Fortanix Data Security Manager for VMware Sovereign Cloud

Fortanix Data Security Manager delivers data protection and compliance to VMware Sovereign Cloud environments with industry-leading key management capabilities, FIPS 140-2 Level 3 HSM protection, tokenization, and secrets management via a single unified platform.

thumbnail

Overview

VMWare Sovereign clouds are the unanimous choice amongst businesses looking to run their sensitive and regulated workloads on a secure, compliant national cloud that meets national data residency and data sovereignty requirements. While virtual environments running VMware can readily leverage vSphere VM Encryption or vSAN encryption to protect VMs and data-at-rest—enterprise key management that's both secure and adaptable to a dynamic software-defined infrastructure remains a challenge. Traditional hardware bound HSMs are not flexible enough for software-defined data centres, and software-only key managers fail to match the security level of HSMs.
overview image

What we do

Bring your own key for VM and vSAN encryption
Bring your own key for VM and vSAN encryption
VMware users an option to bring their own keys to encrypt VMs/vSAN and other encryption use cases
Complete Key lifecycle Management
Complete Key lifecycle Management
Full key lifecycle management as a service to ensure secure and consistent key management across on-premises and multicloud environments, including BYOK and BYOKMS.
FIPS 140-2 Level 3 HSM backed platform
FIPS 140-2 Level 3 HSM backed platform
Customers store the keys in the Fortanix FIPS 140-2 Level 3 certified HSM and cryptographic operations are executed securely within the hardware.

Benefits

Quick Time to Value

5 minutes for implementation versus 2-3 weeks with other HSM services

Quick Time to Value

Greater control over the Keys

Control the keys externally, turn the keys off, turn them on when required and get contorl over data

Greater control over the Keys

Qwn your Data and Keys

Using Fortanix DSM, VM encryption keys for are managed and owned by the customers

Qwn your Data and Keys

Strict access control and quorom approvals safeguard data

Segregation of the key management operations based on roles and permissions ensures control over data

Strict access control and quorom approvals safeguard data

Meet GDPR and SCHREMS II Regulations

FIPS certified HSM and key management with regional level isolation helps meet specific data privacy regulations.

Meet GDPR and SCHREMS II Regulations