Tag Archives: security

Security Concerns for Electronic Signatures and Cloud Technology

Signing documents has been a part of business contracts since before paper even existed. Having something in writing has always been what makes a transaction truly “official.” Lately, the next chapter in the written agreement is unfolding on the digital frontier. Electronic signatures are becoming the new standard for completing transactions all over the world.

As with any new technology, e-signatures raise almost as many questions as the problems they resolve. Are they legally binding? How can one know they are safe? Combine these concerns with the trend toward using cloud computing– and you have additional reasons for concern.

Let’s address some of the common issues and questions about e-signatures and cloud computing in this article.

Why Use Digital Signatures?

The reasons why digital or electronic signatures are preferred over hard copy are obvious. Contracts can easily be signed with people in other countries without waiting for mail, scanning documents or any of the other issues normally associated with getting something signed.

Digital signature systems that are properly designed also make it easy to maintain an audit trail of who signed what. This record keeping is very important in the event that legal action related to the contract must be taken. While scanning signed hard copies can provide quick response, it offers little of the audit trail that a third-party electronic system provides.

Are Electronic Signatures Legal?

Like anything that goes digital, people are always a bit worried about if it’s legal and safe. As far as legality goes, electronic signatures have been completely legal for over a decade. In 2000, the Electronic Signatures in Global and National Commerce law, or ESIGN, was passed making e-signatures legally binding and acceptable for transactions around the world. Europe and Canada followed suit and adopted similar legal laws.

Does this mean any kind of digital signature is a safe bet? Not really. Electronic signatures have been challenged in court. Important factors in making the signature legal was how secure the archiving and retrieval system was as far as the overall audit trail provided by the system. Knowing exactly who signed a document and verifying their identification was very important. Any electronic system used for collecting and archiving signatures should provide this level of authentication.

Electronic Signatures and Cloud Computing

With dedicated hosting on the decline and cloud computing becoming the new standard information technology infrastructure, some serious questions come up about how safe and secure your documents really are. How does cloud hosting of e-signing solutions present a security concern?

Many alarmists point to the shared nature of cloud hosting solutions as an automatic security risk. The fact that several computer systems share a single storage area network that may contain private data make some people nervous. The truth of the matter is though, the same level of risk exists on any system that is not properly designed and maintained.

Cloud computing systems have matured from an unreliable and unsecure prototype technology to a fully functional well-supported trustworthy infrastructure solution. Clear security protocols audit what all users do and partition data from one client away from that of another. Of course, any computer system is only as good as the technicians who maintain it. For this reason, it does pay to investigate what technology is behind the electronic hosting system that you select.

Fortunately, the industry of cloud hosting has lots of standardized security certification programs that include regular audits and a commitment to keeping systems up to date. If you make sure your e-signature solution is using such a system, you can rest easy knowing that your authentication and archive processes are safe and secure.

Electronic signature systems are definitely here to stay and have the legal and security behind them to make them a valid solution. Find out how you can streamline the legal aspects of your business by setting up one of these systems today.


SailPoint Announces Integrated Cloud Identity Management Solution for the Enterprise

Image representing Sailpoint Technologies as d...

Recognizing that cloud adoption is making identity management more complex and difficult for the world’s largest companies, SailPoint today announced SailPoint AccessIQ, which integrates cloud access management with rich identity governance and automated provisioning. AccessIQ provides convenient, easy-to-use services such as single sign-on (SSO) and self-service access request, while ensuring that cloud applications are managed within the same identity governance framework used for on-premises applications. Delivered as a cloud service, AccessIQ deploys quickly and allows enterprises to immediately take advantage of convenient cloud access services coupled with improved visibility and oversight over their usage.

“The consumerization of IT has changed business user expectations. They want fast, simple and convenient access to cloud services without being slowed down by IT processes and controls,” said Jackie Gilbert, VP and GM of SailPoint’s Cloud Business Unit. “And, we see a growing trend of ‘bring your own application,’ where workers self-provision cloud applications. Both scenarios make it more difficult to monitor and control when and where users are placing sensitive data in the cloud, which brings a host of security and compliance concerns. IT can’t manage compliance and risk if it doesn’t have visibility into the cloud applications used throughout the enterprise.”

