Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution"

Transcription

1 1 Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution Table of Contents What s New? Target Customers Customer Benefits Competitive Positioning Technical Sales Questions General Sales Questions What s New? What is being announced? The EMC Isilon Data at Rest Encryption (DARE) solution now includes support for all currently shipping Isilon platforms and provides encryption across today s Isilon portfolio. The Isilon DARE solution utilizes Self-Encrypting Drives (SEDs) to provide secure data protection for sensitive file-based, unstructured data. Isilon's DARE solution offers enterprise customers enhanced data security that allows them to meet rigorous compliance and governance requirements without sacrificing application or workload performance. The Isilon DARE solution combines advanced data security with the many other benefits of Isilon scale-out storage including simplicity, massive scalability and unmatched efficiency. What are the key components of the Isilon DARE solution? The Isilon DARE solution consists of a cluster comprised of Isilon nodes that are fully populated with Self Encrypting Drives (SEDs) and perform encryption and decryption of data within each drive. This solution is available for Isilon X200, X400, and NL400 nodes running the Isilon OneFS 7.1 (or later) operating system and for Isilon S210 and X410 nodes running the Isilon OneFS (or later) operating system. The solution requires the cluster to consist entirely of encrypted Isilon nodes fully populated with SEDs. The Isilon DARE solution utilizes AES-256 bit encryption keys using the algorithm and key strength recommended by the National Institution of Standards and Technology and that has been adopted worldwide as the de-facto encryption standard. SEDs used in the Data at Rest Encryption (DARE) solution also provide protection against physical attacks to sensitive data.

2 [Type here] Target Customers What type of customers are good candidates for the Isilon DARE solution? The Isilon Data at Rest Encryption solution is ideal for enterprises managing largescale, file-based, unstructured data that requires rigorous data security to protect sensitive information and meet stringent compliance and governance requirements including: Large-scale NAS file environments with robust data security requirements: Windows, Linux, and UNIX environments with more than 50 TB of file data storage that requires data encryption security Financial Services: Companies facing Sarbanes-Oxley & PCI compliance requirements Healthcare Providers: Healthcare providers that need to meet HIPAA compliance regulations for such data as PACS images and other sensitive information Federal and State Government Agencies: Governmental agencies needing secure, encrypted data storage solutions that protect sensitive data and that are certified to meet a wide range of regulatory requirements including the Federal Information Security Management Act (FISMA) Customer Benefits What is the value proposition for the Isilon DARE solution? The Isilon Data Encryption at Rest (DARE) solution allows organizations to meet stringent regulatory and compliance requirements and protect sensitive information without sacrificing application or workload performance. The Isilon DARE solution combines advanced data security with the many other benefits of Isilon scale-out storage including simplicity, massive scalability and unmatched efficiency. What are the key benefits that the Isilon DARE solution will deliver? The Isilon Data Encryption at Rest solution provides the following benefits: Protects against accidental or malicious loss including drive theft by keeping data encrypted on drives Enables data to be securely erased before drives are repurposed or retired by shredding encryption keys. Cryptographic erasure (e.g. shred keys) to wipe data can be done in a matter of seconds Allows customers to return failed drives to vendor, even if drives contain sensitive data (vendors have no access to authentication keys and cannot access user data) The self-encrypting drives (SEDs) used with the Isilon DARE solution are FIPS Level 2 validated and are certified for U.S. government use. They also utilize AES-256 encryption with negligible performance degradation (1%). Data encryption keys used by the SEDs never leave the drives and are automatically managed within the Isilon cluster with OneFS 7.1 and The Isilon DARE solution allows organizations to address important data security, regulatory, compliance and governance requirements including:

3 3 Federal Information Security Management Act (FISMA) Financial Services Payment Card Industry standards (PCI DSS) Health Insurance Portability and Accountability Act (HIPAA) Sarbanes-Oxley Competitive Positioning How will Isilon s DARE solution further differentiate Isilon Scale-Out NAS solutions from the competition? EMC Isilon is the only scale-out NAS platform that offers a Data at Rest Encryption solution option for enterprise customers. Along with its DARE solution, Isilon also offers File System Audit compliance and SEC 17a-4 compliant WORM data protection. With these capabilities, Isilon offers the most robust security and compliance options available on a scale-out NAS platform. Isilon Security Capabilities Compared to the Competition Capabilities : Data Encryption at Rest EMC Isilon DARE Solution NetApp C-Mode 8.2 IBM SONAS HP StoreAll IBRIX Yes No No No No HDS HNAS : Support for Audit Applications Yes Yes No Yes No : WORM / SEC 17a-4 Yes No No Yes- WORM No- Yes- WORM No- Technical Sales Questions How is encryption being offered for the existing EMC Isilon product line? The Isilon platform supports encrypted clusters by utilizing self-encrypting drives (SEDs) to bring data at rest encryption (DARE) to the product line. What platforms support encrypted clusters? Today, encryption solutions with SEDs are generally available for Isilon S210, X200, X400, X410 and NL400 nodes.

