Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution
|
|
- Jason Donald Allison
- 8 years ago
- Views:
Transcription
1 1 Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution Table of Contents What s New? Target Customers Customer Benefits Competitive Positioning Technical Sales Questions General Sales Questions What s New? What is being announced? The EMC Isilon Data at Rest Encryption (DARE) solution now includes support for all currently shipping Isilon platforms and provides encryption across today s Isilon portfolio. The Isilon DARE solution utilizes Self-Encrypting Drives (SEDs) to provide secure data protection for sensitive file-based, unstructured data. Isilon's DARE solution offers enterprise customers enhanced data security that allows them to meet rigorous compliance and governance requirements without sacrificing application or workload performance. The Isilon DARE solution combines advanced data security with the many other benefits of Isilon scale-out storage including simplicity, massive scalability and unmatched efficiency. What are the key components of the Isilon DARE solution? The Isilon DARE solution consists of a cluster comprised of Isilon nodes that are fully populated with Self Encrypting Drives (SEDs) and perform encryption and decryption of data within each drive. This solution is available for Isilon X200, X400, and NL400 nodes running the Isilon OneFS 7.1 (or later) operating system and for Isilon S210 and X410 nodes running the Isilon OneFS (or later) operating system. The solution requires the cluster to consist entirely of encrypted Isilon nodes fully populated with SEDs. The Isilon DARE solution utilizes AES-256 bit encryption keys using the algorithm and key strength recommended by the National Institution of Standards and Technology and that has been adopted worldwide as the de-facto encryption standard. SEDs used in the Data at Rest Encryption (DARE) solution also provide protection against physical attacks to sensitive data.
2 [Type here] Target Customers What type of customers are good candidates for the Isilon DARE solution? The Isilon Data at Rest Encryption solution is ideal for enterprises managing largescale, file-based, unstructured data that requires rigorous data security to protect sensitive information and meet stringent compliance and governance requirements including: Large-scale NAS file environments with robust data security requirements: Windows, Linux, and UNIX environments with more than 50 TB of file data storage that requires data encryption security Financial Services: Companies facing Sarbanes-Oxley & PCI compliance requirements Healthcare Providers: Healthcare providers that need to meet HIPAA compliance regulations for such data as PACS images and other sensitive information Federal and State Government Agencies: Governmental agencies needing secure, encrypted data storage solutions that protect sensitive data and that are certified to meet a wide range of regulatory requirements including the Federal Information Security Management Act (FISMA) Customer Benefits What is the value proposition for the Isilon DARE solution? The Isilon Data Encryption at Rest (DARE) solution allows organizations to meet stringent regulatory and compliance requirements and protect sensitive information without sacrificing application or workload performance. The Isilon DARE solution combines advanced data security with the many other benefits of Isilon scale-out storage including simplicity, massive scalability and unmatched efficiency. What are the key benefits that the Isilon DARE solution will deliver? The Isilon Data Encryption at Rest solution provides the following benefits: Protects against accidental or malicious loss including drive theft by keeping data encrypted on drives Enables data to be securely erased before drives are repurposed or retired by shredding encryption keys. Cryptographic erasure (e.g. shred keys) to wipe data can be done in a matter of seconds Allows customers to return failed drives to vendor, even if drives contain sensitive data (vendors have no access to authentication keys and cannot access user data) The self-encrypting drives (SEDs) used with the Isilon DARE solution are FIPS Level 2 validated and are certified for U.S. government use. They also utilize AES-256 encryption with negligible performance degradation (1%). Data encryption keys used by the SEDs never leave the drives and are automatically managed within the Isilon cluster with OneFS 7.1 and The Isilon DARE solution allows organizations to address important data security, regulatory, compliance and governance requirements including:
3 3 Federal Information Security Management Act (FISMA) Financial Services Payment Card Industry standards (PCI DSS) Health Insurance Portability and Accountability Act (HIPAA) Sarbanes-Oxley Competitive Positioning How will Isilon s DARE solution further differentiate Isilon Scale-Out NAS solutions from the competition? EMC Isilon is the only scale-out NAS platform that offers a Data at Rest Encryption solution option for enterprise customers. Along with its DARE solution, Isilon also offers File System Audit compliance and SEC 17a-4 compliant WORM data protection. With these capabilities, Isilon offers the most robust security and compliance options available on a scale-out NAS platform. Isilon Security Capabilities Compared to the Competition Capabilities : Data Encryption at Rest EMC Isilon DARE Solution NetApp C-Mode 8.2 IBM SONAS HP StoreAll IBRIX Yes No No No No HDS HNAS : Support for Audit Applications Yes Yes No Yes No : WORM / SEC 17a-4 Yes No No Yes- WORM No- Yes- WORM No- Technical Sales Questions How is encryption being offered for the existing EMC Isilon product line? The Isilon platform supports encrypted clusters by utilizing self-encrypting drives (SEDs) to bring data at rest encryption (DARE) to the product line. What platforms support encrypted clusters? Today, encryption solutions with SEDs are generally available for Isilon S210, X200, X400, X410 and NL400 nodes.
