Skip to main content

Cloud-Anbindung heißt nicht automatisch fehlender Schutz

man sitting typing on laptop in server room behind forrester logo

Es gibt viele gute Gründe, Ihre Daten und Workloads in die Cloud zu migrieren. Aber wie steht es dabei um die Sicherheit? Sind Cloud-Plattformen mit neuen Risiken verbunden?

Lesen Sie den aktuellen Forschungsbericht von Forrester, Best Practices: Cloud Data Encryption, um zu erfahren, warum der Umstieg auf Multi-Cloud-Plattformen die Anforderungen an Datenverschlüsselung, die Verwaltung kryptographischer Schlüssel und Konformitätskontrollen verschärft.

Erfahren Sie mehr über unsere Sicherheitslösungen für die Cloud

Cloud-Sicherheitslösungen auf einen Blick

Welche Produkte benötige ich?

Universelle nShield HSM

Erfahren Sie mehr über die nShield HSM aus der nCipher-Familie und wie Sie diese als Sicherheits-Backbone und Vertrauensanker für Cloud-Bereitstellungen nutzen können.

nShield as a Service

Einfacher und effizienter Zugriff auf Cryptography as a Service

nShield Connect

Nach FIPS 140-2 und Common Criteria zertifizierte Anwendungen, die skalierbare kryptographische Schlüsseldienste für mehrere Netzwerke bereitstellen

nShield Container Option Pack

Bereitstellung containerisierter Anwendungen, die mit hochsicheren nShield HSM integriert sind

nShield Web Services Option Pack

Cloud-kompatible Schnittstelle zu hochsicheren HSM

woman walking down city block looking at cell phone

Nutzen Sie Cloud-Plattformen, ohne die Kontrolle über Ihre Schlüssel und Daten zu verlieren.

In diesem Webinar:

  • lernen Sie die wichtigsten Aspekte der Verwaltung von IoT-Sicherheit kennen
  • erfahren Sie mehr über bewährte Verfahren für den Aufbau eines IoT-Vertrauensankers
  • finden Sie Informationen zu HSM-as-a-Service und seinen wichtigsten Vorteilen
  • lernen Sie, Sicherheitsrisiken in der Cloud zu mindern


The Launch of nShield as a Service from Entrust helps Bloombase customers accelerate migration of their data off-premises to the cloud without the expense of running their own computing infrastructure and security hardware, and raises the bar for security assurance with data governance in the cloud."

Sean Xiang, CEO at Bloombase


At Citrix, we are committed to providing companies with simple and efficient tools that enable them to deploy and manage all of their applications in a unified, secure and reliable manner," said Marissa Schmidt, Senior Director, Product Management, Citrix. "nShield HSMs allow our customers to establish a root of trust and facilitate FIPS compliance. And with the addition of nShield as a Service to the Entrust HSM portfolio, they can do it in a more simple and flexible way."


We are excited about the possibilities that the nShield HSM's new cloud-friendly features, including nShield as a Service, offer our customers" said Ed Wood, Director of Product Management at Cryptomathic. "These new features recognize that the market is changing; that organizations need the capabilities of full-service HSMs in the cloud to unleash the innovation and commercial benefits available."

Device Authority

Entrust nShield HSMs' new cloud-friendly capabilities, including nShield as a Service, offer customers the ability to choose how they want to protect underlining cryptographic keys with a subscription-based model that enables them to switch security from a capital to an operational expenditure for greater flexibility and cost effectiveness."

James Penney, Chief Technology Officer at Device Authority


The launch of nShield as a Service gives F5 customers enhanced security choices with the ability to achieve data sovereignty on a subscription-based model. Shifting security from a capital to an operational expenditure enables greater flexibility and cost effectiveness for organizations."

John Morgan, VP & GM of Security at F5 Networks


For organizations adopting a cloud native/cloud first strategy, our combined solution allows for leveraging a consistent root of trust for cryptographic services within multiple cloud services simultaneously. This allows a customer to pick the best options from Google, Amazon, and Azure while at the same time having a cross-cloud solution for orchestration, which in turn has a cloud vendor agnostic root of trust."

Chuck White, Chief Technology Officer at Fornetix


As enterprises increasingly migrate business processes to the cloud, security continues to be a major concern. Ensuring that critical applications and their underpinning cryptographic keys can be protected and managed throughout their lifecycle is vital. The launch of nShield as a Service gives our joint customers greater choice and the ability to have subscription-based data sovereignty."

Rick Robinson, WW Offering Manager, Encryption and Key Management, IBM Security


Data is one of the most abundant and valuable assets for an organization today," said Reiner Kappenberger, Director Product Managment, Voltage Data Security at Micro Focus. “nShield as a Service, through its support of Voltage SecureData's Innovative Stateless Key Management, enables Micro Focus to offer it’s customers continuing relief from the burden of traditional key management in both hybrid and zero data center cloud deployments."

Red Hat

nShield as a Service will offer expanded choice to our customers in how they pursue IT security to better protect the underlying cryptographic keys that help to secure Red Hat Certificate System and Red Hat OpenStack Platform deployments across the hybrid cloud."

Keith Basil, Senior Principal Product Manager at Red Hat


As the leader in machine identity protection, Venafi welcomes the launch of the new nShield as a Service capability," said Kevin Bocek, VP Security Strategy and Threat Intelligence at Venafi. "This is an exciting development that will help fast DevOps and security teams move at cloud speed to secure TLS and code signing keys and certificates."

Laden Sie den Berichet herunter

Join us for the webinar, "Own your keys, not your HSM"