Designed for empowered business users looking for a more flexible and agile way to address business challenges, AccessIQ provides an intuitive, tablet-like interface to deliver services that improve productivity and user satisfaction. AccessIQ includes an intuitive App Launchpad for one-click, single sign-on to cloud applications from any device, step-up authentication options for added security, as well as simple self-service application request capabilities, via an easy-to-use App Store. This empowers business users to safely use cloud applications for business or mixed-use purposes, with approvals and provisioning handled automatically based on organizational roles and security policies.

SailPoint AccessIQ, together with SailPoint IdentityIQTM, offers the richest set of end-to-end controls over cloud applications available today. AccessIQ’s integration with IdentityIQ provides an enterprise-grade governance platform for managing identities and applications in the cloud, with policy, role, and risk models unified with on-premises application identity management. To extend governance to applications outside the control of IT, AccessIQ provides:

  • Full visibility of user sign-on activity and account usage, enabling
    business unit procured applications and SaaS applications procured by
    individuals to be managed as part of an enterprise-wide identity
    governance strategy.
  • A flexible, risk-based approach to cloud application identities so IT
    organizations can tailor how they manage and control those
    applications without locking down the environment and getting in the
    way of the business.
  • Full audit reporting on application usage and “who has access to what”
    to demonstrate compliance and control monthly subscription expenses by
    promptly deprovisioning unused or unauthorized cloud application
    accounts.

SailPoint AccessIQ is a fully hosted, multi-tenant solution that seamlessly and securely integrates with SailPoint IdentityIQ. It will be generally available in Q3 2012 with per-user subscription-based pricing. For more information, visit: www.sailpoint.com/cloud.


Alert Logic gets $12.2 Million for Cloud Security

Image representing Alert Logic as depicted in ...

Alert Logic (Security-as-a-Service for the cloud) today announced that it has closed a $12.2 million round of financing led by new investors Industry Ventures and DH Capital, and joined by all existing investment firms and several members of the company’s management team including Updata Partners, Covera Ventures, DFJ Mercury, OCA Ventures and Access Venture Partners. Alert Logic will use the funding to accelerate the growth of its new Web Security Manager product line, including deployment of Web Security Manager throughout Alert Logic’s channel of hosting and cloud service provider partners, and to accelerate the growth and adoption of the company’s new elastic cloud security solutions.

“After tripling the size of our company in less than three years and building a customer base of over 1,700 customers representing nearly $30 million in annual recurring revenue, we remain focused on delivering security and compliance solutions to customers of cloud providers,” said Gray Hall, president and CEO at Alert Logic. “Adding new product lines such as Web Security Manager, and new deployment models such as our elastic cloud solutions, is exactly what our customers and partners are asking us to do. This additional capital gives us the ability to move more aggressively in each of these strategic new directions.”

“We are excited about adding Alert Logic as a portfolio company,” said Justin Burden, partner at Industry Ventures. “Having previously invested in security industry leaders such as Fortinet, Sourcefire and Tripwire, we consider cloud security to be one of the strongest investment themes in the IT industry and we believe Alert Logic will prove to be a cloud security market leader.”

“DH Capital has been the leading provider of financial advisory services to hosting and cloud service providers since the inception of the industry segment,” said Peter Hopper, co-founder and CEO of DH Capital. “Alert Logic has the strongest and most-developed channel of service provider partners in the industry, and is setting the standard for delivering SaaS managed security service solutions.”

Alert Logic’s Security-as-a-Service solutions provide customers four distinct advantages: market-leading security tools, a fully outsourced and managed SaaS delivery model, integrated 24×7 Security Operations Center (SOC) services to monitor and provide expert guidance, and the ability to deploy wherever a customer has IT infrastructure – including the cloud.