4 [Type here] What SEDs drive capacities are now available? Drive capacities and supported platforms are shown in the table below: 3 TB HDD 4 TB HDD 900 GB HDD 800 GB SSD Isilon S210 No No Yes Yes Isilon X200 Yes No No Yes Isilon X400 Yes Yes No Yes Isilon X410 Yes Yes No Yes Isilon NL400 Yes Yes No Yes Is there a minimum Isilon OneFS version required to support encrypted clusters? Yes. Encrypted clusters with Isilon X200, X400 and NL400 nodes must be running OneFS 7.1 or later for the system to recognize the SEDs. The newer Isilon X410 and S210 nodes require OneFS or later. Can you mix encrypted and non-encrypted nodes within the same Isilon node? No. Encrypting and non-encrypting drives cannot be mixed within a node. The entire node must be all encrypting or non-encrypting drives. Can you mix encrypted and non-encrypted nodes within the same Isilon cluster? No. The entire cluster must consist of encrypted or unencrypted nodes. The only exception is during migration of a non-encrypted cluster to an encrypted cluster. Can SSDs be included in encrypted nodes for metadata caching or other SSD functions? Yes, by using the 800GB SED SSD. How does the encryption work in the Isilon DARE solution? Each Self-Encrypting Drive (SED) in the Isilon DARE solution has a unique data encryption key (DEK) used to encrypt and decrypt data as it is written to and read from the disk. Isilon OneFS automatically generates an authentication key (AK) that is used to wrap the DEK, preventing unauthorized access to the data. Drives removed out of the source node will be unable to decrypt the data on the drive because the AK is needed to unlock the drive. What key strengths and encryption algorithms are supported? The drives support AES-256 bit strength keys for data encryption. How do I migrate my customer to an encrypted cluster solution? Migration is offered as an EMC Professional Services engagement. Generally, you can migrate an existing cluster in-place by adding encrypted nodes, using Isilon SmartPools to move data to the new encrypted node and then use SmartFail to take out the unencrypted nodes. Repeat this process until all unencrypted nodes have been replaced.
