Home Security Gemalto launches SafeNet Data Protection On Demand

SafeNet Data Protection on Demand is Gemalto's data security-as-a-service product for enterprises and managed service providers.

Cloud-based SafeNet Data Protection On Demand includes multiple services:

• Hardware Security Module On Demand to protect transactions, identities and applications by securing cryptographic keys and provisioning encryption, decryption, authentication and digital signing services.

• Key Broker On Demand to manage keys to provide simple and secure control between enterprise-controlled security and SaaS and cloud service vendors such as Salesforce.

• Key Management on Demand to centrally manage encryption keys throughout their full lifecycle, supporting Key Management Interoperability Protocol and including the ability to act as a key broker for multi-cloud environments.

• Encryption on Demand to protects sensitive data wherever it resides including files, folders, databases, storage environments, and virtual machines.

SafeNet Data Protection On Demand is designed to integrate with existing IT systems, DevOps tools and cloud services to protect wherever data is created, accessed or stored, the company said.

They include products and services from Amazon Web Services, Dell EMC, Google, IBM, Microsoft, NetApp, Huawei, Oracle and Salesforce, and it can also be used via proprietary or third-party APIs.

"SafeNet Data Protection On Demand simplifies data security operations by lowering the cost of ownership, reducing deployment times and eliminating the need to manage multiple solutions," said Gemalto executive vice president for enterprise and cybersecurity Sebastien Cano.

"The platform’s cloud neutrality model also brings speed, agility and flexibility for users to deploy the data security services they need in minutes with flexible pay-as-you-go pricing."

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect