Virtualization and the Cloud: Encryption Enables a Fast and Secure Migration

Gargi Mitra Keeling, Group Product Manager, vCloud Security, VMware; Imam Sheikh, Product Manager, Virtualization, SafeNet
The business benefits and economies of migrating to virtualized and cloud environments are very clear, providing significant cost reduction and system efficiencies, moving to a “pay as you go model”. However, when you move to a dense virtual infrastructure or cloud, you often lose control of the underlying infrastructure, therefore ownership and control of data in that infrastructure. In addition, workloads are mobile yet security is usually tied to underlying infrastructure, removing any assurances that security policies can be enforced as workloads move.

In the journey to virtualization and the cloud, many organizations are still contending with large pools of physical infrastructure. They want to gain the efficiency and lower cost associated with server consolidation and virtualization, but security and audit teams advise them this puts the company’s sensitive data at risk. Automating IT in a private cloud keeps developers and other users in-house and under an organization’s control, but rapid deployment of workload requires agile security.

Join your fellow professionals to first understand the challenges and roadblocks of migrating to the cloud and virtualized environments, and where the data security gaps exist. Then understand how by attaching security to the data itself and managing the encryption keys, you are able to maintain control of your data, prove compliance, and facilitate governance – even in a dense virtual or cloud environment. Virtualization, Hybrid or Public cloud offerings can now be used for broader workloads (including ones containing business critical, sensitive data ie. production servers in addition to test and development), while still delivering the security and compliance requirements needed.
Oct 18 2012
47 mins
Virtualization and the Cloud: Encryption Enables a Fast and Secure Migration
Join us for this summit:
More from this community:

Cloud Computing

Webinars and videos

  • Live and recorded (3267)
  • Upcoming (98)
  • Date
  • Rating
  • Views
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • 397% de ROI , c‘est ce que vous offre l’architecture Fluid Data de Dell. C’est prouvé mais comment est-ce possible ?
  • Rob Sherwood, CTO of Big Switch Networks, will present an end-to-end open source technology stack for SDN R&D, spanning switch hardware, software and SDN controllers. He will touch on the Open Compute Projects' switch design, Open Network Linux, Project Indigo, Project Floodlight and others. He will also discuss how these projects fit together, their various evolutionary paths, and how this stack fits in the landscape of emerging commercial and open source SDN products.
  • Join Mark Collier, COO of the OpenStack Foundation, Troy Toman, Cloud Architect at Rackspace and Das Kamhout, IT Principal Engineer at Intel, to discuss updates on Icehouse, the latest OpenStack software release, available on Thursday, April 17. OpenStack Icehouse is the ninth release of the open source software for building public, private, and hybrid clouds. Mark will also review the next OpenStack Summit agenda taking place in Atlanta, Georgia May 12-16, 2014 at the Georgia World Conference Center.

    This webinar will cover:
    - The latest features and trends from OpenStack Icehouse
    - Updated growth metrics from the OpenStack community
    - Opportunities to learn more at the OpenStack Summit in Atlanta May 12-16, 2014
  • Automation is a powerful tool. It strips time and cost out of processes, minimizes errors, and frees up skilled staff to focus on higher value activities. Most IT teams have already capitalized in some part on automation, and most IT professionals can see the potential in extending automation across the enterprise. But how do you embed automation in the company IT DNA? Where do you start in the journey from script automation towards enterprise-wide process automation?

    In this session you will learn how you can scale automation to an enterprise-level through the adoption of a Center of Excellence. Our proven approach creates a cohesive framework for automation and breaks through silos, so your organization benefits from economies of scale and the advantages that automation brings.
  • In today's multi-cloud world, do you find yourself thinking, "I really need an open source private cloud that is completely compatible with leading public clouds, i.e. AWS, GCE."

