How nCipher HSMs enhance security for Red Hat OpenShift Platform www.ncipher.com
Red Hat and nCipher partnership history Long standing 10+ years technology partnership Supported integrations − Red Hat Enterprise Linux − Certificate System PKI − OpenStack − OpenShift 2
OpenShift + nShield Modern application development and deployment has evolve to meet the demand for flexibility and scalability Development teams use containers and Kubernetes to ensure applications run reliably no matter environment To protect applications, containers and Kubernetes need robust platform to host critical cryptographic operations Red Hat OpenShift is an enterprise-ready Kubernetes container platform that helps developers manage hybrid cloud and multi-cloud deployments Integration with nCipher nShield hardware security modules (HSMs) facilitate use of cryptography and enhance security of containerized applications 3
Red Hat OpenShift and nCipher nShield value proposition nCipher Shield hardware security modules Red Hat OpenShift includes everything needed protect and manage critical keys used by for hybrid/multi-cloud container and Kubernetes cryptographic applications development and deployment o Leverage hardware security using nShield o Provide foundation to deliver applications anywhere Container Option Pack o Allow dynamic containerized application deployment o Provide scalable, dynamic cryptographic services o Enable transparent security and key management o Generate and deliver signing and encryption keys o Lower IT operations costs and application portability o Comply with FIPS 140-2 and Common Criteria 4
Red Hat and nCipher enable secure use of containers and Kubernetes HARDWARE BASED SECURITY Global customers in government and Cryptographic processes and keys are protected enterprise, particularly those doing and managed within the secure confines of a FIPS software development, and existing Red 140-2 Level 3 and Common Criteria EAL4+ certified Hat users. Industry verticals include HSM, where they are isolated from physical and banking, financial, insurance, healthcare, software attacks telecommunications, and utilities. 5
nShield HSMs: A foundation of trust “Harden” Highest level of Implement and Source of high protection for enforce customer- applications that quality random encryption or defined policy use cryptography numbers for keys signing keys HSMs are certified, trusted platforms for performing cryptographic operations and protecting keys 6
nShield HSM family of products Remote Cloud integration monitoring nShield Solo nShield Connect nShield Edge Server-embedded PCIe card Network attached, shared Low cost, portable Developer Time stamping packages package 7
nCipher Security Cloud Solutions delivering trust for business Years of delivering IoT 20 + critical applications trusted threat Blockchain and information protection and enabling compliance Payments Deep expertise Trust and track record in applied 1000+ Integrity cryptography Control Organizations rely on nCipher to secure and support their applications HSM market leader and information with a long history of • 57 of the top Global Fortune 100 industry certifications • 10 of the top 20 FTSE 100 and validation 8
Entrust Datacard: A global security & identity leader > 80% 25 $800M+ countries use our of payment cards PKI, as well as the worldwide REVENUE UN, Interpol personalized 2,500+ with our solutions & NATO EMPLOYEES 690K 57 35 websites of Global secured Fortune 100 LOCATIONS globally companies use W ORLDW IDE our HSM 45K+ 24M+ 10M+ 150+ instant issuance SWIFT messages secure identity & Sales & deployments encrypted & payment service in COUNTRIES worldwide secured daily credentials issued daily 9
10
Recommend
More recommend