5 5 How is key management accomplished with the Isilon DARE solution? Isilon OneFS uses an internal key manager that stores authentication keys (AKs) securely on an encrypted database replicated across both compact flash drives on each node. The data encryption keys on each drive do not leave the FIPS boundary on the drive itself. Each drive is given a unique AK that is automatically deleted as drives are removed. Newly inserted drives will be assigned automatically a new AK without requiring administrator intervention. Does this solution support Key Management Interoperability Protocol (KMIP)? Not currently, however this capability is on the roadmap for a future release of OneFS. Which use cases do these encrypting drives? Isilon encrypted clusters protect sensitive information against single or multiple drive theft. Our solution also protects sensitive information when SED drives fail and need to be returned for service purposes. What validations does this solution have? The SEDs used in our solution are FIPS level 2 validated. This level of validation satisfies the majority of Federal requirements for cryptographic validation. How can we prove that our SED implementation is FIPS validated? You can point customers to the following FIPS certificates for each SED drive we support: 800GB SSD SED: 900GB SAS SED: 3TB SATA (NL-SAS) SED: 4TB SATA (NL-SAS) SED: This list will grow as we add new SED drive capacities. Which regulatory and compliance requirements are met with this solution? Isilon encrypted clusters can satisfy PCI-DSS v2.0 section 3.4, HIPAA PHI Privacy Rule and Security Rules, California Senate Bill 1386 and California Assembly Bill 1950, and other State equivalent bills. General Sales Questions
6 [Type here] When will Isilon s Data at Rest Encryption solution be available generally to Isilon and EMC Core Sales? Isilon S210, X200, X400, X410, and NL400 nodes with Self-Encrypting Drives are now generally available. These products now appear in the Isilon configuration tool. These nodes are available through Isilon, Isilon channel partners, EMC Core Sales, and Unified specialists. To contact your local Isilon sales team, send an to CLOUD@CDILLC.com
XTREMIO DATA AT REST ENCRYPTION
White Paper XTREMIO DATA AT REST ENCRYPTION Abstract Data at Rest Encryption is a mandatory requirement in various industries that host private or sensitive data. This white paper introduces and explains
More informationHow To Manage A Single Volume Of Data On A Single Disk (Isilon)
1 ISILON SCALE-OUT NAS OVERVIEW AND FUTURE DIRECTIONS PHIL BULLINGER, SVP, EMC ISILON 2 ROADMAP INFORMATION DISCLAIMER EMC makes no representation and undertakes no obligations with regard to product planning
More informationEMC ISILON ONEFS OPERATING SYSTEM
EMC ISILON ONEFS OPERATING SYSTEM Powering scale-out storage for the Big Data and Object workloads of today and tomorrow ESSENTIALS Easy-to-use, single volume, single file system architecture Highly scalable
More informationEMC ISILON X-SERIES. Specifications. EMC Isilon X200. EMC Isilon X210. EMC Isilon X410 ARCHITECTURE
EMC ISILON X-SERIES EMC Isilon X200 EMC Isilon X210 The EMC Isilon X-Series, powered by the OneFS operating system, uses a highly versatile yet simple scale-out storage architecture to speed access to
More informationData Security Using TCG Self-Encrypting Drive Technology
Data Security Using TCG Self-Encrypting Drive Technology June 11, 2013 2:00PM EDT Copyright 2013 Trusted Computing Group 1 Copyright 2013 Trusted Computing Group 2 Tom Coughlin, Founder, Coughlin Associates.
More informationEMC ISILON SCALE-OUT STORAGE PRODUCT FAMILY
SCALE-OUT STORAGE PRODUCT FAMILY Storage made simple ESSENTIALS Simple storage designed for ease of use Massive scalability with easy, grow-as-you-go flexibility World s fastest-performing NAS Unmatched
More informationEMC ISILON SCALE-OUT STORAGE PRODUCT FAMILY
SCALE-OUT STORAGE PRODUCT FAMILY Unstructured data storage made simple ESSENTIALS Simple storage management designed for ease of use Massive scalability of capacity and performance Unmatched efficiency
More informationEMC ISILON NL-SERIES. Specifications. EMC Isilon NL400. EMC Isilon NL410 ARCHITECTURE
EMC ISILON NL-SERIES The challenge of cost-effectively storing and managing data is an ever-growing concern. You have to weigh the cost of storing certain aging data sets against the need for quick access.
More informationSolid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant Flash Memory Summit 2014 Santa Clara, CA 1 The Problem 2005-2013: over 864,108,052
More informationNavigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
More informationEMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise
EMC ISILON OneFS OPERATING SYSTEM Powering scale-out storage for the new world of Big Data in the enterprise ESSENTIALS Easy-to-use, single volume, single file system architecture Highly scalable with
More informationABC of Storage Security. M. Granata NetApp System Engineer
ABC of Storage Security M. Granata NetApp System Engineer Encryption Challenges Meet Regulatory Requirements No Performance Impact Ease of Installation Government and industry regulations mandate protection
More information21 st Century Storage What s New and What s Changing
21 st Century Storage What s New and What s Changing Randy Kerns Senior Strategist Evaluator Group Overview New technologies in storage - Continued evolution - Each has great economic value - Differing
More informationSolid-State Drives with Self-Encryption: Solidly Secure
Solid-State Drives with Self-Encryption: Solidly Secure 09/22/2011 Michael Willett Storage Security Strategist SAMSUNG SOLID STATE DRIVES Solid-State Drives SSD ADVANTAGES SOLID STATE DRIVES Save $$ on
More informationEncrypted SSDs: Self-Encryption Versus Software Solutions
Encrypted SSDs: Self-Encryption Versus Software Solutions Michael Willett Storage Security Strategist and VP Marketing Bright Plaza Flash Memory Summit 2015 Santa Clara, CA 1 The Problem 2005-2013: over
More informationEMC ISILON HD-SERIES. Specifications. EMC Isilon HD400 ARCHITECTURE
EMC ISILON HD-SERIES The rapid growth of unstructured data combined with increasingly stringent compliance requirements is resulting in a growing need for efficient data archiving solutions that can store
More informationEMC VNX2: Data at Rest Encryption
White Paper EMC VNX2: Data at Rest Encryption Abstract This white paper introduces Data at Rest Encryption for EMC VNX 2, a feature that provides data protection if a drive is stolen or misplaced. This
More informationEmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
More informationStorage made simple. Essentials. Expand it... Simply
EMC ISILON SCALE-OUT STORAGE PRODUCT FAMILY Storage made simple Essentials Simple storage management, designed for ease of use Massive scalability with easy, grow-as-you-go flexibility World s fastest
More informationData Security using Encryption in SwiftStack
Data Security using Encryption in SwiftStack May 2015 Copyright 2015 SwiftStack, Inc. swiftstack.com Page 1 of 11 Table of Contents Introduction... 3 Defining Three Threat Models... 3 Encrypted Data and
More informationDIGITAL STORAGE CONCERNS AND CONSIDERATIONS
DIGITAL STORAGE CONCERNS AND CONSIDERATIONS JOE HEWES, EMC OEM Copyright 2015 EMC Corporation. All rights reserved. 1 DIGITAL STORAGE & ARCHIVING FOR NDT BUSINESS DRIVERS WHY DO THIS? Improve Product Safety
More informationNew Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise
New Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise Contents Addressing Common Encryption Issues... 2 Always-On Encryption... 2 Timesavings...
More informationHADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics
HADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics ESSENTIALS EMC ISILON Use the industry's first and only scale-out NAS solution with native Hadoop
More informationMaking Data at Rest Encryption Easy
Making Data at Rest Encryption Easy MM/DD/YYYY Jason Cox Client Security Products Lead Seagate Technology What is SED? Self Encrypting Drive Basics The storage device LOCKS when it powers OFF. The storage
More informationSelf-Encrypting Hard Disk Drives in the Data Center
Technology Paper Self-Encrypting Hard Disk Introduction At least 35 U.S. states now have data privacy laws that state if you encrypt data-at-rest, you don t have to report breaches of that data. U.S. Congressional
More informationUnlock the value of data with smarter storage solutions.
Unlock the value of data with smarter storage solutions. Data is the currency of the new economy.... At HGST, we believe in the value of data, and we re helping the world harness its power.... Data is
More informationOPTIMIZING PRIMARY STORAGE WHITE PAPER FILE ARCHIVING SOLUTIONS FROM QSTAR AND CLOUDIAN
OPTIMIZING PRIMARY STORAGE WHITE PAPER FILE ARCHIVING SOLUTIONS FROM QSTAR AND CLOUDIAN CONTENTS EXECUTIVE SUMMARY The Challenges of Data Growth SOLUTION OVERVIEW 3 SOLUTION COMPONENTS 4 Cloudian HyperStore
More informationTHE EMC ISILON STORY. Big Data In The Enterprise. Copyright 2012 EMC Corporation. All rights reserved.