4 [Type here] What SEDs drive capacities are now available? Drive capacities and supported platforms are shown in the table below: 3 TB HDD 4 TB HDD 900 GB HDD 800 GB SSD Isilon S210 No No Yes Yes Isilon X200 Yes No No Yes Isilon X400 Yes Yes No Yes Isilon X410 Yes Yes No Yes Isilon NL400 Yes Yes No Yes Is there a minimum Isilon OneFS version required to support encrypted clusters? Yes. Encrypted clusters with Isilon X200, X400 and NL400 nodes must be running OneFS 7.1 or later for the system to recognize the SEDs. The newer Isilon X410 and S210 nodes require OneFS or later. Can you mix encrypted and non-encrypted nodes within the same Isilon node? No. Encrypting and non-encrypting drives cannot be mixed within a node. The entire node must be all encrypting or non-encrypting drives. Can you mix encrypted and non-encrypted nodes within the same Isilon cluster? No. The entire cluster must consist of encrypted or unencrypted nodes. The only exception is during migration of a non-encrypted cluster to an encrypted cluster. Can SSDs be included in encrypted nodes for metadata caching or other SSD functions? Yes, by using the 800GB SED SSD. How does the encryption work in the Isilon DARE solution? Each Self-Encrypting Drive (SED) in the Isilon DARE solution has a unique data encryption key (DEK) used to encrypt and decrypt data as it is written to and read from the disk. Isilon OneFS automatically generates an authentication key (AK) that is used to wrap the DEK, preventing unauthorized access to the data. Drives removed out of the source node will be unable to decrypt the data on the drive because the AK is needed to unlock the drive. What key strengths and encryption algorithms are supported? The drives support AES-256 bit strength keys for data encryption. How do I migrate my customer to an encrypted cluster solution? Migration is offered as an EMC Professional Services engagement. Generally, you can migrate an existing cluster in-place by adding encrypted nodes, using Isilon SmartPools to move data to the new encrypted node and then use SmartFail to take out the unencrypted nodes. Repeat this process until all unencrypted nodes have been replaced.

5 5 How is key management accomplished with the Isilon DARE solution? Isilon OneFS uses an internal key manager that stores authentication keys (AKs) securely on an encrypted database replicated across both compact flash drives on each node. The data encryption keys on each drive do not leave the FIPS boundary on the drive itself. Each drive is given a unique AK that is automatically deleted as drives are removed. Newly inserted drives will be assigned automatically a new AK without requiring administrator intervention. Does this solution support Key Management Interoperability Protocol (KMIP)? Not currently, however this capability is on the roadmap for a future release of OneFS. Which use cases do these encrypting drives? Isilon encrypted clusters protect sensitive information against single or multiple drive theft. Our solution also protects sensitive information when SED drives fail and need to be returned for service purposes. What validations does this solution have? The SEDs used in our solution are FIPS level 2 validated. This level of validation satisfies the majority of Federal requirements for cryptographic validation. How can we prove that our SED implementation is FIPS validated? You can point customers to the following FIPS certificates for each SED drive we support: 800GB SSD SED: 900GB SAS SED: 3TB SATA (NL-SAS) SED: 4TB SATA (NL-SAS) SED: This list will grow as we add new SED drive capacities. Which regulatory and compliance requirements are met with this solution? Isilon encrypted clusters can satisfy PCI-DSS v2.0 section 3.4, HIPAA PHI Privacy Rule and Security Rules, California Senate Bill 1386 and California Assembly Bill 1950, and other State equivalent bills. General Sales Questions

6 [Type here] When will Isilon s Data at Rest Encryption solution be available generally to Isilon and EMC Core Sales? Isilon S210, X200, X400, X410, and NL400 nodes with Self-Encrypting Drives are now generally available. These products now appear in the Isilon configuration tool. These nodes are available through Isilon, Isilon channel partners, EMC Core Sales, and Unified specialists. To contact your local Isilon sales team, send an to

ISILON SCALE-OUT NAS OVERVIEW AND FUTURE DIRECTIONS

ISILON SCALE-OUT NAS OVERVIEW AND FUTURE DIRECTIONS 1 ISILON SCALE-OUT NAS OVERVIEW AND FUTURE DIRECTIONS PHIL BULLINGER, SVP, EMC ISILON 2 ROADMAP INFORMATION DISCLAIMER EMC makes no representation and undertakes no obligations with regard to product planning

More information

EMC ISILON X-SERIES. Specifications. EMC Isilon X200. EMC Isilon X210. EMC Isilon X410 ARCHITECTURE

EMC ISILON X-SERIES. Specifications. EMC Isilon X200. EMC Isilon X210. EMC Isilon X410 ARCHITECTURE EMC ISILON X-SERIES EMC Isilon X200 EMC Isilon X210 The EMC Isilon X-Series, powered by the OneFS operating system, uses a highly versatile yet simple scale-out storage architecture to speed access to

More information

XTREMIO DATA AT REST ENCRYPTION

XTREMIO DATA AT REST ENCRYPTION White Paper XTREMIO DATA AT REST ENCRYPTION Abstract Data at Rest Encryption is a mandatory requirement in various industries that host private or sensitive data. This white paper introduces and explains

More information

EMC ISILON ONEFS OPERATING SYSTEM

EMC ISILON ONEFS OPERATING SYSTEM EMC ISILON ONEFS OPERATING SYSTEM Powering scale-out storage for the Big Data and Object workloads of today and tomorrow ESSENTIALS Easy-to-use, single volume, single file system architecture Highly scalable

More information

ISILON X-SERIES. Specifications. Isilon X210 Product Name. Isilon X410 ARCHITECTURE

ISILON X-SERIES. Specifications. Isilon X210 Product Name. Isilon X410 ARCHITECTURE Isilon X210 Product Name Isilon X410 ISILON X-SERIES The Dell EMC Isilon X-Series, powered by the OneFS operating system, uses a highly versatile yet simple scale-out storage architecture to speed access

More information

Data Security Using TCG Self-Encrypting Drive Technology

Data Security Using TCG Self-Encrypting Drive Technology Data Security Using TCG Self-Encrypting Drive Technology June 11, 2013 2:00PM EDT Copyright 2013 Trusted Computing Group 1 Copyright 2013 Trusted Computing Group 2 Tom Coughlin, Founder, Coughlin Associates.

More information

EMC ISILON SCALE-OUT STORAGE PRODUCT FAMILY

EMC ISILON SCALE-OUT STORAGE PRODUCT FAMILY SCALE-OUT STORAGE PRODUCT FAMILY Storage made simple ESSENTIALS Simple storage designed for ease of use Massive scalability with easy, grow-as-you-go flexibility World s fastest-performing NAS Unmatched

More information

EMC ISILON SCALE-OUT STORAGE PRODUCT FAMILY

EMC ISILON SCALE-OUT STORAGE PRODUCT FAMILY SCALE-OUT STORAGE PRODUCT FAMILY Unstructured data storage made simple ESSENTIALS Simple storage management designed for ease of use Massive scalability of capacity and performance Unmatched efficiency

More information

EMC ISILON NL-SERIES. Specifications. EMC Isilon NL400. EMC Isilon NL410 ARCHITECTURE

EMC ISILON NL-SERIES. Specifications. EMC Isilon NL400. EMC Isilon NL410 ARCHITECTURE EMC ISILON NL-SERIES The challenge of cost-effectively storing and managing data is an ever-growing concern. You have to weigh the cost of storing certain aging data sets against the need for quick access.

More information

Navigating Endpoint Encryption Technologies

Navigating Endpoint Encryption Technologies Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS

More information

EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise

EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise ESSENTIALS Easy-to-use, single volume, single file system architecture Highly scalable with

More information

Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant

Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant Flash Memory Summit 2014 Santa Clara, CA 1 The Problem 2005-2013: over 864,108,052

More information

ISILON HD-SERIES. Specifications. Isilon HD400 ARCHITECTURE

ISILON HD-SERIES. Specifications. Isilon HD400 ARCHITECTURE ISILON HD-SERIES The rapid growth of unstructured data combined with increasingly stringent compliance requirements is resulting in a growing need for efficient data archiving solutions that can store

More information

ABC of Storage Security. M. Granata NetApp System Engineer

ABC of Storage Security. M. Granata NetApp System Engineer ABC of Storage Security M. Granata NetApp System Engineer Encryption Challenges Meet Regulatory Requirements No Performance Impact Ease of Installation Government and industry regulations mandate protection

More information

21 st Century Storage What s New and What s Changing

21 st Century Storage What s New and What s Changing 21 st Century Storage What s New and What s Changing Randy Kerns Senior Strategist Evaluator Group Overview New technologies in storage - Continued evolution - Each has great economic value - Differing

More information

EMC ISILON HD-SERIES. Specifications. EMC Isilon HD400 ARCHITECTURE

EMC ISILON HD-SERIES. Specifications. EMC Isilon HD400 ARCHITECTURE EMC ISILON HD-SERIES The rapid growth of unstructured data combined with increasingly stringent compliance requirements is resulting in a growing need for efficient data archiving solutions that can store

More information

Enterprise SED Presentation. TCG Storage WG Marketing

Enterprise SED Presentation. TCG Storage WG Marketing Enterprise SED Presentation TCG Storage WG Marketing Goal of this Presentation High Level description of how Self-Encrypting Drives (SEDs) utilize cryptography to protect user data Target Use Cases for

More information

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...

More information

Solid-State Drives with Self-Encryption: Solidly Secure

Solid-State Drives with Self-Encryption: Solidly Secure Solid-State Drives with Self-Encryption: Solidly Secure 09/22/2011 Michael Willett Storage Security Strategist SAMSUNG SOLID STATE DRIVES Solid-State Drives SSD ADVANTAGES SOLID STATE DRIVES Save $$ on

More information

New Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise

New Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise New Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise Contents Addressing Common Encryption Issues... 2 Always-On Encryption... 2 Timesavings...

More information

HADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics

HADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics HADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics ESSENTIALS EMC ISILON Use the industry's first and only scale-out NAS solution with native Hadoop

More information

EMC VNX2: Data at Rest Encryption

EMC VNX2: Data at Rest Encryption White Paper EMC VNX2: Data at Rest Encryption Abstract This white paper introduces Data at Rest Encryption for EMC VNX 2, a feature that provides data protection if a drive is stolen or misplaced. This

More information

Storage made simple. Essentials. Expand it... Simply

Storage made simple. Essentials. Expand it... Simply EMC ISILON SCALE-OUT STORAGE PRODUCT FAMILY Storage made simple Essentials Simple storage management, designed for ease of use Massive scalability with easy, grow-as-you-go flexibility World s fastest

More information

Encrypted SSDs: Self-Encryption Versus Software Solutions

Encrypted SSDs: Self-Encryption Versus Software Solutions Encrypted SSDs: Self-Encryption Versus Software Solutions Michael Willett Storage Security Strategist and VP Marketing Bright Plaza Flash Memory Summit 2015 Santa Clara, CA 1 The Problem 2005-2013: over

More information

DIGITAL STORAGE CONCERNS AND CONSIDERATIONS

DIGITAL STORAGE CONCERNS AND CONSIDERATIONS DIGITAL STORAGE CONCERNS AND CONSIDERATIONS JOE HEWES, EMC OEM Copyright 2015 EMC Corporation. All rights reserved. 1 DIGITAL STORAGE & ARCHIVING FOR NDT BUSINESS DRIVERS WHY DO THIS? Improve Product Safety

More information

EMC ISILON HD-SERIES. Specifications. EMC Isilon HD400 ARCHITECTURE

EMC ISILON HD-SERIES. Specifications. EMC Isilon HD400 ARCHITECTURE EMC ISILON HD-SERIES The rapid growth of unstructured data combined with increasingly stringent compliance requirements is resulting in a growing need for efficient data archiving solutions that can store

More information

Data Security using Encryption in SwiftStack

Data Security using Encryption in SwiftStack Data Security using Encryption in SwiftStack May 2015 Copyright 2015 SwiftStack, Inc. swiftstack.com Page 1 of 11 Table of Contents Introduction... 3 Defining Three Threat Models... 3 Encrypted Data and

More information

Making Data at Rest Encryption Easy

Making Data at Rest Encryption Easy Making Data at Rest Encryption Easy MM/DD/YYYY Jason Cox Client Security Products Lead Seagate Technology What is SED? Self Encrypting Drive Basics The storage device LOCKS when it powers OFF. The storage

More information

Self-Encrypting Hard Disk Drives in the Data Center

Self-Encrypting Hard Disk Drives in the Data Center Technology Paper Self-Encrypting Hard Disk Introduction At least 35 U.S. states now have data privacy laws that state if you encrypt data-at-rest, you don t have to report breaches of that data. U.S. Congressional

More information

OPTIMIZING PRIMARY STORAGE WHITE PAPER FILE ARCHIVING SOLUTIONS FROM QSTAR AND CLOUDIAN

OPTIMIZING PRIMARY STORAGE WHITE PAPER FILE ARCHIVING SOLUTIONS FROM QSTAR AND CLOUDIAN OPTIMIZING PRIMARY STORAGE WHITE PAPER FILE ARCHIVING SOLUTIONS FROM QSTAR AND CLOUDIAN CONTENTS EXECUTIVE SUMMARY The Challenges of Data Growth SOLUTION OVERVIEW 3 SOLUTION COMPONENTS 4 Cloudian HyperStore

More information

Keep Your Data Secure: Fighting Back With Flash

Keep Your Data Secure: Fighting Back With Flash Keep Your Data Secure: Fighting Back With Flash CONTENTS: Executive Summary...1 Data Encryption: Ensuring Peace of Mind...2 Enhanced Encryption and Device Decommission in the Enterprise...3 Freeing Up

More information

ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT

ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT IS THIS ebook RIGHT FOR ME? Not sure if this is the right ebook for you? Check the following qualifications to make

More information

THE EMC ISILON STORY. Big Data In The Enterprise. Copyright 2012 EMC Corporation. All rights reserved.

THE EMC ISILON STORY. Big Data In The Enterprise. Copyright 2012 EMC Corporation. All rights reserved. THE EMC ISILON STORY Big Data In The Enterprise 2012 1 Big Data In The Enterprise Isilon Overview Isilon Technology Summary 2 What is Big Data? 3 The Big Data Challenge File Shares 90 and Archives 80 Bioinformatics

More information

Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide

Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide Securing sensitive client and company data is becoming an IT task of paramount importance. Often

More information

EMC IRODS RESOURCE DRIVERS

EMC IRODS RESOURCE DRIVERS EMC IRODS RESOURCE DRIVERS PATRICK COMBES: PRINCIPAL SOLUTION ARCHITECT, LIFE SCIENCES 1 QUICK AGENDA Intro to Isilon (~2 hours) Isilon resource driver Intro to ECS (~1.5 hours) ECS Resource driver Possibilities

More information

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION

More information

WHITE PAPER. www.fusionstorm.com. Get Ready for Big Data:

WHITE PAPER. www.fusionstorm.com. Get Ready for Big Data: WHitE PaPER: Easing the Way to the cloud: 1 WHITE PAPER Get Ready for Big Data: How Scale-Out NaS Delivers the Scalability, Performance, Resilience and manageability that Big Data Environments Demand 2

More information

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has

More information

Unlock the value of data with smarter storage solutions.

Unlock the value of data with smarter storage solutions. Unlock the value of data with smarter storage solutions. Data is the currency of the new economy.... At HGST, we believe in the value of data, and we re helping the world harness its power.... Data is

More information

Alliance Key Manager Solution Brief

Alliance Key Manager Solution Brief Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major

More information

Data Storage. Vendor Neutral Data Archiving. May 2015 Sue Montagna. Imagination at work. GE Proprietary Information

Data Storage. Vendor Neutral Data Archiving. May 2015 Sue Montagna. Imagination at work. GE Proprietary Information Data Storage Vendor Neutral Data Archiving May 2015 Sue Montagna Imagination at work GE Proprietary Information Vendor Neutral Archiving Storing data in a standard format with a standard interface, such

More information

Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets

Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets WHITE PAPER Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Abstract... 3 Introduction... 3 The Solution... 3 The

More information

EMC SOLUTION FOR SPLUNK

EMC SOLUTION FOR SPLUNK EMC SOLUTION FOR SPLUNK Splunk validation using all-flash EMC XtremIO and EMC Isilon scale-out NAS ABSTRACT This white paper provides details on the validation of functionality and performance of Splunk

More information

Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series

Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series ABSTRACT In February 2006, Snap Server announced the 500 Series of Networked Attached Storage systems as well

More information

Netapp @ 10th TF-Storage Meeting

Netapp @ 10th TF-Storage Meeting Netapp @ 10th TF-Storage Meeting Wojciech Janusz, Netapp Poland Bogusz Błaszkiewicz, Netapp Poland Ljubljana, 2012.02.20 Agenda Data Ontap Cluster-Mode pnfs E-Series NetApp Confidential - Internal Use

More information

Perceptions about Self-Encrypting Drives: A Study of IT Practitioners

Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Executive Summary Sponsored by Trusted Computing Group Independently conducted by Ponemon Institute LLC Publication Date: April 2011

More information

IBM Storwize V7000 Unified and Storwize V7000 storage systems

IBM Storwize V7000 Unified and Storwize V7000 storage systems IBM Storwize V7000 Unified and Storwize V7000 storage systems Transforming the economics of data storage Highlights Meet changing business needs with virtualized, enterprise-class, flashoptimized modular

More information

AUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK

AUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK White Paper AUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK Abstract EMC Isilon SmartLock protects critical data against accidental, malicious or premature deletion or alteration. Whether you need to

More information

DATA LAKE FOUNDATION 2.0 JEUDI 19 NOVEMBRE 2015. Denis FRAVAL-OLIVIER : ISD Presales Manager

DATA LAKE FOUNDATION 2.0 JEUDI 19 NOVEMBRE 2015. Denis FRAVAL-OLIVIER : ISD Presales Manager DATA LAKE FOUNDATION 2.0 JEUDI 19 NOVEMBRE 2015 Denis FRAVAL-OLIVIER : ISD Presales Manager EMC Isilon Unifying Workloads in one place Module 4: Horizontal and Vertical Markets ISILON FOR ALL TYPES OF

More information

CONVERGED DATA STORAGE SOLUTIONS. Helping Companies DESIGN, INTEGRATE and DEPLOY, END-TO-END File Based Workflows

CONVERGED DATA STORAGE SOLUTIONS. Helping Companies DESIGN, INTEGRATE and DEPLOY, END-TO-END File Based Workflows CONVERGED DATA STORAGE SOLUTIONS Helping Companies DESIGN, INTEGRATE and DEPLOY, END-TO-END File Based Workflows What s Inside Storage Hardware Converged Storage Network Workflow Software Professional

More information

The BIG Data Era has. your storage! Bratislava, Slovakia, 21st March 2013

The BIG Data Era has. your storage! Bratislava, Slovakia, 21st March 2013 The BIG Data Era has arrived Re-invent your storage! Bratislava, Slovakia, 21st March 2013 Luka Topic Regional Manager East Europe EMC Isilon Storage Division luka.topic@emc.com 1 What is Big Data? 2 EXABYTES

More information

EMC UNITY: DATA-AT-REST ENCRYPTION

EMC UNITY: DATA-AT-REST ENCRYPTION EMC UNITY: DATA-AT-REST ENCRYPTION A Detailed Review ABSTRACT This white paper explains the Data at Rest Encryption feature, which provides controller-based encryption of data stored on EMC Unity storage

More information

Entry level solutions: - FAS 22x0 series - Ontap Edge. Christophe Danjou Technical Partner Manager

Entry level solutions: - FAS 22x0 series - Ontap Edge. Christophe Danjou Technical Partner Manager Entry level solutions: - FAS 22x0 series - Ontap Edge Christophe Danjou Technical Partner Manager FAS2200 Series More powerful, affordable, and flexible systems for midsized organizations and distributed

More information

Top 10 Reasons You Need Encryption

Top 10 Reasons You Need Encryption Top 10 Reasons You Need Encryption Executive Summary When you talk about encryption especially to someone who isn t a security specialist you often get a variety of interpretations. In general, encryption

More information

No matter what you need for Managed IT services, High-Performance Storage, you can count on us for low cost, fast and effective service.

No matter what you need for Managed IT services, High-Performance Storage, you can count on us for low cost, fast and effective service. No matter what you need for Managed IT services, High-Performance Storage, you can count on us for low cost, fast and effective service. I.T. SOLUTIONS FROM PROFESSIONAL SERVICES Expert advice from conception

More information

INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation

INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation ADVANTAGES OF RUNNING ORACLE11G ON MICROSOFT WINDOWS SERVER X64 Edward Whalen, Performance Tuning Corporation INTRODUCTION Microsoft Windows has long been an ideal platform for the Oracle database server.

More information

An examination of information security issues, methods and securing data with LTO-4 tape drive encryption Introduction

An examination of information security issues, methods and securing data with LTO-4 tape drive encryption Introduction Silverton Consulting, Inc. StorInt Briefing An examination of information security issues, methods and securing data with LTO-4 tape drive encryption Introduction Each month many companies, big or small,

More information

Solutions for Encrypting Data on Tape: Considerations and Best Practices

Solutions for Encrypting Data on Tape: Considerations and Best Practices Solutions for Encrypting Data on Tape: Considerations and Best Practices NOTICE This white paper may contain proprietary information protected by copyright. Information in this white paper is subject to

More information

Overview executive SUMMArY

Overview executive SUMMArY EMC Isilon TCO Benefits for Large-Scale Home Directories Overview EMC Isilon scale-out network-attached storage (NAS) has rapidly gained popularity over the past several years, successfully moving from

More information

Seagate Secure Technology

Seagate Secure Technology Seagate Secure Technology Marketing Bulletin Frequently Asked Questions What is the value of a self-encrypting drive (SED)? SEDs ensure user data can be quickly deleted (erased) using standard drive commands,

More information

EMC Surveillance for IndigoVision Body-Worn Cameras

EMC Surveillance for IndigoVision Body-Worn Cameras EMC Surveillance for IndigoVision Body-Worn Cameras Functional Validation Guide H14821 01 Copyright 2016 EMC Corporation. All rights reserved. Published in the USA. Published Februaty, 2016 EMC believes

More information

With Eversync s cloud data tiering, the customer can tier data protection as follows:

With Eversync s cloud data tiering, the customer can tier data protection as follows: APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software

More information

EMC Symmetrix Data at Rest Encryption

EMC Symmetrix Data at Rest Encryption Detailed Review Abstract This white paper provides a detailed description of EMC Symmetrix Data at Rest Encryption features and operations. March 2011 Copyright 2010, 2011 EMC Corporation. All rights reserved.

More information

Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success

Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success Copyright 2008 EMC Corporation. All rights reserved.

More information

EMC VMAX3 DATA AT REST ENCRYPTION

EMC VMAX3 DATA AT REST ENCRYPTION EMC VMAX3 DATA AT REST ENCRYPTION ABSTRACT In the interconnected world, data and intellectual property is the highest value currency which can be held by corporations. From recent newsworthy examples,

More information

Data-at-Rest Encryption Addresses SAN Security Requirements

Data-at-Rest Encryption Addresses SAN Security Requirements Data-at-Rest Encryption Addresses SAN Security Requirements QLogic 2500 Series Fibre Channel Adapters Meet Enterprise Security Needs Key Findings SAN security via encryption is necessary for protecting

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

SecureD Technical Overview

SecureD Technical Overview WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD

More information

Introduction to NetApp Infinite Volume

Introduction to NetApp Infinite Volume Technical Report Introduction to NetApp Infinite Volume Sandra Moulton, Reena Gupta, NetApp April 2013 TR-4037 Summary This document provides an overview of NetApp Infinite Volume, a new innovation in

More information

Full Drive Encryption Security Problem Definition - Encryption Engine

Full Drive Encryption Security Problem Definition - Encryption Engine 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles

More information

IBM Smart Business Storage Cloud

IBM Smart Business Storage Cloud GTS Systems Services IBM Smart Business Storage Cloud Reduce costs and improve performance with a scalable storage virtualization solution SoNAS Gerardo Kató Cloud Computing Solutions 2010 IBM Corporation

More information

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates

More information

Keep Your Data Secure in the Cloud Using encryption to ensure your online data is protected from compromise

Keep Your Data Secure in the Cloud Using encryption to ensure your online data is protected from compromise Protection as a Priority TM Keep Your Data Secure in the Cloud to ensure your online data is protected from compromise Abstract The headlines have been dominated lately with massive data breaches exposing

More information

Implementing Stored-Data Encryption (with a bias for self-encrypting drives) Presenter: Michael Willett SAMSUNG Author: Michael Willett, Samsung

Implementing Stored-Data Encryption (with a bias for self-encrypting drives) Presenter: Michael Willett SAMSUNG Author: Michael Willett, Samsung (with a bias for self-encrypting drives) Presenter: Michael Willett SAMSUNG Author: Michael Willett, Samsung SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless

More information

Alliance AES Key Management

Alliance AES Key Management Alliance AES Key Management Solution Brief www.patownsend.com Patrick Townsend Security Solutions Criteria for selecting a key management solution for the System i Key Management is as important to your

More information

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest Full Disk Encryption Drives & Management Software The Ultimate Security Solution For Data At Rest Agenda Introduction Information Security Challenges Dell Simplifies Security Trusted Drive Technology Seagate

More information

SimpliVity OmniStack with Vormetric Transparent Encryption

SimpliVity OmniStack with Vormetric Transparent Encryption SimpliVity OmniStack with Vormetric Transparent Encryption Page 1 of 12 Table of Contents Executive Summary... 3 Audience... 3 Solution Overview... 3 Simplivity Introduction... 3 Why Simplivity For Virtualized

More information

A Virtual Filer for VMware s Virtual SAN A Maginatics and VMware Joint Partner Brief

A Virtual Filer for VMware s Virtual SAN A Maginatics and VMware Joint Partner Brief A Virtual Filer for VMware s Virtual SAN A Maginatics and VMware Joint Partner Brief With the massive growth of unstructured data in today s enterprise environments, storage IT administrators are constantly

More information

Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS)

Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS) Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS) How Financial Institutions Can Comply to Data Security Best Practices Vormetric, Inc. 2545 N. 1st Street,

More information

SCI Briefing: A Review of the New Hitachi Unified Storage and Hitachi NAS Platform 4000 Series. Silverton Consulting, Inc.

SCI Briefing: A Review of the New Hitachi Unified Storage and Hitachi NAS Platform 4000 Series. Silverton Consulting, Inc. SCI Briefing: A Review of the New Hitachi Unified Storage and Hitachi NAS Platform 4000 Series Silverton Consulting, Inc. StorInt Briefing Written by: Ray Lucchesi, President and Founder Published: July,

More information

SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX

SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX White Paper SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX Abstract This white paper explains the benefits to the extended enterprise of the on-

More information

EMC BIG DATA GIS INFRASTRUCTURE

EMC BIG DATA GIS INFRASTRUCTURE EMC BIG DATA GIS INFRASTRUCTURE EMC Isilon And Scale-Out NAS Sergei Butenko District Manager, Baltic region Sergei.Butenko@emc.com 1 IN A DECADE THE DIGITAL UNIVERSE WILL BE 35 ZETTABYTES 35,000,000,000,000,000,000,000

More information

Improving IT Operational Efficiency with a VMware vsphere Private Cloud on Lenovo Servers and Lenovo Storage SAN S3200

Improving IT Operational Efficiency with a VMware vsphere Private Cloud on Lenovo Servers and Lenovo Storage SAN S3200 Improving IT Operational Efficiency with a VMware vsphere Private Cloud on Lenovo Servers and Lenovo Storage SAN S3200 Most organizations routinely utilize a server virtualization infrastructure to benefit

More information

CommVault Backup Appliance with NetApp

CommVault Backup Appliance with NetApp CommVault Backup Appliance with NetApp Powerful scalability. Broad flexibility. Comprehensive management. Presenter Name Today s data protection challenges Explosive data growth Shrinking backup windows

