{"id":3307,"date":"2019-03-19T11:44:34","date_gmt":"2019-03-19T11:44:34","guid":{"rendered":"http:\/\/madhousereport.com\/?p=3307"},"modified":"2019-03-19T11:44:34","modified_gmt":"2019-03-19T11:44:34","slug":"gemalto-expands-cloud-hsm-demand-solutions","status":"publish","type":"post","link":"https:\/\/theblogonline.com\/?p=3307","title":{"rendered":"Gemalto Expands Cloud HSM On Demand Solutions"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\"><i>SafeNet Data Protection On Demand cloud platform now offers HSM On Demand to secure CyberArk Privileged Access Management, Oracle Transparent Data Encryption, and Hyperledger Blockchain Transactions<\/i><\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">AMSTERDAM&#8211;(<a href=\"http:\/\/www.businesswire.com\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">BUSINESS WIRE<\/span><\/a>\/<a href=\"http:\/\/aetoswire.com\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">AETOSWire<\/span><\/a>)&#8211; Gemalto, the world leader in digital security, today announced the availability of three new cloud-based Hardware Security Module (HSM) services, <a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fdata-protection-on-demand%252Fservices%252Fhsm-cyberark-digital-vault%252F&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=HSM+On+Demand+for+CyberArk&amp;index=1&amp;md5=99b31eee3f7e0801a283ce7467158cc2\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">HSM On Demand for CyberArk<\/span><\/a>, <a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fdata-protection-on-demand%252Fservices%252Fcloud-hsm-hyperledger%252F&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=HSM+On+Demand+for+Hyperledger&amp;index=2&amp;md5=1d541de9107e7672b984ac7fb31a8708\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">HSM On Demand for Hyperledger<\/span><\/a> and <a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fdata-protection-on-demand%252Fservices%252Fcloud-hsm-oracle-tde%252F&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=HSM+On+Demand+for+Oracle+TDE&amp;index=3&amp;md5=14aa4348cd0ce4b08eaf60318ab4a1a7\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">HSM On Demand for Oracle TDE<\/span><\/a>. Each service is available through the <a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fdata-protection-on-demand%252F&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=SafeNet+Data+Protection+on+Demand&amp;index=4&amp;md5=d3e5f469d9d248b8e5df4313f4c40bb4\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">SafeNet Data Protection on Demand<\/span><\/a> platform, a marketplace of cloud-based HSM, encryption and key management services that easily integrates with most widely used cloud services and IT products to protect data wherever it is created, accessed or stored. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">The rapid adoption of cloud and digital services has made it difficult for organizations to secure data and identities that are created, stored and managed outside the perimeter. While organizations recognize that data encryption is the optimal solution to secure sensitive information, they can be challenged by the cost and complexity of deploying encryption, including Hardware Security Modules to secure their cryptographic operations. Gemalto\u2019s SafeNet Data Protection On Demand solves these challenges by providing cloud-based HSM services that and can be deployed in minutes without the need for highly skilled staff. Gemalto, a leader in the HSM market, is proven to help customers secure their encryption keys and data across cloud, hybrid, and on-premises environments. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">\u201cA worsening threat landscape, combined with aggressive cloud adoption and evolving privacy regulations, have presented complex new challenges related to encryption, privileged access and financial transactions,\u201d said Todd Moore, Senior Vice President of Encryption Products at Gemalto. \u201cOur newest Cloud HSM On Demand services help organizations stay in front of new threats and regulations, by easily deploying an HSM solution for the strongest possible key management and security practices, all while providing fast, easy set-up, with remarkable savings over traditional approaches involving specialized hardware and skills.\u201d <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">\u201cMany organizations would like to deploy data security more broadly, but are often wary due to concerns about complexity, cost and staffing requirements, particularly with respect to encryption and key management,\u201d said Garrett Bekker, Principal Analyst at 451 Research. \u201cThe release of SafeNet Data Protection On Demand was a positive step towards addressing those concerns, and extending its cloud HSM capability to newer use cases like blockchain, database security and privileged credentials is a logical and timely move.