THE EMC ISILON STORY Big Data In The Enterprise 2012 1 Big Data In The Enterprise Isilon Overview Isilon Technology Summary 2 What is Big Data? 3 The Big Data Challenge File Shares 90 and Archives 80 Bioinformatics
More informationWHITE PAPER. www.fusionstorm.com. Get Ready for Big Data:
WHitE PaPER: Easing the Way to the cloud: 1 WHITE PAPER Get Ready for Big Data: How Scale-Out NaS Delivers the Scalability, Performance, Resilience and manageability that Big Data Environments Demand 2
More informationEMC SOLUTION FOR SPLUNK
EMC SOLUTION FOR SPLUNK Splunk validation using all-flash EMC XtremIO and EMC Isilon scale-out NAS ABSTRACT This white paper provides details on the validation of functionality and performance of Splunk
More informationEMC IRODS RESOURCE DRIVERS
EMC IRODS RESOURCE DRIVERS PATRICK COMBES: PRINCIPAL SOLUTION ARCHITECT, LIFE SCIENCES 1 QUICK AGENDA Intro to Isilon (~2 hours) Isilon resource driver Intro to ECS (~1.5 hours) ECS Resource driver Possibilities
More informationIBM Storwize V7000 Unified and Storwize V7000 storage systems
IBM Storwize V7000 Unified and Storwize V7000 storage systems Transforming the economics of data storage Highlights Meet changing business needs with virtualized, enterprise-class, flashoptimized modular
More informationImplementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide
Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide Securing sensitive client and company data is becoming an IT task of paramount importance. Often
More informationCONVERGED DATA STORAGE SOLUTIONS. Helping Companies DESIGN, INTEGRATE and DEPLOY, END-TO-END File Based Workflows
CONVERGED DATA STORAGE SOLUTIONS Helping Companies DESIGN, INTEGRATE and DEPLOY, END-TO-END File Based Workflows What s Inside Storage Hardware Converged Storage Network Workflow Software Professional
More informationThe BIG Data Era has. your storage! Bratislava, Slovakia, 21st March 2013
The BIG Data Era has arrived Re-invent your storage! Bratislava, Slovakia, 21st March 2013 Luka Topic Regional Manager East Europe EMC Isilon Storage Division luka.topic@emc.com 1 What is Big Data? 2 EXABYTES
More informationImplementing Stored-Data Encryption (with a bias for self-encrypting drives) Presenter: Michael Willett SAMSUNG Author: Michael Willett, Samsung
(with a bias for self-encrypting drives) Presenter: Michael Willett SAMSUNG Author: Michael Willett, Samsung SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
More informationData Storage. Vendor Neutral Data Archiving. May 2015 Sue Montagna. Imagination at work. GE Proprietary Information
Data Storage Vendor Neutral Data Archiving May 2015 Sue Montagna Imagination at work GE Proprietary Information Vendor Neutral Archiving Storing data in a standard format with a standard interface, such
More informationNetapp @ 10th TF-Storage Meeting
Netapp @ 10th TF-Storage Meeting Wojciech Janusz, Netapp Poland Bogusz Błaszkiewicz, Netapp Poland Ljubljana, 2012.02.20 Agenda Data Ontap Cluster-Mode pnfs E-Series NetApp Confidential - Internal Use
More informationKeep Your Data Secure: Fighting Back With Flash
Keep Your Data Secure: Fighting Back With Flash CONTENTS: Executive Summary...1 Data Encryption: Ensuring Peace of Mind...2 Enhanced Encryption and Device Decommission in the Enterprise...3 Freeing Up
More informationPerceptions about Self-Encrypting Drives: A Study of IT Practitioners
Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Executive Summary Sponsored by Trusted Computing Group Independently conducted by Ponemon Institute LLC Publication Date: April 2011
More informationSolutions for Encrypting Data on Tape: Considerations and Best Practices
Solutions for Encrypting Data on Tape: Considerations and Best Practices NOTICE This white paper may contain proprietary information protected by copyright. Information in this white paper is subject to
More informationAUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK
White Paper AUTOMATED DATA RETENTION WITH EMC ISILON SMARTLOCK Abstract EMC Isilon SmartLock protects critical data against accidental, malicious or premature deletion or alteration. Whether you need to
More informationENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT IS THIS ebook RIGHT FOR ME? Not sure if this is the right ebook for you? Check the following qualifications to make
More informationTop 10 Reasons You Need Encryption
Top 10 Reasons You Need Encryption Executive Summary When you talk about encryption especially to someone who isn t a security specialist you often get a variety of interpretations. In general, encryption