Xceedium Gets $12 Million for Identity Management

Image representing ArrowPath Venture Partners ...

Xceedium, Inc., provider of Zero Trust privileged identity and access management solutions, today announced that is has closed a $12 million Series B financing extension led by existing investor ArrowPath Venture Partners. The new funds will be used to fuel continued growth and expansion of the company, with specific emphasis on Xceedium’s new cloud-based initiatives. As part of this aggressive growth strategy, the company also announced today the launch of Xsuite Cloud.

“The market for privileged identity and access management solutions is constantly growing and the push for enterprises to move to the cloud has only increased its potential,” said Morgan Rodd at ArrowPath Venture Partners. “Xceedium’s track record and strong management team were the key drivers for this extension. Xceedium has proven resources in place to capitalize on the growing demand for products that control and monitor privileged network access.”

Large enterprises and global government agencies have adopted Xsuite as a critical component of their security infrastructure to meet stringent security and compliance requirements – eliminating the risk of allowing employees and third parties unchecked privileged access to their networks. This financing round allows Xceedium to maintain that leadership position and to aggressively fuel its cloud-based initiatives with Xsuite Cloud. Xsuite Cloud is a comprehensive privileged identity and access management platform designed to provide additional protection for organizations that are taking advantage of the cost, power and scalability of Amazon Web Services (AWS) in conjunction with existing datacenter infrastructure.

“We are very pleased to be announcing this latest round of financing coincident with the unveiling of our new Xsuite Cloud offering,” said Glenn Hazard, Xceedium CEO. “We are seeing significant adoption of our privileged identity and access management solutions within both the commercial and federal sectors. As these customers adopt cloud and hybrid architectures, Xsuite Cloud along with this latest funding extension uniquely positions us to take full advantage of this growing market opportunity.”

In addition to ArrowPath Venture Partners, new investor Western Technology Investment joined existing investors in the Series B financing extension.


Online Tech Offers Data Security Scholarship to College Students

Online Tech is awarding two $1,000 scholarships to students interested in pursuing a career in information technology, computer sciences and healthcare information technology. The 2012 Data Security Scholarship will be available for the Fall semester of the 2012-2013 academic year.

Applicants should show an interest in cloud computing, data computing, disaster recovery, colocation and similar topics as it relates to the ever-changing fields of information technology and healthcare IT.

“Online Tech feels strongly about offering the scholarship in order to encourage tomorrow’s technology leaders to pursue higher education in their respective fields,” said April Sage, Online Tech’s Director of Healthcare Vertical and Marketing.

Scholarships awarded by Online Tech will be based on the applicant’s response to one of the following questions:

1. Healthcare: “What do you see as the best technology for improving healthcare and health IT?”

2. Mobile Security: “What do you see as the most serious mobile security threat facing consumers and/or companies and why?”

While the traditional essay submission is one option, Online Tech has also opened up the submissions to take the form of a short, 10-minute video or an infographic complete with a brief explanation.

All interested students can apply on Online Tech’s website by clicking here. Submissions should submitted no later than July 8, 2012. Winners for the award will be announced by August 10, 2012.


Total Defense Addresses Rampant Cybercrime by Launching Cloud Security Protection for Businesses

Total Defense, Inc. today announced the launch of Total Defense Cloud Security, an integrated cloud-based SaaS (Security as a Service) solution for Web and email protection. This new offering provides organizations with a powerful and versatile Web and email security platform that protects users anytime and anywhere.

The widespread use of the Web as a business tool, coupled with an increasingly mobile workforce, has enhanced corporate productivity, but it has also created new security challenges for companies that must balance providing access with protecting critical corporate assets and data. “The days of the typical business user accessing the Internet solely from the safety of a protected corporate network are over. Today’s workers are connecting from an array of different devices through a multitude of private and public networks, Wi-Fi hotspots, home networks and the like. Traditional appliance-based Web and Email security solutions are unable to address the evolving security needs of modern businesses,” said Paul Lipman, CEO of Total Defense.

“As social media becomes more prevalent, attack vectors are multiplying, forcing IT administrators to require a multi-layered security approach. Our new Cloud Security service complements our existing endpoint products by securing Web and email traffic, while protecting users and data, even when endpoints are outside of the corporate network. Total Defense Cloud Security delivers a comprehensive extra layer of protection for in-house, remote and mobile workers, while improving workplace productivity and reducing cost. Companies can now rest assured that their most valuable assets are safeguarded with multiple layers of protection,” added Lipman.

Total Defense Cloud Security provides users with a secure Internet connection, safe from threats and malware, while ensuring that Web browsing is appropriate and complies with acceptable use policies. Unlike competitors’ security SaaS offerings, the Total Defense service provides a fully unified solution for Web and email protection within a single management and reporting interface, delivering easy and flexible security for all of an organization’s users– wherever they are and on any device. No software installation or administration is required and there are no upfront implementation costs.

“Total Defense Cloud Security is an intuitive, integrated web & e-mail security product that is exceptionally easy to manage. It is extremely simple to provision and customers can be up and running in just a few minutes without ever worrying about server hardware and maintenance,” said Maurice Thompson, Network Administrator for RTL Networks.

Total Defense Cloud Security benefits include:

  • Security for Mobile and Remote Users – protection and policies
    that can be applied to users anywhere whether in the corporate
    environment, on the road or at home
  • Anti-Virus & Blended threat protection – detects and blocks
    virus attachments and malware including malicious URL links to ensure
    protection against the full range of threats that infect corporate
    networks via email
  • Anti-spam & phishing protection – employs latest range of
    anti-spam technologies including IP reputation and real-time content
    analysis to detect and block spam in the cloud before the email
    gateway even receives it
  • Application Control – enables control over social media,
    streaming media and Web-based messaging (E.g. Facebook, Skype, Google
    Talk, YouTube etc.)
  • Bandwidth Control – enables management of Internet bandwidth
    consumption and control over unnecessary, non-business use through
    flexible, policy-based controls
  • URL Filtering – utilizes latest range of Web filtering
    technologies including real-time content analysis and behavioral
    modeling in conjunction with more than 50 continuously updated
    categories of millions of websites
  • Highly redundant Global network – 27 geographic data center
    locations ensures global coverage and near zero latency
  • Comprehensive and Multi-layered Security – Cloud Security
    bundled with Total Defense r12 endpoint suite offers robust tools for
    businesses to secure their assets and data

Total Defense provides a free 15-day trial of Total Defense Cloud Web and Email Security that includes full reporting services to help businesses understand all of the service’s capabilities. To learn more, please visit: www.totaldefense.com/business


Introducing the F5 Technical Certification Program

#F5TCP #interop You are now. Introducing the F5 Technical Certification Program.

f5friday

Can you explain the role of the Cache-Control HTTP header? How about the operational flow of data during an SMTP authentication exchange? Are you well-versed in the anatomy of an SSL handshake and the implications of encrypting data as it flows across the network?

Can you explain the features and functionalities of protocols and technologies specific to the Transport layer?

If so, then you won’t need to study nearly as much as many of your compatriots when you take the test to become an F5 Certified™ professional.

Introducing the F5 Technical Certification Program (F5-TCP)

F5_CertLogo_041012mdF5 Certified™ individuals represent a new breed of technologist – capable of manipulating the entire application stack from the traditional networking knowledge all the way to advanced application-layer understanding with a unique capability to integrate the two. Never before has any company created a program designed to bridge these worlds; a capability critical to the increasingly mobile and cloud-based solutions being implemented around the world today.