    This webinar explores the anatomy of an OpenStack-powered private cloud built with hybrid computing and DevOps in mind. Join Cloudscaling’s CEO Randy Bias and Scalr CEO Sebastian Stadil as they discuss the design considerations of a hybrid cloud environment that both IT and developers will love. Mark Williams, Redapt’s CTO (former VP of zCloud Infrastructure Operations) will also share real-world experience from implementing one of the first large-scale hybrid cloud infrastructures.

    Register today and gain insight into:
    - Building OpenStack-powered private clouds
    - Private and public cloud interoperability
    - Managing your hybrid cloud with an eye to the future
    - Lessons from the field; what works and what doesn't
  • In today's multi-cloud world, do you find yourself thinking, "I really need an open source private cloud that is completely compatible with leading public clouds, i.e. AWS, GCE."

    This webinar explores the anatomy of an OpenStack-powered private cloud built with hybrid computing and DevOps in mind. Join Cloudscaling’s CEO Randy Bias and Scalr CEO Sebastian Stadil as they discuss the design considerations of a hybrid cloud environment that both IT and developers will love. Mark Williams, Redapt’s CTO (former VP of zCloud Infrastructure Operations) will also share real-world experience from implementing one of the first large-scale hybrid cloud infrastructures.

    Register today and gain insight into:
    - Building OpenStack-powered private clouds
    - Private and public cloud interoperability
    - Managing your hybrid cloud with an eye to the future
    - Lessons from the field; what works and what doesn't
  • Join salesforce.com customer kCura as they describe the value of having a communities platform to create frictionless service experiences with law firms, government agencies, and litigation service providers. Learn how a self-service community experience enables customers to help each other and themselves, letting service teams focus on the big issues. All of these benefits ultimately translate into a frictionless and unified experience for all their customers!

    George Orr is the VP of Client Services for kCura. He leads strategic and implementation initiatives designed to enhance the online experience of customers.
  • Everyone knows that there are risks associated with moving enterprise data to a Cloud and everyone knows the huge potential that the analytics of Big Data can bring especially when using the Cloud, but what happens when these two converge.

    The presentation will discuss some of the security and privacy challenges associated with Big Data in the Cloud and will present a number of key initiatives that the ODCA have done to support enterprises that wish to take this step.
  • Tras crear un prototipo inicial de su aplicación para una vista previa limitada ya es hora de que el equipo pase a consolidar la arquitectura haciéndola más robusta y tolerante a los fallos antes de lanzarla oficialmente al público final.

    En este capítulo se tratan conceptos de la infraestructura de AWS tales como regiones y zonas de disponibilidad; además, se explica cómo utilizar tales características para incrementar la tolerancia de la aplicación a los fallos.

    Servicios y características tratados
    •Conceptos clave sobre infraestructura (regiones y zonas de disponibilidad)
    •Equilibro de carga elástico (Elastic Load Balancing)
    •Amazon RDS

    Demostración
    •Creación de una AMI basada en una instancia en ejecución
    •Creación y configuración de un equilibrador de carga elástico
    •Zonas de disponibilidad múltiples con Amazon RDS
    •Alarmas con Amazon CloudWatch
  • Channel
  • Channel profile
Up Down
  • How Encryption Key Management Enables Data Center Transformation May 15 2014 2:00 pm UTC 45 mins
    In the past, companies had limited options for encrypting data, and the products that managed the encryption keys were complex, single-purpose, and expensive. Today, a virtualized data center requires a more nimble approach: new encryption solutions have been developed to encrypt data, and more powerful solutions for managing all of the necessary keys are required.

    Blair Semple, CISSP-ISSEP, Director of Business Development at SafeNet, will discuss the role of key management in the enterprise storage ecosystem, best practices, and the recommended characteristics of solutions.

    With this session, you can prepare for a key management system that meets your needs for security, scale, flexibility, and operational efficiency—both today and well into the future.
  • Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control May 14 2014 2:00 pm UTC 45 mins
    Forget the geeky analysis of cloud security; risk is driven by people involved and the approach to adoption. This discussion will tackle the complex issues around data ownership and control in the hands of customers, providers, law enforcement, intelligence agencies and a pantheon of adversaries.

