sb-au logo
Story image

nCipher introduces cloud-first architecture

nCipher Security has announced two new additions to its nShield hardware security module (HSM) portfolio that make it simpler to deploy applications in the cloud and bring greater security and control to clouds.

nShield Web Services Option Pack 

This pack simplifies deployment for cloud-first data centres.

nShield Web Services Option Pack provides a REST API between applications requiring cryptographic key and data protection services and nShield HSM

This enables application deployment underpinned by high-assurance nShield HSMs, which can scale to meet the needs of data centres.

Customers can also use their own load-balancing appliances to handle the HSM workload, simplifying the HSM deployment and configuration, and ensuring the best utilisation of their HSM pools.

nShield Container Option Pack 

This pack enables nShield HSMs to operate seamlessly within a containerised environment.

Containerisation has become the model of choice in forward-thinking cloud and enterprise deployments, offering scaling, flexibility and orchestration.

The nShield Container Option Pack allows developers to leverage the advantages of container platforms while accessing a high-assurance nShield HSM.

The nShield HSM processes sensitive data and key material, reducing the time required to develop and deploy secure containerised applications.

nShield HSMs offer integration with application containers, making it easier to build HSM support into containerised solutions.

The nShield Container Option Pack provides a template deployment model that allows customers to focus on the containerised application without having to worry about HSM integration.

“One of the biggest drivers of digital transformation is the widespread enterprise adoption of cloud - IDC predicts that 70% of new enterprise's applications will be developed cloud-native by 2021,” says nCipher Security chief strategy officer Peter Galvin.

“As organisations increasingly adopt cloud-first strategies and operate in multi-cloud environments, security concerns remain - from visibility into the data protection architecture to managing complex security policies and encryption keys that secure applications and data,” says Galvin.

 “The new nShield Web Services Option Pack and nShield Container Option Pack help cut development times and budgets, allowing customers to harness cloud platforms without losing control of their keys or their data.”

nCipher’s nShield HSM portfolio also includes the following solutions for customers pursuing a cloud-first strategy:

nShield as a Service

A subscription-based service which provides development and deployment teams with access to dedicated cloud-based nShield Connect HSMs.

This allows organisations to migrate to cloud-centric strategies while also maintaining strict security controls required for business-critical applications.

This supports changing business preferences for operational instead of capital expenses, aligns with modern development workflows and decreases the time spent by security personnel on maintenance and monitoring tasks.

Bring Your Own Key

Used in conjunction with nShield HSMs, you can Bring Your Own Keys (BYOK) to your cloud applications, whether you are using Amazon Web Services (AWS), Google Cloud Platform (GCP) or Microsoft Azure.

nShield high-assurance HSMs enable customers to continue to benefit from the flexibility and economy of cloud services, while strengthening the security of their key management practices and gaining greater control over their keys.

Story image
High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020
The COVID-19 crisis has unleashed a wave of sophisticated and disruptive ransomware attacks, and the onus is on businesses to ramp up their security measures if they’re to avoid falling victim, writes Attivo Networks regional director for A/NZ Jim Cook.More
Link image
How to better protect your organisation's most valuable asset - its data.
Data resilience strategies are becoming increasingly critical in relation to the skyrocketing value of data and the proliferation of malicious entities wishing to steal it.More
Link image
Why metrics should always be front of mind for CTOs
Metrics can help businesses collaborate effectively with other senior stakeholders and act on large volumes of business and system performance data.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More
Story image
Proofpoint launches new SMB focused security awareness training
Proofpoint has launched security awareness training for small to medium businesses (SMBs) with the aim of reducing successful phishing attacks and malware infections to almost zero. More
Link image
What's new in Genetec Security Center 5.9
The platform supports physical security that empowers organisations with greater situational awareness.More