Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

SafeNet Crypto Hypervisor Streamlines Encryption Across Multiple Environments

SafeNet on Tuesday announced (limited) availability of the SafeNet Crypto Hypervisor, a new solution designed to help IT departments and service providers deliver on-demand, elastic key vaulting and encryption services to protect data across physical, virtual, and cloud environments.

SafeNet on Tuesday announced (limited) availability of the SafeNet Crypto Hypervisor, a new solution designed to help IT departments and service providers deliver on-demand, elastic key vaulting and encryption services to protect data across physical, virtual, and cloud environments.

In minutes instead of days, SafeNet says its Crypto Hypervisor enables organizations to virtualize their crypto resources in an efficient and scalable way, and ensures data can be encrypted, even as it moves in a virtualized environment.

SafeNet Logo“The solution’s high assurance encryption services fit the cloud operations model and the full cost and innovation advantages of virtualization can be exploited without compromising security or compliance,” SafeNet explained.

IT maintains full control of the delivery of encryption services such as secure key storage, while users have full control of their encryption service, and can be assured that other tenants and administrators cannot access their encryption keys, the company said.

Featured Resource: Aberdeen Research – Encryption, Without Tears

“Although encryption is becoming more common, data is only as safe as the keys protecting it,” said Christian A. Christiansen, Program Vice President of Security Products & Services with IDC. “Storing the keys in special-purpose hardware, such as a hardware security module, is the recommended best practice. However, until now, hardware encryption solutions have not provided sufficient agility and flexibility needed in virtualized and cloud environments.”

The Crypto Hypervisor runs on the SafeNet Luna SA 5 HSM hardware appliance and can be managed and configured by administrators using the new SafeNet Crypto Command Center.

Through a web portal, users can view a catalog of services that they have permission to create, and can provision services on demand on shared physical hardware. As a result, organizations can use as little as five percent of the hardware they use today for the same amount of encryption services.

“The move to virtualization and cloud has revolutionized the way we store and protect data. This necessitates a similar revolution in the way in which crypto resources are shared and managed,” said Tsion Gonen, Chief Strategy Officer at SafeNet.

Delivering encryption services in the cloud can be a challenging and slow process for IT departments, something SafeNet is hoping to change with its solution.

“Rolling out a virtual application that requires encryption, signed digital certificates, or other PKI functions can often add days or weeks to a project,” Christiansen said.

“[With Crypto Hypervisor], starting an encryption service is equivalent to a simple process like spinning up a new VM,” Gonen said.

The Crypto Command Center bundle is orderable now for future delivery, SafeNet said. The Luna 5.2 HSM software and Crypto Command Center are both available immediately on a limited basis for some customers.

Featured Resource: Aberdeen Research – Encryption, Without Tears

Featured ResourceIs Your Enterprise Managing Certificates? Three Reasons It Should Be.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...