    If data is destiny, then too many people are in charge of your fate.

    We discuss how to get it back.
  • Multiple authentication solutions, but are they all equal? May 8 2014 2:00 pm UTC 60 mins
    How to map the Ideal Authentication Solution to your IT Environment

    Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.

    Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.

    Then we will discuss:

    •Current market trends around collaboration, cloud and security
    •Vulnerabilities associated with unsecured file sharing tools
    •The role of strong authentication in securing collaboration and file sharing tools
    •Authentication Case study
  • Secure payment vulnerabilities with Point-to-Point encryption Apr 24 2014 2:00 pm UTC 60 mins
    Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Secure NAS file sharing – limit the risks and secure the critical data Recorded: Apr 2 2014 45 mins
    The savings with NAS file sharing are compelling – but not without risk. Deployed in virtually every large enterprise, NAS file sharing technologies are now ubiquitous—but there are still many untapped opportunities for organizations to expand their NAS file sharing deployments. Often, it is security and regulatory compliance concerns that have inhibited more widespread usage of NAS file sharing technologies.

    Learn how solutions from SafeNet enable enterprises to secure their NAS file sharing infrastructure that house the most business-critical and sensitive data assets, while at the same time maximizing compliance, availability, usability and security

    Join your fellow professionals for this technically focused webinar with the Product Line Manager for SafeNet Storage Secure.

    REGISTER TODAY to join this informative webinar
  • A Keychain for the Cloud: Best Practices for Private and Hybrid Cloud Encryption Recorded: Mar 13 2014 48 mins
    As organizations move to virtualize their environments they must rethink how the secure their data. Encryption will play a key role in protection of data as perimeter defences become less relevant and traditional security mechanisms struggle to keep threats at bay.

    Join your fellow professionals for a best practice session, to first learn the detail on how encryption is expanding as organizations or all shapes and sizes, and from a wide range of industries, migrate to virtual environments. Then discuss several key management best practices to complete "the keychain" for organizations considering a move to the cloud. Finally we look at specific use cases to demonstrate the use of these best practices for encryption and key management in the enterprise.
  • Best practices for layer 2 network encryption in the public and private sector Recorded: Feb 20 2014 59 mins
    Whether you are a government, military or commercial organization, you need to ensure that your data is encrypted in transit.

    As corporate and government espionage intensifies, with high profile fibre tapping cases, such as UK’s GCHQ extensive fibre tapping becoming public news, encryption of data in transit is essential. Cyber-threats to data in motion are real and occurring constantly. By protecting the data itself with encryption you render it useless to a 3rd party, but can it keep up with your network?

    Data network growth, increasingly sensitive data and bandwidth demands are creating a shift to the more efficient encryption of sensitive traffic at Layer 2. Layer 2 affords secure encryption that is up to 50% more efficient than competing technologies such as IPsec with little or no impact on network performance.

    Join your fellow professionals for a best practice session to understand how these triple certified encryptors, CAPS, FIPS and Common Criteria certified solutions can be used on a Layer 2 network to protect data in motion for government and military organizations, as well as financial and other commercial enterprises. Specifically CAPS provides assurance for the UK government, its agencies and commercial enterprises working with the government.

    With proven reliability, high throughput, and low latency, SafeNet network encryption devices ensure security and certified assurance across Layer 2 networks.

    REGISTER TODAY to join this informative webinar.
  • Data Breach nella regolamentazione di matrice UE e la prospettiva italiana Recorded: Feb 19 2014 61 mins
    Il quadro normativo di riferimento a livello europeo in materia di disposizioni di sicurezza sta prendendo sempre più forma grazie all’entrata in vigore del Regolamento EU 611/2013 e alla nuova legislazione in corso di approvazione sulla protezione dei dati personali (EU Data Protection Regulation) e sulla sicurezza delle reti e delle informazioni (NIS Directive).

