Security For Object Stores
Securing Object Store Data From Ransomware, Data Breaches, And Insider Attacks
Are you worried you could be hit with a ransomware attack and lose valuable data? Are your customers worried large amounts of their data could be compromised from your cloud object stores such as AWS S3, Azure Blob, and GCS? Portal26’s Cloud Data Protection Software provides always-on encryption to keep cloud data secure from compromise and also enables HYOK (hold your own key) to give security control back to data owners.
Object stores like Amazon S3, Azure Blob, and Google Cloud Storage are among the top breached systems of all time. These systems are so powerful and versatile, with a broad range of configuration options, that more often than not customers end up misconfiguring these, and leaking valuable data. In addition, many do not offer the granularity or flexibility to manage cloud data protection at the file level. This means that admin access to these buckets yields massive amounts of data and consequently any type of admin or privileged compromise can lead to disaster.
Portal26 provides enterprises with a Cloud Data Protection Software, Proxy, that enables strong and versatile protection for object stores such as Amazon S3, Azure Blob, and GCS. The Portal26 Proxy automatically encrypts all data written into S3 or Azure Blob using NIST FIPS 140-2 validated encryption. Portal26 also automatically builds an encrypted search index with associated metadata. In addition, for structured data, Portal26 also makes encrypted data richly searchable without decryption.
Data that needs to be retrieved from object stores leaves via the Portal26 Proxy and can be released according to granular privacy policies, in a number of privacy preserving formats, and per existing RBAC.
Finally, Portal26 enables rich key control allowing external data owners to either supply encryption keys (BYOK) or hold their own keys (HYOK) for their portion of data on the shared platform. If desired, customers can turn keys off and disable the use of their data.
“With the growing importance of data privacy, the fact that vast majority of data breaches taking place with valid credentials, and the need for companies to do a better job, Portal26 fills an important need to protect data while it is being used”
– Amit Jasuja
Venture Capitalist, Cybersecurity Thought Leader
Portal26 Object Store Proxy Key Capabilities
Portal26’s cloud data protection platform enables both enterprises that use object stores directly, as well as those that have built products on top of object stores, to keep very large volumes of data secure from insider threats, malicious attacks, and data privacy violations.
Portal26’s cloud data protection solution offers security that goes beyond native cloud platform options as it secures against not just cloud platform admins, but also any privileged users or compromise that takes place within the enterprise themselves.
The following are Key Capabilities for this Portal26 Cloud Data Protection software module:
Eliminate Attacker Leverage
No Unauthorized Browsing
Granular Keys, BYOK/HYOK
Enhanced security beyond native platform encryption
Portal26 Object Store Proxy Architecture
Portal26 Offers More Than Just Cloud Data Protection Solutions
Secure your data against cyber attacks with the full Portal26 Suite. Compliant with major regulations, and immune to ransomware, extortion and misconfigurations, our interoperable modules can give you peace of mind that your data is safe.
Select the modules you need to suit your architecture, and let us take care of the rest.
Configure and manage Portal26 modules and services. View logs, dashboards, and reports.
Why Should I Add Portal26 To My Data Security Toolbox?
Compliance Is Easier Than Ever
Portal26 encryption meets with the most stringent data protection standards in all major regulations and frameworks.
Privacy Enforcement Is A Breeze
Portal26 releases data in all nine privacy preserving formats so it can be individually configured for downstream systems and users.
Cost Goes Down While Coverage Goes Up
Compared to traditional, extortionate tokenization solutions, Portal26 secures as much data as needed while retaining usability.
Time To Value Is Unbelievably Fast
The Portal26 plugin can be fully operationalized within a half a day, whilst the Proxy takes a few days.
If Attacked, Portal26 Makes Life Easier
In any attack scenario, Portal26 provides visibility into any data that was observed, accessed, or exfiltrated.