More informationIntroduction to NetApp Infinite Volume
Technical Report Introduction to NetApp Infinite Volume Sandra Moulton, Reena Gupta, NetApp April 2013 TR-4037 Summary This document provides an overview of NetApp Infinite Volume, a new innovation in
More informationSecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
More informationAn examination of information security issues, methods and securing data with LTO-4 tape drive encryption Introduction
Silverton Consulting, Inc. StorInt Briefing An examination of information security issues, methods and securing data with LTO-4 tape drive encryption Introduction Each month many companies, big or small,
More informationEMC VMAX3 DATA AT REST ENCRYPTION
EMC VMAX3 DATA AT REST ENCRYPTION ABSTRACT In the interconnected world, data and intellectual property is the highest value currency which can be held by corporations. From recent newsworthy examples,
More informationHuawei OceanStor N8500 Clustered NAS Storage System Sales Guide
Huawei OceanStor N8500 Clustered NAS Storage System Sales Guide Contents What - Positioning of the N8500 Who - Target Customers of the N8500 Where Market Opportunities of the N8500 How - Sales of the N8500
More informationProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
More informationFull Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
More informationEMC Symmetrix Data at Rest Encryption
Detailed Review Abstract This white paper provides a detailed description of EMC Symmetrix Data at Rest Encryption features and operations. March 2011 Copyright 2010, 2011 EMC Corporation. All rights reserved.
More informationnwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
More informationDATA LAKE FOUNDATION 2.0 JEUDI 19 NOVEMBRE 2015. Denis FRAVAL-OLIVIER : ISD Presales Manager
DATA LAKE FOUNDATION 2.0 JEUDI 19 NOVEMBRE 2015 Denis FRAVAL-OLIVIER : ISD Presales Manager EMC Isilon Unifying Workloads in one place Module 4: Horizontal and Vertical Markets ISILON FOR ALL TYPES OF
More informationAlliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
More informationSecuring Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
More informationVormetric and SanDisk : Encryption-at-Rest for Active Data Sets
WHITE PAPER Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Abstract... 3 Introduction... 3 The Solution... 3 The
More informationSeagate Secure Technology
Seagate Secure Technology Marketing Bulletin Frequently Asked Questions What is the value of a self-encrypting drive (SED)? SEDs ensure user data can be quickly deleted (erased) using standard drive commands,
More informationData-at-Rest Encryption Addresses SAN Security Requirements
Data-at-Rest Encryption Addresses SAN Security Requirements QLogic 2500 Series Fibre Channel Adapters Meet Enterprise Security Needs Key Findings SAN security via encryption is necessary for protecting
More informationMeeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS)
Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS) How Financial Institutions Can Comply to Data Security Best Practices Vormetric, Inc. 2545 N. 1st Street,
More informationCONVERGED DATA STORAGE SOLUTIONS. SAN Scale-Out NAS Archive
CONVERGED DATA STORAGE SOLUTIONS SAN Scale-Out NAS Archive What s Inside Storage Hardware Converged Storage Network Workflow Software Data Center Services Scale-Out Scale-Up Scale Logic scalelogicinc.com
More informationEntry level solutions: - FAS 22x0 series - Ontap Edge. Christophe Danjou Technical Partner Manager
Entry level solutions: - FAS 22x0 series - Ontap Edge Christophe Danjou Technical Partner Manager FAS2200 Series More powerful, affordable, and flexible systems for midsized organizations and distributed
More informationNext Generation NAS: A market perspective on the recently introduced Snap Server 500 Series
Next Generation NAS: A market perspective on the recently introduced Snap Server 500 Series ABSTRACT In February 2006, Snap Server announced the 500 Series of Networked Attached Storage systems as well
More informationTHE BRIDGE FROM PACS TO VNA: SCALE-OUT STORAGE
White Paper THE BRIDGE FROM PACS TO VNA: SCALE-OUT STORAGE Authored by Michael Gray of Gray Consulting Abstract Moving to a VNA (vendor-neutral archive) for image archival, retrieval, and management requires
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationNo matter what you need for Managed IT services, High-Performance Storage, you can count on us for low cost, fast and effective service.
