Cloud HSM and Customer Managed Encryption Keys: Securing Your Data in the Cloud (Cloud Next '19)
Two of the most significant data protection products to have GA'ed over the last year are Cloud HSM and Customer Managed Encryption Keys. One provides compliant, hardware protection for your keys while the other allows you to control the keys that are used to encrypt and decrypt your data in multiple cloud services. In this session, we will explain how each works, and more importantly, demonstrate how easy it is to use them together and help satisfy your security and compliance needs.
Securing Data in Cloud → http://bit.ly/2TYeJeK
Watch more:
Next '19 Security Sessions here → https://bit.ly/Next19Security
Next ‘19 All Sessions playlist → https://bit.ly/Next19AllSessions
Subscribe to the GCP Channel → https://bit.ly/GCloudPlatform
Speaker(s): Matthew Driscoll, Il-Sung Lee
Session ID: SEC207
event: Google Cloud Next 2019; re_ty: Publish; product: Cloud - Security and Identity - Security Command Center, Cloud - Security and Identity - Cloud Data Loss Prevention; fullname: Matthew Driscoll, Il-Sung Lee;
Видео Cloud HSM and Customer Managed Encryption Keys: Securing Your Data in the Cloud (Cloud Next '19) канала Google Cloud Tech
Securing Data in Cloud → http://bit.ly/2TYeJeK
Watch more:
Next '19 Security Sessions here → https://bit.ly/Next19Security
Next ‘19 All Sessions playlist → https://bit.ly/Next19AllSessions
Subscribe to the GCP Channel → https://bit.ly/GCloudPlatform
Speaker(s): Matthew Driscoll, Il-Sung Lee
Session ID: SEC207
event: Google Cloud Next 2019; re_ty: Publish; product: Cloud - Security and Identity - Security Command Center, Cloud - Security and Identity - Cloud Data Loss Prevention; fullname: Matthew Driscoll, Il-Sung Lee;
Видео Cloud HSM and Customer Managed Encryption Keys: Securing Your Data in the Cloud (Cloud Next '19) канала Google Cloud Tech
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Data Encryption and Managed Encryption KeysManaging encryption of data in the cloud (Google Cloud Next '17)Secure your cloud by securing your keys - Bring your own key (BYOK) for Microsoft AzureAccellion Webinar: Armor your Encryption Keys in SafeNet Luna Network HSMEncryption and Key Management in AWSThe encryption dilemma - Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK)?Securing Kubernetes Secrets (Cloud Next '19)Azure Storage and Disk Encryption Deep DiveA Security Practitioners Guide to Best Practice GCP Security (Cloud Next '18)Google Cloud Key Management Service (KMS) How to encrypt / decrypt dataData Warehousing With BigQuery: Best Practices (Cloud Next '19)Introducing Asymmetric Key Support in AWS KMS - AWS Online Tech TalksHow Quantum Computers Break Encryption | Shor's Algorithm ExplainedGoogle Photos vs Amazon Photos - Which free photo app is the best?Large-Scale Continuous Delivery at Netflix and Waze Using Spinnaker (Cloud Next '18)Service Account Impersonation in Google Cloud - IAM in GCPAdvanced Data Cleanup Techniques using Cloud Dataprep (Cloud Next '19)Cloud OnAir: Google Cloud Networking 101Cloud OnAir: CE Chat: Google Cloud Networking 102 - Cloud Routing and VPC Peering