+ All Categories
Home > Documents > Why HSMs are needed to make Cloud a secure place · 2017-10-05 · Why HSMs are needed to make...

Why HSMs are needed to make Cloud a secure place · 2017-10-05 · Why HSMs are needed to make...

Date post: 28-May-2020
Category:
Upload: others
View: 6 times
Download: 0 times
Share this document with a friend
15
Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 1 Utimaco IS GmbH Andreas Philipp VP Business Development Why HSMs are needed to make Cloud a secure place
Transcript

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 1

Utimaco IS GmbHAndreas PhilippVP Business Development

Why HSMs are needed to make Cloud a secure place

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 2

The basicbenefits ofcloudcomputingare fairlyobvious…

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 3

The cloud offersscalability

agility

simplicity

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 4

The impactof cloud

computingextends far

beyondthe IT

department.

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 5

Security is Key

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 6

Encryption is the baseline

technology and the

cornerstone of security

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 7

Separating the encryption key

from the encrypted data is

essential in keeping data

secure

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 8

Compared to software technology, hardware-based security offers unmatched, tamper-proof protection without risk of third-party backdoor access, which is critical for any company looking to secure sensitive customer and corporate data both on premise and in the cloud.”

Malte Pollmann, CEO of Utimaco

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 9

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 10

Hardware Security in Cloud scenarios

SaaS (&PaaS)HSM is part of a specific Cloud offering

Pros: - Secure Key Storage- separation of Duty- Trust as a Product UsP

Cons: - HSM Interface needed- Special hardware required

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 11

IaaSHSM offered as Infrastructure

Pros: - Flexible add on to existing onsite HSM Cluster- Covering of load peaks- Reuse of existing key material

Cons: - HSM are not interoperable - No existing standard API, vender specific- Custom application support

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 12

Hardware Security in Cloud scenarios

ColocationHSM on site, with a link to the cloud application

Pros: - Never give up key sovereignty- Clear separation of duty

Cons: - Security administration needed- Business critical application hard to impelemt

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 13

Cloud GatewayHSMs are part of Gateway appliances

Pros: - Secure Key Storage- Max. privacy- Integrated key management

Cons: - Additional Hardware management- HSM Integration into Gateway Solution- Adminstration

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 14

Malte Pollmann, CEO of Utimaco

Security is Key

Utimaco HSM Business Unit· Aachen, Germany · ©2016 www.utimaco.com Page 15

Utimaco IS GmbH

Germanusstraße 4

52080 Aachen

Germany

Tel +49 241 1696 200

Fax +49 241 1696 199

Email [email protected]

Thanks for your attention!

Utimaco Inc.

Suite 150

910 E Hamilton Ave

Campbell, CA 95008

United States of America

Tel +1 844 884 6226

Email [email protected]

Andreas Philipp

Business Development

[email protected]


Recommended