Paper
Table of Contents
Executive Summary .............. 1
The Goal: Real-Time Business
with Cloud-Based Efciency ...... 2
The Roadblocks .................. 2
Security Gaps in Public Clouds .. 2
Data Residency Requirements .. 3
Achieving Security and Compliance
for SAP HANA in the Cloud ........ 3
SAP HANA: Built-In Security for
Enterprise Environments ....... 3
Vormetric: Enhancing Security
While Keeping Customers in Full
Control of Their Data ........... 3
Virtustream: Enterprise-Class
Security and Compliance in
the Cloud ..................... 5
Intel: Providing the Foundation
for Strong, High-Performance
Encryption .................... 6
Advanced Encryption Standard
New Instructions (AES-NI) .... 6
Secure Key .................. 6
Powerful Performance with
Fully Encrypted Data ............. 7
Negligible Encryption Overhead
for OLTP ...................... 8
Faster Performance with
Encryption for SAP ERP ......... 9
Summary .......................10
About SAP* Co-Innovation Lab 12
The Goal: Real-Time Business with
Cloud-Based Efficiency
Two major trends are converging in
business computing. First, companies are
moving to in-memory analytics to drive
better business outcomes through real-
time, data-driven decision making. Second,
they are adopting cloud computing
technologies to transform the way they
deliver IT services. Many companies want
to combine these two approaches to
achieve the competitive advantages of
real-time business with the agility and cost
efciencies of cloud computing.
A third trend in business computing
can help them do exactly that. The
scalability and reliability of industry-
standard server platforms have been
advancing rapidly. The latest systems
based on the Intel Xeon processor E7
v2 family have eclipsed today’s RISC/
UNIX*-based systems by delivering better
performance at lower total cost
2
and with
comparable levels of reliability, availability
and serviceability (RAS).
3
These servers
deliver the performance and scalability
needed for in-memory computing on an
enterprise scale—and they do this on a
cost-effective, industry-standard platform
that ts seamlessly into today’s public and
private cloud computing environments.
Intel and SAP collaborated to bring these
trends together in SAP HANA. The result
is a unique, real-time business platform
based on an in-memory database that
supports both transactional and analytical
applications on the same platform. With
its data-agnostic design, SAP HANA can
ingest data in real time from all available
data sources. For example, SAP HANA
supports cost-effective, petabyte-scale
Big Data integration using the Intel®
Distribution for Apache* Hadoop software.
Companies are using SAP HANA to
perform sophisticated predictive and
prescriptive analytics on all their data—
structured, unstructured, historical, and
fresh operational. They are identifying
market trends and opportunities,
personalizing customer engagements,
streamlining operations, and closing
nancial books in seconds, all while
converging infrastructure and data onto a
single, simplied in-memory platform.
SAP HANA is available as an appliance
for onsite implementations and also as
an on-demand service from public cloud
providers. Cloud solutions can help simplify
deployment and reduce up-front costs.
They also allow companies to scale SAP
HANA up or down as needs evolve. Since
customers pay only for the resources they
use, this approach can make it easy to
align IT investments with business needs
as requirements change.
The Roadblocks
Security Gaps in Public Clouds
Achieving full value from SAP HANA
requires integrating and analyzing core
business data, which typically includes
both private customer information and
valuable intellectual property. Hosting
such sensitive data in the cloud raises
security and compliance concerns that
must be addressed.
Many cloud service providers (CSPs) focus
primarily on helping their customers
optimize infrastructure agility and IT cost
models. Businesses can use these clouds
to spin up resources quickly and affordably
for non-mission-critical functions and
non-sensitive data. However, such clouds
are typically a black box to the businesses
that use them. Customers have little or no
visibility into the data center environment,
and their workloads and data may reside
on physical infrastructure that is shared
with many other customers.
2
Security in the Cloud for SAP HANA*