Zettaset XCrypt Data Encryption Platform – Automated Key Management

V-EKM Virtual Encryption Key ManagementV-EKM Virtual Enterprise Key Manager
V-HSM Virtual Hardware Security ModuleV-HSM Virtual Hardware Security Module
Integrated Encryption Key Management for Fast, Easy Deployment and Low TCO

Enterprises that are serious about protecting the integrity of their data, their customers’ data and complying with government regulations no longer seriously dispute the value of encryption. The challenge for many is how to control costs and easily manage this critical asset in today’s scale-out data environments. The answer, encryption key management.

Zettaset delivers a software-based encryption key management solution built around OASIS industry standards that can readily match the elasticity of virtual machines and cloud computing. As virtual machines running the database are provisioned (and de-provisioned) to balance capacity needs, no manual intervention is required at the management console. Deploying software-based key managers and HSMs (hardware security modules) is more cost-effective and less disruptive than traditional hardware approaches in highly elastic cloud environments, offering power users greater operational efficiencies.

The Zettaset XCrypt™ Data Encryption Platform provides a complete encryption solution for the enterprise that includes encryption software plus and integrated virtual key manager and HSM that can be easily added to a virtual machine or cloud when and where needed. For enterprises that do not have existing key management and HSM infrastructure, Zettaset XCrypt’s integrated, software-based key manager and HSM can ease deployment by greatly simplifying encryption installation and management.

  • Zettaset V-EKM™ (Virtual Enterprise Key Manager) is a software-based key manager that automates the management of policies that protect and control access to business-critical encryption keys.
  • Zettaset V-HSM™ (Virtual Hardware Security Module) is a software-based HSM that securely stores the master key and master hash key used to encrypt and hash the contents of the key manager database.

The XCrypt Data Encryption Platform offers you a choice of different encryption solutions, depending on the needs of your data environment. Each one includes the integrated V-EKM and V-HSM.

  • XCrypt Full Disk – High-performance full disk encryption for any structured or unstructured data
  • XCrypt Object – Granular, next-generation encryption and data integrity protection for object data stores
  • XCrypt Hadoop – Granular, next-generation encryption and data integrity protection for HDFS data stores
Efficiently and Securely Manage and Store Cryptographic Keys

Zettaset enables organizations to efficiently and securely manage and store cryptographic keys and policies throughout the key management lifecycle in the enterprise. Zettaset can deliver layered encryption for file, zone, directory and partition levels, depending on the granularity requirements of the data environment. Key management and encryption can be applied to NoSQL, Object and Hadoop, databases, as well as multiple file and object storage systems.

Full Compatibility with Enterprise Encryption Standards for Investment Protection

Every component of the Zettaset XCrypt Data Encryption Platform is fully-compatible with OASIS-standard Key Management Interoperability Protocol (KMIP) key managers and Public Key Cryptography Standard (PKCS) #11 hardware security module (HSMs), and therefore can fit into any customer environment where these products already exist. The Zettaset V-EKM key manager keeps a database of encryption keys which are encrypted and protected using master keys in HSMs. The master keys are accessed through a PKCS#11-standard interface.

Zettaset V-EKM Key Manager Features and Benefits
  • Highly-automated, software-based encryption key management reduces hardware requirements, simplifies encryption deployment and on-going administration
  • Optimized for scale-out performance in large-scale distributed computing systems in the cloud, or on-premises
  • Full key life-cycle support including key erasure, backup and restore
  • KMIP and PKCS#11 compliant – Can be used as part of any KMIP and PKCS#11-compliant solution
  • File metadata cryptographically protected and tied to data for complete file protection
Zettaset V-HSM Hardware Security Module Features and Benefits
  • Highly-automated, software-based hardware security module (HSM) reduces hardware requirements, simplifies encryption deployment and on-going administration
  • Securely stores keys and hash keys used to encrypt and hash contents of key manager database, enabling a caller to do crypto operations with keys while securely retaining them within the HSM process
  • Supports secure key exchange between HSMs to create backup HSMs for redundancy
  • Optimized for scalability and performance in dynamic Big Data distributed computing distributed systems in the cloud, or on-premises
  • Light weight, self-contained solution runs on UNIX OS
  • PKCS#11 compliant – Can be used as part of any PKCS#11 compliant solution

Free Trial, Customized Demo, or Both!

Your choice.


Our
Resources
Our Resources
Solution Briefs
White Papers
Application Briefs