Orchesto Cloud Encrypt
The Zebware Orchesto Cloud Encrypt is built to protect data stored in the cloud no matter if a private, public or hybrid cloud is used. The cloud encrypt functionality is an essential component in order to succeed with the protection of data.
By using cloud encrypt, all object content can be encrypted before it leaves the network of a data owner. For a multi-cloud setup it thereby enables a centralized encryption configuration to be applied across all storage providers. Encryption of data can be performed in a number of different instances and layers. When using Orchesto, data is encrypted immediately at the customer source, thus ensuring that data is encrypted when in use as well as in transport and at rest in a cloud.
The Orchesto Cloud Encrypt is using a Key Management System (KMS) where customers own and manage their own sets of encryption keys. Orchesto ships pre-integrated with Hashicorp’s Vault server. Alternative KMS solutions are in plan for integration. The use of own keys is further increasing independence from cloud service providers as the encryption and key management is then completely separated from cloud providers’ solution. Orchesto is hence empowering our customers to take full control over how their data is secured.
The 256-bit AES (Advanced Encryption Standard) was developed by the US National Institute of Standards and Technology, NIST, together with industry and the cryptographic community. The U.S. Government approves the AES as a Federal Information Processing Standard, FIPS, for use up to Top Secret. Internationally it is a verified encryption standard used all over the world.
- Cloud Encrypt provides a tool to encrypt all object data before it leaves customer’s network
- The service uses customer owned encryption keys to ensure independence from cloud providers and to secure data all the way through transport, and storage
- The encryption used is the high-level security 256-bit key length AES algorithm
Orchesto Identity and Access Management
Manage access to your resources securely with IAM.Read more
Add an additional layer of protection to your data and recover from unintended user actions and application failures.Read more
Disperse your data for maximum security with the zIDA patented algorithm.Read more