    In particolare, la fornitura di servizi digitali nel mercato italiano ed europeo non può prescindere dal rispetto del Regolamento EU 611/2013 sulla notifica delle violazioni di dati personali nel settore dei servizi di comunicazioni elettroniche. A questo proposito, misure tecnologiche quali la cifratura dei dati vedono confermata la loro efficacia, ora riconosciuta anche a livello di legislazione EU.
  • How to Say “YES” to Dropbox for Sensitive Data in the Enterprise Recorded: Dec 5 2013 46 mins
    How to Say “YES” to Dropbox for Sensitive Data in the Enterprise (And feel good about it)

    Dropbox isn’t coming to your enterprise someday. It’s here, now. BYOD(ropbox) has happened, as employees try to make it easy to collaborate and access documents on the go. While this transition may have happened without your IT organization’s involvement or buy in, IT teams still have a critical role to play when it comes to protected sensitive corporate documents. You may have even implemented other file sharing or storage applications internally-but are your employees using them?

    The reality is that enterprises can begin to say YES to Dropbox usage for sensitive documents, while eliminating the associated security risks. This webinar will show you how, and provide recommendations on what to look for in order to help you embrace Dropbox within your organization to secure the workloads that you need protected.
  • Utilizing Strong Authentication for Secure File Collaboration in the Enterprise Recorded: Nov 20 2013 57 mins
    Managers tasked with leading IT and security today find themselves having to navigate fundamental changes in their professional environment.

    In the process they are being overtaken by business units, groups and even individual employees who are taking an off-road approach by procuring IT services on their own, whether by subscribing to a SaaS offering, buying their own computing equipment, downloading a productivity application, or renting cloud storage. From here, the slippery road toward unauthorized file sharing and leakage of sensitive corporate data is short.

    Join your fellow professionals for a best practices session on “Utilizing Strong Authentication to Encourage Collaboration in the Enterprise”. In this webinar executives from SafeNet and WatchDox will discuss how strong authentication combines with file sharing to facilitate and enable secure collaboration in the enterprise.

    In this webinar we will discuss :

    •Current market trends around collaboration, cloud and security
    •Vulnerabilities associated with unsecured file sharing tools
    •The role of strong authentication in securing collaboration and file sharing tools
    •Case study discussion
  • Risks and Strategies: Managing Enterprise File Data Securely Recorded: Nov 14 2013 49 mins
    Every enterprise has secret, compliance-related, or otherwise confidential data contained in the data center.

    The management and control of these files especially in a distributed and mobile world is fraught with hidden dangers and risks. Encryption alone cannot solve all of these problems.

    So join Chris Winter and fellow data center professionals for this insightful discussion on the issues involved, and discover the preventative actions and technologies needed to manage your enterprise file data securely.
  • Authentication Made Easy. Automating Authentication. Recorded: Nov 1 2013 3 mins
    Automating authentication management services with SafeNet Authentication Service. Learn how to reduce your management costs by up to 60% and free up IT admin time.
  • Virtualization and Changing the Approach to Data Encryption Recorded: Oct 10 2013 25 mins
    The advantages of virtualization are well publicised, as are the many security concerns.
    At the end of the day, the security of these solutions will determine the willingness of organizations to move sensitive workloads to the cloud.
    One thing is clear; encryption will play an important role in bridging the gap between the security of traditional systems, and the advantages of the cloud. For that to happen new encryption technologies need to be introduced and legacy encryption technologies need to evolve.

    Join your fellow professionals on this insightful session to learn more.
  • Your Cloud or Mine? Exploring Data Security in the Cloud Recorded: Oct 9 2013 49 mins
    This discussion will tackle the complex issues around data ownership and control in the hands of cloud users at the consuming organization, cloud administrators at the cloud provider, law enforcement, intelligence agencies and a pantheon of adversaries.