The need has always existed, but with the increasing focus on the abstraction of infrastructure through cloud computing and virtualization the need is greater today than ever for basic application delivery skills. Consider that at the heart of the elasticity promised by cloud computing is load balancing, and yet there is no general course or certification program through which a basic understanding of the technology can be achieved. There are no university courses in application delivery, no well-defined missing certlearning paths for new hires, no standard skills assessments. Vendors traditionally provide training but it is focused on product, not technology or general knowledge, leaving employees with highly specific skills that are not necessarily transferrable. This makes the transition to cloud more difficult as organizations struggle with integrating disparate application delivery technologies to ensure an operationally consistent environment without compromising on security or performance.

The F5-TCP focuses on both basic application delivery knowledge as well as a learning path through its application delivery products.

Starting with a core foundation in application delivery fundamentals, F5 Certified™ individuals will be able to focus on specific application delivery tracks through a well-defined learning path that leads to application delivery mastery.

Fundamentals being what they are – fundamental – the first step is to build a strong foundation in the technologies required to deploy and manage application delivery regardless of vendor or environment. Understanding core concepts such as the entire OSI model – including the impact of transport and application layer protocols and technologies on the network – is an invaluable skill today given the increasing focus on these layers over others when moving to highly virtualized and cloud computing environments.

As technologies continue to put pressure on IT to integrate more devices, more applications, and more environments, the application delivery tier becomes more critical to the ability of organizations not just to successfully integrate the technology, but to manage it, secure it, and deliver it in an operationally efficient way. Doing that requires skills; skills that IT organizations often lack. With no strong foundation in how to leverage such technology, it makes sense that organizations are simply not seeing the benefits of application delivery they could if they were able to fully take advantage of it.

testing tracks

quote-badgeApplication delivery solutions are often underutilized and not well-understood in many IT organizations. According to research by Gartner, up to three-quarters of IT organizations that have deployed advanced application delivery controllers (ADCs) use them only for basic load balancing. When faced with performance or availability challenges, these organizations often overlook the already-deployed ADC, because it was purchased to solve basic server load balancing and is typically controlled by the network operations team.

Gartner: Three Phases to Improve Application Delivery Teams 

F5 is excited to embark on this effort and provide not just a “BIG-IP” certification, but the fundamental skills and knowledge necessary for organizations to incorporate application delivery as a first class citizen in its data center architecture and fully realize the benefits of application delivery.

F5 Certification Resources

Connect with Lori: Connect with F5:
o_linkedin[1] google  o_rss[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1] google

Related blogs & articles:

read more

Keynote Announces New 24/7 Web Privacy Tracking, Compliance Monitoring

Image representing Keynote Systems as depicted...

Keynote Systems today announced a new on-demand service for addressing growing Web privacy issues stemming from online behavioral targeting. The new service, called Keynote Web Privacy Tracking, goes beyond traditional monitoring and identifies third party tracking in violation of a site’s own stated privacy policy.

Keynote Web Privacy Tracking provides comprehensive insight into third parties that violate a company’s privacy policies across a website. Using a real browser, Keynote’s service monitors websites and records all of the tracking activity present, for example, cookies being placed on the browser. Keynote then matches that activity against a database of over 600 tracking companies and over 1,000 tracking domains, providing details on what privacy policies are being violated. Additionally, the Keynote Referrer Chain feature provides a detailed record for how the third-party violator came to be on the site, and an audit trail of each handoff in the ad request.

While there are already website privacy testing solutions on the market, Keynote Web Privacy Tracking is the first to apply a proven 24/7 monitoring technology to address the growing concerns over the impact of third party trackers on Internet privacy.

By monitoring websites around the clock from up to 70 geographic locations and covering 28 countries in the United States and Europe, Keynote Web Privacy Tracking provides an unmatched breadth of coverage for understanding the precise location and size of potential privacy issues, including risks arising from variations in how ad networks deliver geo-targeted content. Once privacy violations are found, Keynote goes one step further by providing detailed and actionable records that enable a site owner to manage policy violations with the ad network directly responsible for bringing a violator to the website. Keynote’s solution also features one-click analysis and reporting – once a site operator finds someone violating a company’s own stated privacy policy, with the click of a button a site operator can drill-down for further information.

Keynote Web Privacy Tracking has a comprehensive tracking database that provides site operators with detailed information for each third party tracker on their site. Site owners can then export the Keynote Web Privacy Tracking Report and share with co-workers and ad network partners to take immediate corrective action that reduces their exposure to privacy violations.

“Keynote Web Privacy Tracking is an ideal solution that site operators can begin leveraging immediately to address their lack of visibility into which third parties are violating the site’s own stated privacy policies,” said Vik Chaudhary, vice president of product management and corporate development at Keynote. “Our data will allow them to take very fast remedial action. Also, we believe our cutting edge 24/7 privacy compliance monitoring service will help address the increasing concerns of the many U.S. government agencies examining the issue. This includes the FTC, as well as government agencies in Europe, which may soon hold site operators legally accountable for ensuring consumer privacy on their website.”

“Online websites know that they need to publicize and enforce a strong privacy policy in order to comply with regulations, maintain goodwill with users, and ensure repeat traffic,” said Ian Glazer, research vice president at Gartner, Inc. “However those tasked with managing privacy within the organization often lack visibility into their potential privacy risk. Privacy professionals are engaging a new breed of tools to help them identify the continued risk that comes with third party cookies.”

Scott Crawford, research director with Enterprise Management Associates said, “With regulators and individuals alike becoming increasingly vocal about the responsible handling of sensitive personal data, organizations that develop and deploy Web applications must take those concerns more seriously than ever before.” Crawford continued, “Keynote’s new product provides organizations with more granular and precise insight into how sensitive information is used and privacy requirements met, not only by a business’s own applications, but also by those who provide services such as advertising placement, which could jeopardize the business’s relationships with its customers if private data is not handled properly.”

The results of an in-depth and comprehensive analysis of the online behavioral tracking on 269 Websites, to be publicly released by Keynote in the near future, found that 86 percent of the sites analyzed included third-party tracking of site visitors and, as a consequence of these third parties, over 60 percent of those sites violated one or more of the industry’s most common tracking-related privacy standards.

“The number of websites that allow visitors to be tracked by third parties may be surprising to some, but as consumers begin to understand that their online behavior can be recorded, website publishers will have to work even harder to ensure consumers’ privacy expectations are met,” said Ray Everett, Keynote’s director of privacy services.

Keynote Web Privacy Tracking detects the third parties collecting user information on each company’s site across all pages monitored by Keynote. Keynote then cross-checks each tracker against a database of over 600 ad networks and 1,000 tracking domains. Tracking companies that do not commit to an industry best practice for Web privacy are then flagged as a violator of the selected policy.

Policies checked by Keynote Web Privacy Tracking include:

  • Provide customers an Opt-out
  • Promise to Anonymize Data
  • Subject to Industry Overview from Recognized Organizations

“Ultimately, the burden of policing third-party trackers falls on the shoulders of website publishers,” Keynote’s Everett concluded. “A publisher is responsible for the content of their website, including the practices of the advertisers appearing on it. Monitoring the constantly changing advertising ecosystem is a daunting task, but the consequence of failure is the placing of your brand’s reputation at tremendous risk.”


Three Reasons to Use Cloud Anti-Spam

Guest Post by Emmanuel Carabott,  Security Research Manager at GFI Software Ltd.

GFI Software helps network administrators with network security, content security and messaging needs

Budgets are stretched thin, you already work too many hours, and you’re always trying to find a server that can run the latest requested workload.

For companies with the flexibility to take advantage of cloud-based technologies, there’s a quick and simple way to win back some time, save some money, and free up some resources on your email servers and reallocate the ones that are running your current anti-spam solution – cloud anti-spam. Here’s how:

Money

Cloud anti-spam solutions require no up-front costs, no hardware, operating system, or software investments, and operate on a simple per-user subscription model. They are a great solution for companies looking to implement anti-spam technologies without a major investment. They keep your costs low, predictable, and easy to allocate. The subscription model means you even have the option to take what has always been considered a capital expense and turn it into an operational expense, which may make your CFO as happy as your CIO would be about the budget you save.

