Security Market Segment LS
Monday, 06 November 2017 17:01

Gemalto launches SafeNet Data Protection On Demand

By

SafeNet Data Protection on Demand is Gemalto's data security-as-a-service product for enterprises and managed service providers.

Cloud-based SafeNet Data Protection On Demand includes multiple services:

• Hardware Security Module On Demand to protect transactions, identities and applications by securing cryptographic keys and provisioning encryption, decryption, authentication and digital signing services.

• Key Broker On Demand to manage keys to provide simple and secure control between enterprise-controlled security and SaaS and cloud service vendors such as Salesforce.

• Key Management on Demand to centrally manage encryption keys throughout their full lifecycle, supporting Key Management Interoperability Protocol and including the ability to act as a key broker for multi-cloud environments.

• Encryption on Demand to protects sensitive data wherever it resides including files, folders, databases, storage environments, and virtual machines.

SafeNet Data Protection On Demand is designed to integrate with existing IT systems, DevOps tools and cloud services to protect wherever data is created, accessed or stored, the company said.

They include products and services from Amazon Web Services, Dell EMC, Google, IBM, Microsoft, NetApp, Huawei, Oracle and Salesforce, and it can also be used via proprietary or third-party APIs.

"SafeNet Data Protection On Demand simplifies data security operations by lowering the cost of ownership, reducing deployment times and eliminating the need to manage multiple solutions," said Gemalto executive vice president for enterprise and cybersecurity Sebastien Cano.

"The platform’s cloud neutrality model also brings speed, agility and flexibility for users to deploy the data security services they need in minutes with flexible pay-as-you-go pricing."

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has high potential to be exposed to risk.

It only takes one awry email to expose an accounts payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 steps to improve your Business Cyber Security’ you will learn some simple steps you should be taking to prevent devastating malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you will learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

ADVERTISE ON ITWIRE NEWS SITE & NEWSLETTER

iTWire can help you promote your company, services, and products.

Get more LEADS & MORE SALES

Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]

OR CLICK HERE!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments