SEAcurIT-e Ltd

Cloud Security

SEAcurIT-e® is ideally suited to securing cloud applications and infrastructure, including the creation of private and hybrid clouds. It is an adaptable and scalable security solution that can be embedded in any cloud offering to significantly enhance and enrich security, management and control.

The unique features of SEAcurIT-e® allow the secure, controllable and effective application of security functions at a Cloud provider, locally at an end user device, or at a gateway service. For end user device or gateway deployments (which can work together in combination), security functions such as encryption are applied prior to information being passed to a cloud provider. Separating out security functions in this way so that they are independent of the Cloud provider allows organisations to take full and complete control of their security, irrespective of the Cloud provider. This promotes flexibility in using multiple Cloud providers, such as for data backup purposes, and agility in moving between providers.

The system associates data with keys, so that managing keys controls access to data. When storing information securely in the cloud, the system ensures that the keys necessary to access the information are readily available to all those that need them (and no-one else). Access control is managed by the SEAcurIT-e® management component, with the easy and straightforward specification of recipients and intended devices selected either by name or by access list, or identified using search items. The cryptographic parameters necessary for access are distributed securely without the overhead of PKI and certificates. Files may be assigned to secure folders or secured using individual keys, with the management features providing the ongoing monitoring and control of who is able to access which files and when. The system components lend themselves naturally to logging access to secure data, and support distinct domains of control.

SEAcurIT-e® is supremely suited to software environments where the use of dedicated security hardware is not appropriate, such as at gateways or end user devices.