CLOUD, HOSTING AND MANAGED SERVICE PROVIDERS

Vormetric Data Security Solutions

Deliver the Security Services that Fuel Business Growth

Security is the chief impediment to more pervasive adoption of cloud-based services and delivery models. By addressing security concerns, service providers can establish strong market differentiation, expand their presence in existing accounts, and boost market share.

Vormetric offers a unique and compelling opportunity to enable you to overcome your customers’ compliance, security and trust concerns in moving workloads with sensitive data to your environment. The Vormetric Data Security Platform makes it simple for Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS), and Platform-as-a-Service (PaaS) providers to extend their product offerings to include data security as a service offerings (DSaaS). The solution features capabilities for data-at-rest encryption at the file-level, application-layer, using a cloud encryption gateway, with on-premises and off-premises key management support. The solution can also provide tokenization, privileged user access control, and security intelligence logs that can be used for end-customer security analytics and compliance reporting.

With Vormetric your service can support compelling data-centric security services that you can sell and deliver to your customers. With these services, your organization can:

  • Expand revenues. Address the data security and compliance concerns that are keeping customers from moving sensitive data and workloads to your cloud or hosted environments.
  • Deliver cloud service provider security services. With your Vormetric powered service, you can help your customers address their compliance mandates and you can address your contractual obligations concerning customer data access.
  • Reduce business risk. With the Vormetric Data Security Platform, your customers can institute systematic controls that prohibit any unauthorized users—including anyone on your staff—from accessing sensitive data. At the same time, the platform won’t hinder your administrators from doing the tasks they need to support and optimize their implementations. As a result, you and your customers can reduce risk.
  • Cloud-based business model. As a Vormetric Cloud Partner you can take advantage of subscription based service provider pricing and advanced customer support that stands behind your customer support team 24x7.

How Your Customers Benefit

By delivering data-centric security services powered by Vormetric, your customers can realize these advantages:

  • More fully leverage the cloud. Potential security and compliance gaps have restricted businesses from moving many sensitive assets and services into the cloud. With Vormetric, you can deliver the safeguards and controls these organizations need to more fully leverage your cloud services.
  • Address compliance mandates. With Vormetric, your business can provide the controls, visibility, and auditability your customers need to comply with internal policies and mandates. You can help customers run services in the cloud without compromising compliance, including the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), or other standards.
  • Reduce risk of data breaches. With Vormetric encryption, your clients can dramatically reduce their exposure to a devastating data breach. Executives can be assured that, even if there’s a breach of your facilities, encrypted data won’t be compromised, which means they can avoid the forced disclosures required by privacy regulations.
  • Retain persistent control—no matter what. In the cloud, data assets can be replicated to many different repositories and, even after a virtual machine is decommissioned, data remnants may still exist. With Vormetric, your customers can ensure data remains encrypted, no matter where it is copied or saved. In addition, customers can delete the keys for a specific set of encrypted data, so they can effectively digitally shred data and ensure it won’t ever be accessed in the clear.
  • Avoid unauthorized government access to your data. Even if your organization receives a subpoena requiring the submission of the digital assets of one or more of your clients, customers with Vormetric will be able to retain control over keys, and so retain control over whether any encrypted assets get decrypted or not.

Vormetric Provides Flexible Delivery Options

The Vormetric Data Security Platform features a flexible policy and key management deployment architecture, so you can support multiple implementation options, and tailor your approach to your customers’ specific security demands and business models. Leveraging the Vormetric Data Security Manager (DSM) you can offer support for the following key and policy management deployment approaches:

  • Cloud-based deployment. Vormetric Data Security Manager can be implemented as a virtual appliance or a FIPS 140-2 validated appliance that is hosted in your environment.
  • Customer on-premises deployment. Vormetric Data Security Manager can be deployed as a virtual appliance or FIPS 140-2 validated appliance that is hosted on your customer’s premise.

No matter which appliance or hosting approach your customers choose, you can help your customers ensure that unauthorized users—even your own system administrators—never get access to administrative controls and cryptographic assets. With Vormetric Data Security Manager’s granular access controls, separation of duties, and detailed auditing capabilities, you can give customers the visibility and control they need to restrict administrative access and centrally manage policies.

In addition, if your customers need to enable employees and partners to work with the data without seeing the actual values, Vormetric Tokenization and Dynamic Masking lets administrators establish policies to return an entire field tokenized or dynamically mask parts of a field. With the solution’s format-preserving tokenization capabilities, managers can restrict access to sensitive assets, yet at the same time, format the protected data in a way that enables many users to do their jobs.

For IaaS, PaaS and SaaS providers, click here to review Vormetric’s Cloud Partner Program designed to enable cloud, application, hosting and managed service providers who want to deliver best-in-class security services and meet compliance needs for their end customers.

IaaS providers can discuss their specific data security as a service questions and deployment options by contacting us at cloudpartners@vormetric.com.

SaaS and PaaS providers can learn more about how to design and integrate data encryption capabilities into your application and platform service offerings here or contact Vormetric at SaaS@vormetric.com.

WHITE PAPERS

Data Security in the Cloud

Data Security in the Cloud

Protecting Business-Critical Information in Public, Private and Hybrid Cloud Environments

Download >>

WEBCAST

Cloud Data Encryption Myths Debunked

Cloud Data Encryption Myths Debunked

Controlling data encryption and key management is a MUST in the cloud.

Watch Now >>

CUSTOMER QUOTE

 Organizations have increasingly adopted Rackspace as their provider of choice for enterprise class cloud and hosting solutions. With Vormetric, we’ve added new capabilities to extend data security practices to our customer implementations across our managed cloud platform. 

John Engates
CTO
at Rackspace

RESOURCES

Industry Guidelines for Building Secure Cloud Services

Industry Guidelines for Building Secure Cloud Services

Download >>
451 Research: Vormetric Cloud Partner Program

451 Research: Vormetric Cloud Partner Program

Download >>
Vormetric Cloud Partner Program Overview

Vormetric Cloud Partner Program Overview

Download >>
Vormetric Data Security Platform for Cloud Providers

Vormetric Data Security Platform for Cloud Providers

Download >>
Cloud Partner Case Study: Virtustream

Cloud Partner Case Study: Virtustream

Download >>

The Vormetric Digital Digest on Data Security

Customer and Partner Success

  • Rackspace Cloud Partners
  • McKesson
  • AWS
  • Google Compute Engine
  • Microsoft
  • IBM
  • CenturyLink
  • QTS
  • Teleperformance Secures
  • Delta Dental