Header-Banner

ProtectV™

Data Protection for the Cloud

Moving to virtual datacenters or the cloud enables the utilization of resources on-demand providing significant business benefits. However, these are coupled with challenges for the IT and security teams tasked with effectively and persistently meetings the organization’s governance, compliance, and data protection mandates in these environments. 

Conventional infrastructure security controls designed for dedicated hardware do not always map well to virtual environments. There are risks specifically related to the virtual data lifecycle and the data itself, where there are multiple snapshots and backups of data, which are easy to move and even easier to copy or steal without detection.  Admins and other privileged users often operate independently, raising issues such as data commingling in multi-tenant environments, and difficulties ensuring separation of duties between cloud service provider and the organization’s own super-users. Even in private clouds and more isolated environments like virtual datacenters, data is still often stored in plain text and is at risk of exposure. 

ProtectV provides the industry’s first comprehensive high-assurance solution for securing data in the virtual datacenter and the cloud, enabling organizations the freedom to migrate to virtual and cloud while maintaining full ownership, compliance and control of data.  

Data protection

ProtectV bridges the physical to virtual security gap providing adaptive virtualized security controls that allows organizations to secure their data and maintain a consistent security policy as they transition to virtual datacenters, such as VMware vCenter, and into the cloud.  Whether using Amazon Web Services EC2 for easy-to-scale capacity, or taking advantage of Amazon VPC to run AWS resources in a virtual network, ProtectV ensures cloud-ready security.  With complete encryption of virtual machines and storage volumes coupled with pre-launch authentication, security teams can properly isolate sensitive assets and maintain ownership of their data always —even in shared, multi-tenant clouds. 

Data compliance

To ensure that organizations sustain their compliance status with a slew of industry and governmental regulations such as PCI DSS and HIPAA HITECH, security admins have to be able to enforce proper controls and present a trusted audit trail, regardless of where the data is hosted or who is hosting it. ProtectV together with SafeNet KeySecure provides a high-assurance data compliance solution for undisputed command and proof of ownership for data and keys.

Proof of Governance

In virtual and cloud environments, security policy admins and IT admins need to ensure maintain separation of duties and control over sensitive assets.  And in the cloud environments, this problem is compounded as security teams need to overcome their inherently limited visibility while still maintaining control over their sensitive assets.  With ProtectV, enterprises and their compliance auditors are assured proof of governance through the deepest visibility through a single and centralized policy enforcement and audit point.

View Specifications Resource Library

Technical Specifications

Whether data is stored in a virtual datacenter such as VMware vCenter, a public cloud such as Amazon Web Services EC2, or a private cloud such as Amazon VPC, ProtectV Manager can be easily deployed using pre-defined images. ProtectV equips users with a user-friendly GUI to manipulate policies, users and roles, system monitoring and event managements. Moreover, it offers APIs for automation and integration with virtual server provisioning systems and CLIs for scripting and bulk operations for improved agility and rapid provisioning.

Supported Platforms
Supported Operating Systems 
VMware vCenter
  • Microsoft Windows Server 2008 (32- and 64-bit)

  • Microsoft Windows Server 2008 R2 (64-bit)

  • Microsoft Windows Server 2003 R2 (32- and 64-bit)

  • Linux CentOS 5.7, (64-bit)

  • Linux CentOS 5.6, (32- and 64-bit)

  • Linux SUSE Server 11 SP1, (64-bit)

  • Linux SUSE Server 10 SP4, (64-bit)

  • Red Hat Enterprise Linux (RHEL) 5.8, (32- and 64-bit)

  • Red Hat Enterprise Linux (RHEL) 5.6, (32- and 64-bit)

  • Red Hat Enterprise Linux (RHEL) 5.5, (64-bit)

  • Red Hat Enterprise Linux (RHEL) 6.2, 64-bit

  • Red Hat Enterprise Linux (RHEL) 6.1, 64-bit

Amazon Web Services EC2
and
Amazon VPC
  • Microsoft Windows Server 2008 (32- and 64-bit)

  • Microsoft Windows Server 2008 R2 (64-bit)

  • Microsoft Windows Server 2003 R2 (32- and 64-bit)

  • Linux CentOS 5.7, 64-bit

  • Linux CentOS 5.6, (32- and 64-bit)

  • Linux CentOS 5.5, (32- and 64-bit)

  • Linux CentOS 5.5, (64-bit)

  • Red Hat Enterprise Linux (RHEL) 5.8, (32- and 64-bit)

  • Red Hat Enterprise Linux (RHEL) 5.6, (32- and 64-bit)

  • Red Hat Enterprise Linux (RHEL) 5.5, (32- and 64-bit)

  • AWS Linux AMI release 2012.03 (64-bit)—This is an exclusive Amazon Linux release.

 
View Features & Benefits Resource Library

Security = the freedom to move to the Cloud

The FIRST trusted “lockbox” ensures complete protection of data throughout its lifecycle

Complete encryption of virtual machines and storage volumes:
  • Root of trust for virtual machines (VMs)

  • Enables granular encryption of entire VMs and storage volumes associated with them

  • No data is written to disk without first being encrypted.

  • Even data stored in the OS partition is protected!

"Tamper-proof" pre-launch authentication:
  • No data is accessible without proper authorization

  • Granular access control at the data level

  • Enables security teams to properly isolate sensitive assets and maintain ownership—even in shared, multi-tenant environments.

The ONLY high-assurance solution for data compliance provide undisputed command and proof of ownership for data and keys, protecting data and preventing super-user abuse.

Separation of duties between administrators and users:
  • Launch of a protected VM is enabled only for authorized and authenticated users through role-based encryption polices

  • Segregated on-premise, hardware-based key management

Smooth integration:
  • Enable transparency and reduce time to comply with rapid API-based provisioning and script automation.

The DEEPEST visibility into cloud security through a single and centralized policy enforcement and audit point.

Proof of governance:
  • Illegitimate/hidden copies of data are rendered useless

  • Trusted audit logs for access events

View How It Works Resource Library

Use this form to contact sales now.

Americas
Phone: 866-251-4269
Complete this short form
EMEA
Phone:+44-01276-608000
Complete this short form
APAC
Phone: 866-251-4269
Complete this short form

US Federal Sales Type 1
Phone: 443-327-1235
Complete this short form

 

Office Locations
Find a Partner
Order Inquiries? View contact information here.
View Overview Resource Library
protectv-cta

What People Are Saying