    When sensitive information exists outside of the traditional internal IT environment, it has the potential to deprecate the ability to properly protect and monitor it for indicators of compromise. Whether it’s the virtualization layer in a private cloud or the APIs and management layer of a public cloud, there is an entire new class of privileged infrastructure and privileged users—creating additional opportunity for failure. Adversaries clearly see cloud as an area of opportunity—all the eggs in one basket! Rather than optimally addressing these issues, most organizations try to (unsuccessfully) map legacy controls from traditional data centers into the cloud.

    This session will cover the real issues and ideas in how we assess and manage security in these environments. If losing control and ownership of your data in the cloud is slowing down your cloud consumption, we discuss how to retain control in these new environments.
  • Secure the Breach – Bereiten Sie sich auf den Ernstfall vor Recorded: Sep 26 2013 47 mins
    Die Frage ist nicht OB, sondern WANN!

    Seit Jahrzehnten spielen wir nun das gleiche Spiel.
    Hacker versuchen mit allen Mitteln an unsere wertvollen Daten zu gelangen und wir versuchen Ihnen immer einen Schritt voraus zu sein. Wir investieren Unsummen in Firewalls, Anti-Virus-Software, VPN und IPS – immer bedacht, eine undurchdringbare Mauer um genau diese Daten zu ziehen.

    Doch diese Strategie hält mit den technologischen Entwicklungen der letzten Jahre und dem Einzug der Cloud den Anforderungen nicht mehr stand – wie schützen Sie einen Perimeter, der nicht mehr existiert?

    Aus diesem Grund setzt SafeNet sich für einen neuen, realistischen Umgang mit Sicherheitsvorfällen ein. Wir sind der Meinung, dass zu einem guten Sicherheitskonzept eines Unternehmens das Eingeständnis gehört, dass der Ernstfall eines Tages eintreten wird.
    Secure the Breach
    In diesem Webinar stellen wir Ihnen ein neues Sicherheitskonzept vor, das wir „Secure the Breach“ nennen und in dem nicht mehr der Schutz des Vektors, sondern der Information selbst im Mittelpunkt steht.
    Registrieren Sie sich hier unverbindlich für das Webinar
    Registrieren Sie sich heute für unser deutschsprachiges „Secure the Breach-Webinar“. Investieren sie 30 Minuten Ihrer wertvollen Zeit, um Anregungen zu erhalten, die sich für die Sicherheit Ihres Unternehmens auszahlen werden.
  • Layer 2 Network Encryption – where safety is not an optical illusion. Recorded: Sep 25 2013 55 mins
    Corporate and government espionage is real and set to intensify, with high profile fibre tapping cases, such as UK’s GCHQ extensive fibre tapping becoming public news. These all contribute to the real need to protect data in motion from cyber-threats. By protecting the data itself with encryption you render it useless to a 3rd party, but can it keep up with your network?

    Data network growth, increasingly sensitive data and bandwidth demands are creating a shift to the more efficient encryption of sensitive traffic at Layer 2 where secure encryption is up to 50% more efficient than competing technologies such as IPsec. Encryption of data at L2 moves at speeds of up to 10 Gbps with little or no impact on network performance.

    Join your fellow professionals to see a demonstration of how these CAPS, FIPS and Common Criteria certified solutions can be used on a Layer 2 network to protect data in motion for government and military organizations, as well as financial and other commercial enterprises.

    With proven reliability, high throughput, and low latency, network encryption security devices ensure safety is not an optical illusion.

    REGISTER TODAY to join this informative webinar.
  • Navigating Your Way to The Cloud and Steering Clear of The Security & Compliance Recorded: Sep 19 2013 59 mins
    Organizations have benefited from the tremendous cost savings possible with virtualized and cloud infrastructures, but they often run into issues when considering the security and compliance implications of further virtualization or migration to cloud environments. One critical issue is the storage of sensitive and regulated data – What is the best tool to protect this data, what approaches exist and what are the pros and cons of each?

