A new cloud partnership between CloudLink Technologies and EMC focuses on data encryption management and security for virtual machines. The companies are integrating CloudLink SecureVSA data security technology with EMC’s RecoverPoint for Virtual Machines to give customers like MSPs access to a secure Disaster Recovery-as-a-Service (DRaaS) offering.
The combined solution offers a number of advantages, like reduced cost and simple deployment when compared to legacy and on-premises solutions. RecoverPoint for VMs uses local and remote replication to protect them and also enables recovery at any point in time. The integration with CloudLink ensures both Data at Rest and Data in Motion to remote locations are encrypted and not accessible to malicious users.
Private and hybrid cloud providers as well as MSPs can benefit from the combined solutions, offering a secure hosted cloud environment to their customers in which mission critical workloads are secure. Data owners hold the encryption key to their workloads, ensuring data is secure whether it’s at rest or being copied or backed up for disaster recovery purposes. And the keys may be stored on the tenant’s premises instead of in the cloud, ensuring data is not accessible to other tenants or the service provider.
"By offering a DR solution with integrated data security controls, enterprises can deliver IT as-a-service for DR and protect their data at their remote offices, while mitigating their security concerns,” said Alex Berlin, CEO of CloudLink. “CSPs have the opportunity to offer a premium service that will drive revenue growth and differentiation in a highly competitive cloud market."
The integrated offering provides a number of benefits to MSPs and CSPs alike, including revenue opportunities for providing DRaaS as a value-added offering. DRaaS may also be deployed in a multi-tenant or multi-branch cloud environment so that each tenant has control of the security of their own replicated data.
The solution is also agentless and transparent to application workloads and underlying storage infrastructure and enables flexible key management options through which customers control their keys. Encryption may be deployed on a per-VM or per-customer basis instead of for an entire storage array, enabling competitive pricing and flexibility for service providers and their customers alike.
Edited by
Alisen Downey