Time

Cloud anti-spam solutions will give you back hours in your week taking care of the infrastructure, but that’s not all. The best cloud anti-spam solutions offer you a user self-service model, where each user can get a daily summary of messages that were filtered out, and can click a link in that summary to release a false positive, or log onto a web portal at any time to check for missing or delayed messages themselves. They get instant gratification and your help desk works fewer tickets related to spam. Everyone wins, except, of course, the spammers.

Resources

Spam, malware, and phishing messages don’t just cost time and money, they can consume significant server resources. Anti-spam solutions running on your email server take a lot of CPU cycles to run filter lists and scan for malware, RAM to expand all those attachments before they can be scanned, and disk space to quarantine what inevitably will be deleted. Moving that entire load to the cloud anti-spam solution frees up resources on your servers, can free up space in your racks, and will save you tons of bandwidth you can put to better use since spam is stopped before it ever reaches your border.

Companies that for legal and compliance reasons, or that prefer to maintain complete control of all aspects of the email system may not find cloud anti-spam solutions are the best fit, but for companies with the flexibility to do so, they are the right choice for IT teams looking to save money, time and resources, and who also want to provide their end users with a great email experience. You’re already stretched thin; give yourself, your team, and your budget a break by choosing a cloud anti-spam solution today.


The Encrypted Elephant in the Cloud Room

Encrypting data in the cloud is tricky and defies long held best practices regarding key management. New kid on the block Porticor aims to change that.

pink elephant

Anyone who’s been around cryptography for a while understands that secure key management is a critical foundation for any security strategy involving encryption. Back in the day it was SSL, and an entire industry of solutions grew up specifically aimed at protecting the key to the kingdom – the master key. Tamper-resistant hardware devices are still required for some US Federal security standards under the FIPS banner, with specific security protections at the network and software levels providing additional assurance that the ever important key remains safe.

In many cases it’s advised that the master key is not even kept on the same premises as the systems that use it. It must be locked up, safely, offsite; transported via a secure briefcase, handcuffed to a security officer and guarded by dire wolves. With very, very big teeth.

No, I am not exaggerating. At least not much. The master key really is that important to the security of cryptography. porticor-logo

That’s why encryption in the cloud is such a tough nut to crack. Where, exactly, do you store the keys used to encrypt those Amazon S3 objects? Where, exactly, do you store the keys used to encrypt disk volumes in any cloud storage service?

Start-up Porticor has an answer, one that breaks (literally and figuratively) traditional models of key management and offers a pathway to a more secure method of managing cryptography in the cloud.

SPLIT-KEY ENCRYPTION andyburton-quote

Porticor is a combination SaaS / IaaS solution designed to enable encryption of data at rest in IaaS environments with a focus on cloud, currently available on AWS and other clouds. It’s a combination in not just deployment model – which is rapidly becoming the norm for cloud-based services – but in architecture, as well.

To alleviate violating best practices with respect to key management, i.e. you don’t store the master key right next to the data it’s been used to encrypt – Porticor has developed a technique it calls “Split-Key Encryption.”

Data encryption comprises, you’ll recall, the execution of an encryption algorithm on the data using a secret key, the result of which is ciphertext. The secret key is the, if you’ll pardon the pun, secret to gaining access to that data once it has been encrypted. Storing it next to the data, then, is obviously a Very Bad Idea™ and as noted above the industry has already addressed the risk of doing so with a variety of solutions. Porticor takes a different approach by focusing on the security of the key not only from the perspective of its location but of its form.

The secret master key in Porticor’s system is actually a mathematical combination of the master key generated on a per project (disk volumes or S3 objects) basis and a unique key created by the Porticor Virtual Key Management™ (PVKM™)  system. The master key is half of the real key, and the PVKM generated key the other half. Only by combining the two – mathematically – can you discover the true secret key needed to work with the encrypted data.

split key encryptionThe PVKM generated key is stored in Porticor’s SaaS-based key management system, while the master keys are stored in the Porticor virtual appliance, deployed in the cloud along with the data its protecting.

