Runtime Encryption®
Overview
Encryption is an effective data protection control, however it’s use is currently limited to data at rest and data in motion. When, an application starts to run, it’s data in use is vulnerable to a variety of attacks including malicious insiders, root users, credential compromise, OS zero-day, and network intruders.
The holy grail of security has been to offer deterministic security to applications regardless of how the attacks originate. Runtime Encryption® provides deterministic security with runtime memory encryption for applications to protect data in use.
Use Cases
Containerized Apps
Containers make applications portable, increase resource efficiency, and improve developer productivity. However, effective isolation is critical to mitigate security risks in a product environment. Fortanix Runtime Encryption® protects containerized applications during runtime from host-level attacks.
Secure data processing (AI, ML, Analytics)
Data scientists performing analysis or training machine learning models often require sensitive data as inputs. However, lack of strong security controls limits the sharing of this type of data. Fortanix Runtime Encryption® provides a security framework to ensure that the sensitive data remains protected even when in use.
Protected Microservices
Building blocks that are commonly used to create multi-tier distributed applications are available protected with Fortanix Runtime Encryption® . These include MySQL Database, NGINX Web Server, Directory Server, and Secrets Management.
Key Management
Encryption is an effective control to protect the data, however with encryption the risk transfers to the encryption keys. Fortanix Data Security Manager , leveraging Runtime Encryption® , delivers unmatched security ensuring only authorized users have access to the keys.