www.ncipher.com
How nCipher HSMs enhance security for Red Hat OpenShift Platform - - PowerPoint PPT Presentation
How nCipher HSMs enhance security for Red Hat OpenShift Platform - - PowerPoint PPT Presentation
How nCipher HSMs enhance security for Red Hat OpenShift Platform www.ncipher.com Red Hat and nCipher partnership history Long standing 10+ years technology partnership Supported integrations Red Hat Enterprise Linux Certificate System
Red Hat and nCipher partnership history Long standing 10+ years technology partnership Supported integrations
− Red Hat Enterprise Linux − Certificate System PKI − OpenStack − OpenShift
2
OpenShift + nShield
Modern application development and deployment has evolve to meet the demand for flexibility and scalability Development teams use containers and Kubernetes to ensure applications run reliably no matter environment To protect applications, containers and Kubernetes need robust platform to host critical cryptographic operations Red Hat OpenShift is an enterprise-ready Kubernetes container platform that helps developers manage hybrid cloud and multi-cloud deployments Integration with nCipher nShield hardware security modules (HSMs) facilitate use of cryptography and enhance security of containerized applications
3
Red Hat OpenShift and nCipher nShield value proposition
Red Hat OpenShift includes everything needed for hybrid/multi-cloud container and Kubernetes development and deployment
- Provide foundation to deliver applications anywhere
- Allow dynamic containerized application deployment
- Enable transparent security and key management
- Lower IT operations costs and application portability
nCipher Shield hardware security modules protect and manage critical keys used by cryptographic applications
- Leverage hardware security using nShield
Container Option Pack
- Provide scalable, dynamic cryptographic services
- Generate and deliver signing and encryption keys
- Comply with FIPS 140-2 and Common Criteria
4
Red Hat and nCipher enable secure use of containers and Kubernetes
5
HARDWARE BASED SECURITY Cryptographic processes and keys are protected and managed within the secure confines of a FIPS 140-2 Level 3 and Common Criteria EAL4+ certified HSM, where they are isolated from physical and software attacks Global customers in government and enterprise, particularly those doing software development, and existing Red Hat users. Industry verticals include banking, financial, insurance, healthcare, telecommunications, and utilities.
nShield HSMs: A foundation of trust
Highest level of protection for encryption or signing keys “Harden” applications that use cryptography Implement and enforce customer- defined policy Source of high quality random numbers for keys
HSMs are certified, trusted platforms for performing cryptographic
- perations and protecting keys
6
nShield HSM family of products
Cloud integration Remote monitoring Developer packages Time stamping package
nShield Edge
Low cost, portable
nShield Solo
Server-embedded PCIe card
nShield Connect
Network attached, shared
7
nCipher Security
20+
Deep expertise and track record in applied cryptography HSM market leader with a long history of industry certifications and validation
1000+
Organizations rely on nCipher to secure and support their applications and information
- 57 of the top Global Fortune 100
- 10 of the top 20 FTSE 100
Cloud IoT Blockchain Payments Trust Integrity Control
Years of delivering trusted threat protection and enabling compliance Solutions delivering trust for business critical applications and information
8
Entrust Datacard: A global security & identity leader
$800M+
REVENUE
35
LOCATIONS W ORLDW IDE
2,500+
EMPLOYEES
150+
COUNTRIES Sales & service in
10M+
secure identity & payment credentials issued daily
> 80%
- f payment cards
worldwide personalized with our solutions
25
countries use our PKI, as well as the UN, Interpol & NATO
45K+
instant issuance deployments worldwide
24M+
SWIFT messages encrypted & secured daily
690K
websites secured globally
57
- f Global
Fortune 100 companies use
- ur HSM
9
10