More information

Scientific Computing Data Management Visions

Scientific Computing Data Management Visions Scientific Computing Data Management Visions ELI-Tango Workshop Szeged, 24-25 February 2015 Péter Szász Group Leader Scientific Computing Group ELI-ALPS Scientific Computing Group Responsibilities Data

More information

CONVERGED DATA STORAGE SOLUTIONS. SAN Scale-Out NAS Archive

CONVERGED DATA STORAGE SOLUTIONS. SAN Scale-Out NAS Archive CONVERGED DATA STORAGE SOLUTIONS SAN Scale-Out NAS Archive What s Inside Storage Hardware Converged Storage Network Workflow Software Data Center Services Scale-Out Scale-Up Scale Logic scalelogicinc.com

More information

ACHIEVING HIPAA COMPLIANCE WITH POSTGRES PLUS CLOUD DATABASE

ACHIEVING HIPAA COMPLIANCE WITH POSTGRES PLUS CLOUD DATABASE ACHIEVING HIPAA COMPLIANCE WITH POSTGRES PLUS CLOUD DATABASE TABLE OF CONTENTS 03 04 04 05 08 INTRODUCTION FUNDAMENTALS OF HIPAA AND HITECH HIPAA-COMPLIANT DATA MANAGEMENT IN THE CLOUD POSTGRES PLUS CLOUD

More information

Huawei OceanStor N8500 Clustered NAS Storage System Sales Guide

Huawei OceanStor N8500 Clustered NAS Storage System Sales Guide Huawei OceanStor N8500 Clustered NAS Storage System Sales Guide Contents What - Positioning of the N8500 Who - Target Customers of the N8500 Where Market Opportunities of the N8500 How - Sales of the N8500

More information

Achieving PCI Compliance with Red Hat Enterprise Linux. June 2009

Achieving PCI Compliance with Red Hat Enterprise Linux. June 2009 Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Introducing 365 Cloud Storage

Introducing 365 Cloud Storage Introducing 365 Cloud Storage Local Enterprise Cloud Storage SERVICE AVAILABILITY: SEPTEMBER 23, 2014 What we do 365 Data Centers provides secure and reliable colocation services that offer an easier way

More information

THE KEY TO DATA SECURITY

THE KEY TO DATA SECURITY Secure Correspondence and File Sharing Zero-Knowledge Client-Side Encryption THE KEY TO DATA SECURITY TitanFile provides the highest level of security without compromising efficiency or ease of use. Securing

More information

MEEC Webinar Daly and EMC BRS - EMC Backup & Archive Solutions

MEEC Webinar Daly and EMC BRS - EMC Backup & Archive Solutions MEEC Webinar Daly and EMC BRS - EMC Backup & Archive Solutions Accelerating Transformation Presented By: Gabe Sales-Smith Backup & Recovery Specialist EMC Jim Rowland Senior System Architect and Project

More information

Vormetric Encryption Architecture Overview

Vormetric Encryption Architecture Overview Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls and Auditing Vormetric, Inc. 2545 N. 1st Street, San Jose, CA 95131 United States: 888.267.3732

More information

The skinny on storage clusters

The skinny on storage clusters The skinny on storage clusters Storage clustering can mean different things based on the vendor and the architecture which the technology is built on, but the features or benefits are usually similar across

More information

HyperQ Storage Tiering White Paper

HyperQ Storage Tiering White Paper HyperQ Storage Tiering White Paper An Easy Way to Deal with Data Growth Parsec Labs, LLC. 7101 Northland Circle North, Suite 105 Brooklyn Park, MN 55428 USA 1-763-219-8811 www.parseclabs.com info@parseclabs.com

More information

Date: May 2010 Authors: Mark Peters, Senior Analyst, and Tony Palmer, Senior ESG Lab Engineer

Date: May 2010 Authors: Mark Peters, Senior Analyst, and Tony Palmer, Senior ESG Lab Engineer ESG Lab Review Nexsan Assureon Secure, Online Disk Storage Archive Date: May 2010 Authors: Mark Peters, Senior Analyst, and Tony Palmer, Senior ESG Lab Engineer Abstract: Driven by a mix of increased regulation,

More information

Securing Sensitive Data

Securing Sensitive Data Securing Sensitive Data A Comprehensive Guide to Encryption Technology Approaches Vormetric, Inc. 888.267.3732 408.433.6000 sales@vormetric.com www.vormetric.com Page 1 Executive Summary Enterprises can

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

Technology Insight Series

Technology Insight Series HP s Information Supply Chain Optimizing Information, Data and Storage for Business Value John Webster August, 2011 Technology Insight Series Evaluator Group Copyright 2011 Evaluator Group, Inc. All rights

More information