SafeNet offers new cryptographic hypervisor for cloud migration

At a time when confidence in perimeter security is waning, and organizations are increasingly facing business pressure to adopt cloud strategies and consolidate their data center resources, the question of how to securely migrate data to public, private, or hybrid cloud computing environments has become a primary concern. As part of its Secure Breach strategy, SafeNet recently announced limited availability of the SafeNet Crypto Hypervisor, enabling organizations to virtualize their crypto resources in an efficient and scalable way, and ensuring that all data can be safely encrypted – even as it moves in a virtualized environment – in order to prevent data loss. 

According to SafeNet, with the Crypto Hypervisor, IT departments and service providers can deliver on-demand, elastic key vaulting and encryption services for data protection across physical, virtual, and cloud environments in minutes instead of days. The solution’s high-assurance encryption services fit the cloud operations model and the full cost and innovation advantages of virtualization can be exploited without compromising security or compliance. SafeNet said that total cost of ownership can be significantly lowered by deploying up to 95% less hardware and streamlining cryptographic administration.

The firm also noted that when deploying SafeNet Crypto Hypervisor, IT departments can maintain full, centralized control over the delivery of encryption services, such as secure key storage. In addition, users have full control of their encryption service, and can be assured that other cloud tenants and administrators cannot access their encryption keys.

SafeNet’s Crypto Hypervisor solves these issues, according to the firm, by extending and virtualizing its SafeNet Luna SA 5 Hardware Security Module (HSM) to fit into the operational models of virtual and cloud environments. The Crypto Hypervisor can be centrally controlled and configured by crypto administrators using the new SafeNet Crypto Command Center, and administrators can build a catalog of services available on the Crypto Hypervisor. Moreover, users can now log in to a web portal to view a catalog of services that they have permission to create. These users can provision the services they need on demand on shared physical hardware.

What’s hot on Infosecurity Magazine?