption, such as AES-256, to encrypt the entire the data – a complete solution to ensure that our clients’ keys and data are safely under their own control.
Oct. 27, 2016 01:00 AM EDT Reads: 34,286
Oct. 27, 2016 12:45 AM EDT Reads: 2,139
Oct. 27, 2016 12:30 AM EDT Reads: 4,184
Oct. 27, 2016 12:00 AM EDT Reads: 11,125
Oct. 27, 2016 12:00 AM EDT Reads: 1,108
Oct. 27, 2016 12:00 AM EDT Reads: 3,534
Oct. 26, 2016 11:30 PM EDT Reads: 9,747
Oct. 26, 2016 11:00 PM EDT Reads: 637
Oct. 26, 2016 11:00 PM EDT Reads: 9,906
Oct. 26, 2016 11:00 PM EDT Reads: 3,917
Oct. 26, 2016 09:45 PM EDT Reads: 1,132
Oct. 26, 2016 09:45 PM EDT Reads: 3,663
Oct. 26, 2016 09:30 PM EDT Reads: 676
Oct. 26, 2016 08:15 PM EDT Reads: 1,475
In the next five to ten years, millions, if not billions of things will become smarter. This smartness goes beyond connected things in our homes like the fridge, thermostat and fancy lighting, and into heavily regulated industries including aerospace, pharmaceutical/medical devices and energy. “Smartness” will embed itself within individual products that are part of our daily lives. We will engage with smart products - learning from them, informing them, and communicating with them. Smart produc...
Oct. 26, 2016 08:00 PM EDT Reads: 1,577