\u201d <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><b>HSM On Demand for CyberArk<\/b><\/span><\/p>\n<p class=\"p4\"><span class=\"s3\"><a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fdata-protection-on-demand%252Fservices%252Fhsm-cyberark-digital-vault%252F&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=HSM+On+Demand+for+CyberArk&amp;index=5&amp;md5=c8af4d9b5c7397d70d083261c2e241f7\" rel=\"nofollow noopener\" target=\"_blank\">HSM On Demand for CyberArk<\/a><\/span><span class=\"s1\"> works seamlessly with CyberArk\u2019s Privileged Access Security Solution, providing private key protection and strong entropy for key generation for system keys.. By securing the master key and ensuring that it is hosted in a secure vault, HSM On Demand for CyberArk mitigates the risk of the master key being exposed or compromised. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><b>HSM On Demand for Hyperledger<\/b><\/span><\/p>\n<p class=\"p4\"><span class=\"s3\"><a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fdata-protection-on-demand%252Fservices%252Fcloud-hsm-hyperledger%252F&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=HSM+On+Demand+for+Hyperledger&amp;index=6&amp;md5=38b26ef9c5ec84a500e31ca7100dd872\" rel=\"nofollow noopener\" target=\"_blank\">HSM On Demand for Hyperledger<\/a><\/span><span class=\"s1\"> provides trust for blockchain transactions by securing the cryptographic keys that sign them. It protects digital wallets, while ensuring keys are readily available in the cloud once access is granted. The service provides high assurance security in data centers and the cloud, enabling multi-tenancy of blockchain identities per partition as proof of transaction and for auditing requirements. It also delivers performance improvements resulting from off-loading cryptographic operations from application servers to the HSM on Demand service.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><b>HSM On Demand for Oracle TDE<\/b><\/span><\/p>\n<p class=\"p3\"><span class=\"s3\"><a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fdata-protection-on-demand%252Fservices%252Fcloud-hsm-oracle-tde%252F&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=HSM+for+Oracle+TDE&amp;index=7&amp;md5=c442fd3b2e6c4abeee5a00f952faaf23\" rel=\"nofollow noopener\" target=\"_blank\">HSM for Oracle TDE<\/a><\/span><span class=\"s1\"> (Transparent Data Encryption) solves the challenge presented by locally stored encryption keys by protecting them with a master key, stored in a separate service key vault. This ensures that only authorized services are allowed to request the local key to be decrypted. If an attacker steals the database, it is encrypted and inaccessible, since the attacker does not have access to the keys that are securely stored on the HSM. <\/span><\/p>\n<p class=\"p6\"><span class=\"s1\"><b>Additional Resources<\/b> <\/span><\/p>\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fdata-protection-on-demand%252Fservices%252Fhsm-cyberark-digital-vault%252F&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=HSM+On+Demand+for+CyberArk+Overview&amp;index=8&amp;md5=b55a0db495c382a38b58226e288135ba\" rel=\"nofollow noopener\" target=\"_blank\">HSM On Demand for CyberArk Overview<\/a><\/span><\/p>\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fresources%252Fintegration-guide%252Fdata-protection%252FCyberark_Digital_Vault_-_Integration_Guide%252F&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=HSM+on+Demand+for+CyberArk+Integration+Guide&amp;index=9&amp;md5=5dfd0415334fb699edc68fcb01a4ab5d\" rel=\"nofollow noopener\" target=\"_blank\">HSM on Demand for CyberArk Integration Guide<\/a><\/span><\/p>\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fresources%252Fintegration-guide%252Fdata-protection%252FHyperledger_Fabric_Blockchain_Integration_Guide%252F&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=HSM+On+Demand+for+Hyperledger+Integration+Guide&amp;index=10&amp;md5=3cbffdcce64aff0835d340507cc01fb4\" rel=\"nofollow noopener\" target=\"_blank\">HSM On Demand for Hyperledger Integration Guide<\/a><\/span><\/p>\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fsafenet.gemalto.com%252Fresources%252Fintegration-guide%252Fdata-protection%252FOracle_Database_-_Integration_Guide%252F&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=HSM+On+Demand+for+Oracle+TDE+Integration+Guide&amp;index=11&amp;md5=2da89e0ba747196c07780beeef5354d5\" rel=\"nofollow