    Join Rich Mogull from Securosis who will detail:
    •How data storage differs in virtualized, private and public cloud infrastructures
    •Existing approaches to volume and object encryption
    •What you need to know about encryption key management
    •How a lawful seizure at your service provider can impact your data

    SafeNet and NetApp will cover:
    •Customer case studies of successful cloud storage encryption
    •Key criteria to consider for storage encryption
    •Solutions available today

    Learn how to separate security from virtualized and cloud infrastructures without sacrificing the advantages of cloud computing. Make encryption an enabler for the move to lower cost, more scalable models of data storage.
  • Performance AND Security at the Speed of Your Business Recorded: Aug 22 2013 56 mins
    Performance AND Security at the Speed of Your Business – Since the advent of modern networks there has always been an uneasy tug of war of either having a high performance network or a high security network, but you could not have both. It was a tug of war between the security and the network folks for getting “their way”. With today’s high speed networks and the convergence of mission critical video, voice and data having to make that choice of choosing one or the other is simply not an option.

    On this webcast, we will profile the environments and also present new models and deployment options where you can have both security AND performance that scales to the speed of your business.
  • ABC's of Securing Your AWS Cloud Recorded: Jul 24 2013 33 mins
    The savings of using public cloud is compelling – but not without risk.

    Learn how SafeNet ProtectV encrypts your virtual instances and virtual storage to secure your infrastructure from common hacker attacks, rogue admins and unauthorized copies of proliferating data snapshots.Own your data and control your keys, even in the multi-tenant Amazon Web Services cloud environment.

    Join your fellow professionals for this technically-focused webinar with the Product Line Manager for SafeNet ProtectV.
  • Starke 2-Faktor-Authentifizierung als Service? Recorded: Jul 18 2013 44 mins
    Warum das für Ihr Unternehmen interessant sein könnte.

    Security-Verantwortliche über alle Unternehmensgrößen hinweg, wissen um die Wichtigkeit einer starken 2-Faktor Authentifizierung als Bestandteil einer umfassenden Stratgegie zum Informationsschutz.

    Doch während manches Unternehmen der vermeintlich hohe Anfangsinvest noch vom Einsatz einer Authentifizierungslösung abschreckt, suchen andere bereits nach Alternativen zur bereits installierten, aber aufwändig zu unterhaltenden Lösung.

    Die häufigsten Einwände lauten:

    AUFWÄNDIG: verursacht enormen administrativen Aufwand
    KOMPLEX: Kompliziert und schwer zu implementieren
    ZU TEUER: Zu teuer in Anschaffung und Unterhalt
    TOKEN-AUSWAHL: Man muss sich für eine Tokenart entscheiden

    Guter Rat ist teuer, aber der Verzicht auf Identitätskontrolle keine Option. Warum also nicht auf eine neue Lösung setzen, die die bekannten Nachteile eleminiert, oder zumindest auf ein Minimum reduziert?

    Informieren Sie sich in unserem deutschsprachigen Webinar über die Vorteile, die Authentifizierung als Service, installiert als Cloud-Lösung oder on Premise, Ihrem Unternehmen bieten kann und warum bereits viele Unternehmen diese Lösung erfolgreich einsetzen.
EMEA Data Protection Solution Webinars
EMEA data protection solution webinars designed for enterprise end users, distributors and resellers.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Virtualization and the Cloud: Encryption Enables a Fast and Secure Migration
  • Live at: Oct 18 2012 3:00 pm
  • Presented by: Gargi Mitra Keeling, Group Product Manager, vCloud Security, VMware; Imam Sheikh, Product Manager, Virtualization, SafeNet
  • From:
Your email has been sent.
or close
You must be logged in to email this