The fact that the secret key can only be derived algorithmically from the two halves of the keys enhances security by making it impossible to find the actual encryption key from just one of the halves, since the math used removes all hints to the value of that key. It removes the risk of someone being able to recreate the secret key correctly unless they have both halves at the same time. The math could be a simple concatenation, but it could also be a more complicated algebraic equation. It could ostensibly be different for each set of keys, depending on the lengths to which Porticor wants to go to minimize the risk of someone being able to recreate the secret key correctly.

Still, some folks might be concerned that the master key exists in the same environment as the data it ultimately protects. Porticor intends to address that by moving to a partially homomorphic key encryption scheme.

HOMOMORPHIC KEY ENCRYPTION

If you aren’t familiar with homomorphic encryption, there are several articles I’d encourage you to read, beginning with “Homomorphic Encryption” by Technology Review followed by Craig Stuntz’s “What is Homomorphic Encryption, and Why Should I Care?”  If you can’t get enough of equations and formulas, then wander over to Wikipedia and read its entry on Homomorphic Encryption as well.

Porticor itself has a brief discussion of the technology, but it is not nearly as deep as the aforementioned articles.

In a nutshell (in case you can’t bear to leave this page) homomorphic encryption is the fascinating property of some algorithms to work both on plaintext as well as on encrypted versions of the plaintext and come up with the same result. Executing the algorithm against encrypted data and then decrypting it gives the same result as executing the algorithm against the unencrypted version of the data. 

So, what Porticor plans to do is apply homomorphic encryption to the keys, ensuring that the actual keys are no longer stored anywhere – unless you remember to tuck them away someplace safe or write it down. The algorithms for joining the two keys are performed on the encrypted versions of the keys, resulting in an encrypted symmetric key specific to one resource – a disk volume or S3 object.

The resulting system ensures that:

No keys are ever on a disk in plain form Master keys are never decrypted, and so they are never known to anyone outside the application owner themselves The “second half” of each key (PVKM stored) are also never decrypted, and are never even known to anyone (not even Porticor) Symmetric keys for a specific resource exist in memory only, and are decrypted for use only when the actual data is needed, then they are discarded

This effectively eliminates one more argument against cloud – that keys cannot adequately be secured.

In a traditional data encryption solution the only thing you need is the secret key to unlock the data. Using Porticor’s split-key technology you need the PVKM key and the master key used to recombine those keys. Layer atop that homomorphic key encryption to ensure the keys don’t actually exist anywhere, and you have a rejoined to the claim that secure data and cloud simply cannot coexist.

In addition to the relative newness of the technique (and the nature of being untried at this point) the argument against homomorphic encryption of any kind is a familiar one: performance. Cryptography in general is by no means a fast operation and there is more than a decade’s worth of technology in the form of hardware acceleration (and associated performance tests) specifically designed to remediate the slow performance of cryptographic functions. Homomorphic encryption is noted to be excruciatingly slow and the inability to leverage any kind of hardware acceleration in cloud computing environments offers no relief. Whether this performance penalty will be worth the additional level of security such a system adds is largely a matter of conjecture and highly dependent upon the balance between security and performance required by the organization.

Connect with Lori: Connect with F5: o_linkedin[1] google  o_rss[1] o_facebook[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1] google Related blogs & articles: Getting at the Heart of Security in the Cloud
Threat Assessment: Terminal Services RDP Vulnerability
The Cost of Ignoring ‘Non-Human’ Visitors
Identity Gone Wild! Cloud Edition F5 Friday: Addressing the Unintended Consequences of Cloud
Surfing the Surveys: Cloud, Security and those Pesky Breaches Dome9: Closing the (Cloud) Barn Door  Get Your Money for Nothing and Your Bots for Free  Technorati Tags: F5,MacVittie,Porticor,cryptography,cloud,homomorphic encryption,PKI,security,blog

read more