noopener\" target=\"_blank\">HSM On Demand for Oracle TDE Integration Guide<\/a><\/span><\/p>\n<p class=\"p7\"><span class=\"s5\">Blog: <a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fblog.gemalto.com%252Fsecurity%252F2018%252F11%252F20%252Fchoosing-the-right-cloud-hsm%252F&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=Choosing+the+Right+Cloud+HSM&amp;index=12&amp;md5=a6fcfa1febdab5895440725ee3188b5c\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s4\">Choosing the Right Cloud HSM<\/span><\/a> <\/span><\/p>\n<p class=\"p6\"><span class=\"s1\"><b>About Gemalto<\/b> <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Gemalto (Euronext NL0000400653 GTO) is the global leader in <a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fwww.gemalto.com%252Fcompanyinfo&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=digital+security&amp;index=13&amp;md5=b2afe1b3638f3e4c3442f58069c9af76\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">digital security<\/span><\/a>, with 2018 annual revenues of \u20ac3 billion and customers in over 180 countries. We bring trust to an increasingly connected world. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">From secure software to biometrics and encryption, our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Gemalto\u2019s solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software \u2013 enabling our clients to deliver secure digital services for billions of individuals and things. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Our 15,000 employees operate out of 110 offices, 47 personalization and data centers, and 35 research and software development centers located in 47 countries. <\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">For more information visit <a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Fwww.gemalto.com&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=www.gemalto.com&amp;index=14&amp;md5=0e710398d726e273cad102d3d67e097f\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">www.gemalto.com<\/span><\/a>, or follow <a href=\"https:\/\/cts.businesswire.com\/ct\/CT?id=smartlink&amp;url=https%253A%252F%252Ftwitter.com%252Fgemalto&amp;esheet=51950149&amp;newsitemid=20190305005673&amp;lan=en-US&amp;anchor=%2540gemalto&amp;index=15&amp;md5=cac6ce5699000783ed9e9de917746a02\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\">@gemalto<\/span><\/a> on Twitter. <\/span><\/p>\n<p class=\"p6\"><span class=\"s1\">View source version on businesswire.com: <\/span><\/p>\n<p class=\"p7\"><span class=\"s4\"><a href=\"http:\/\/www.businesswire.com\/cgi-bin\/mmg.cgi?eid=51950149&amp;lang=en\" rel=\"nofollow noopener\" target=\"_blank\">http:\/\/www.businesswire.com\/cgi-bin\/mmg.cgi?eid=51950149&amp;lang=en<\/a><\/span><\/p>\n<p class=\"p8\"><span class=\"s1\"><b>*Source: <\/b><a href=\"https:\/\/www.aetoswire.com\/news\/8291\/en\" rel=\"nofollow noopener\" target=\"_blank\"><span class=\"s2\"><b>AETOSWire<\/b><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SafeNet Data Protection On Demand cloud platform now offers HSM On Demand to secure CyberArk Privileged Access Management, Oracle Transparent Data Encryption, and Hyperledger Blockchain Transactions AMSTERDAM&#8211;(BUSINESS WIRE\/AETOSWire)&#8211; Gemalto, the world leader in digital security, today announced the availability of three new cloud-based Hardware Security Module (HSM) services, HSM On Demand for CyberArk, HSM On [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2272,2273,918],"class_list":["post-3307","post","type-post","status-publish","format-standard","hentry","category-metro","tag-cloud-hsm","tag-demand-solutions","tag-gemalto"],"_links":{"self":[{"href":"https:\/\/theblogonline.com\/index.php?rest_route=\/wp\/v2\/posts\/3307"}],"collection":[{"href":"https:\/\/theblogonline.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/theblogonline.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/theblogonline.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/theblogonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3307"}],"version-history":[{"count":1,"href":"https:\/\/theblogonline.com\/index.php?rest_route=\/wp\/v2\/posts\/3307\/revisions"}],"predecessor-version":[{"id":3308,"href":"https:\/\/theblogonline.com\/index.php?rest_route=\/wp\/v2\/posts\/3307\/revisions\/3308"}],"wp:attachment":[{"href":"https:\/\/theblogonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/theblogonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/theblogonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}