No matter what you need for Managed IT services, High-Performance Storage, you can count on us for low cost, fast and effective service. I.T. SOLUTIONS FROM PROFESSIONAL SERVICES Expert advice from conception
More informationHow To Store Data On A Server Or Hard Drive (For A Cloud)
Introducing 365 Cloud Storage Local Enterprise Cloud Storage SERVICE AVAILABILITY: SEPTEMBER 23, 2014 What we do 365 Data Centers provides secure and reliable colocation services that offer an easier way
More informationScientific Computing Data Management Visions
Scientific Computing Data Management Visions ELI-Tango Workshop Szeged, 24-25 February 2015 Péter Szász Group Leader Scientific Computing Group ELI-ALPS Scientific Computing Group Responsibilities Data
More informationEMC BIG DATA GIS INFRASTRUCTURE
EMC BIG DATA GIS INFRASTRUCTURE EMC Isilon And Scale-Out NAS Sergei Butenko District Manager, Baltic region Sergei.Butenko@emc.com 1 IN A DECADE THE DIGITAL UNIVERSE WILL BE 35 ZETTABYTES 35,000,000,000,000,000,000,000
More informationImproving IT Operational Efficiency with a VMware vsphere Private Cloud on Lenovo Servers and Lenovo Storage SAN S3200
Improving IT Operational Efficiency with a VMware vsphere Private Cloud on Lenovo Servers and Lenovo Storage SAN S3200 Most organizations routinely utilize a server virtualization infrastructure to benefit
More informationBANKING SECURITY and COMPLIANCE
BANKING SECURITY and COMPLIANCE Cashing In On Banking Security and Compliance With awareness of data breaches at an all-time high, banking institutions are working hard to implement policies and solutions
More informationResearch Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
More informationIBM Smart Business Storage Cloud
GTS Systems Services IBM Smart Business Storage Cloud Reduce costs and improve performance with a scalable storage virtualization solution SoNAS Gerardo Kató Cloud Computing Solutions 2010 IBM Corporation
More informationHPSD MEMA strategy, priorities and Discover Announcements
HPSD MEMA strategy, priorities and Discover Announcements Antonis Sgourdos, Storage Category Manager, MEMA Phuket, 12 December 2014 Copyright 2014 Hewlett-Packard Development Company, L.P. The information
More informationHow To Encrypt Data On A Network With Cisco Storage Media Encryption (Sme) For Disk And Tape (Smine)
Data Sheet Cisco Storage Media Encryption for Disk and Tape Product Overview Cisco Storage Media Encryption (SME) protects data at rest on heterogeneous tape drives, virtual tape libraries (VTLs), and
More informationINTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation
ADVANTAGES OF RUNNING ORACLE11G ON MICROSOFT WINDOWS SERVER X64 Edward Whalen, Performance Tuning Corporation INTRODUCTION Microsoft Windows has long been an ideal platform for the Oracle database server.
More informationHIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 sabrina@captureproof.com Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
More informationDate: May 2010 Authors: Mark Peters, Senior Analyst, and Tony Palmer, Senior ESG Lab Engineer
ESG Lab Review Nexsan Assureon Secure, Online Disk Storage Archive Date: May 2010 Authors: Mark Peters, Senior Analyst, and Tony Palmer, Senior ESG Lab Engineer Abstract: Driven by a mix of increased regulation,
More informationThe CIO s Guide to HIPAA Compliant Text Messaging
The CIO s Guide to HIPAA Compliant Text Messaging Executive Summary The risks associated with sending Electronic Protected Health Information (ephi) via unencrypted text messaging are significant, especially
More informationOverview executive SUMMArY
EMC Isilon TCO Benefits for Large-Scale Home Directories Overview EMC Isilon scale-out network-attached storage (NAS) has rapidly gained popularity over the past several years, successfully moving from
More informationAegis Padlock for business
Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses
More informationBMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
More informationSHAREPOINT 2010 REMOTE BLOB STORES WITH EMC ISILON NAS AND METALOGIX STORAGEPOINT
White Paper SHAREPOINT 2010 REMOTE BLOB STORES WITH EMC ISILON NAS AND METALOGIX STORAGEPOINT Abstract This white paper describes how to externalize Microsoft SharePoint Server 2010 BLOB stores to EMC
More informationFull Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest
Full Disk Encryption Drives & Management Software The Ultimate Security Solution For Data At Rest Agenda Introduction Information Security Challenges Dell Simplifies Security Trusted Drive Technology Seagate
More informationManaging BitLocker Encryption
Managing BitLocker Encryption WWW.CREDANT.COM Introduction Organizations are facing a data security crisis. Despite decades of investment in security, breaches of sensitive information continue to dominate
More informationManaging the Unmanageable: A Better Way to Manage Storage
Managing the Unmanageable: A Better Way to Manage Storage Storage growth is unending, but there is a way to meet the challenge, without worries about scalability or availability. October 2010 ISILON SYSTEMS
More informationSeagate Instant Secure Erase Deployment Options
Technology Paper Seagate Instant Secure Erase Introduction When hard drives are retired and moved outside the data centre into the hands of others, the data on those drives is put at significant risk.
More informationSECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX
White Paper SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX Abstract This white paper explains the benefits to the extended enterprise of the on-
More informationways to enhance security in AWS ebook
6 ways to enhance security in AWS ebook Contents Introduction 3 Value of the public cloud Challenges for sensitive data in the cloud The AWS shared responsibility model Security at the heart of AWS infrastructure
More informationPhysical Security EMC Storage with ISS SecurOS
Physical Security EMC Storage with ISS SecurOS Version 1.0 Sizing Guide H14192 Copyright 2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes the information in
More informationSecurity Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success
Security Information and Event Management Introduction to envision: The Information Management Platform for Security and Compliance Operations Success Copyright 2008 EMC Corporation. All rights reserved.
More informationSimpliVity OmniStack with Vormetric Transparent Encryption
SimpliVity OmniStack with Vormetric Transparent Encryption Page 1 of 12 Table of Contents Executive Summary... 3 Audience... 3 Solution Overview... 3 Simplivity Introduction... 3 Why Simplivity For Virtualized
More informationCanon imagerunner Hard Disk Drive Data Security Options. Data Encryption and Overwrite
Canon imagerunner Hard Disk Drive Data Security Options Data Encryption and Overwrite Canon imagerunner Hard Disk Drive Data Security Kits Powerful protection for your most important information. Canon
More informationMEEC Webinar Daly and EMC BRS - EMC Backup & Archive Solutions
MEEC Webinar Daly and EMC BRS - EMC Backup & Archive Solutions Accelerating Transformation Presented By: Gabe Sales-Smith Backup & Recovery Specialist EMC Jim Rowland Senior System Architect and Project
More informationTop 10 encryption benefits
Top 10 encryption benefits White Paper Table of Contents 3 Executive overview 3 Benefit #1 Encryption helps you move to the cloud 4 Benefit #2 When you own the keys, you can easily decommission/ deprovision
More informationHow To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
More informationDell PowerVault MD Family. Modular storage. The Dell PowerVault MD storage family
Dell MD Family Modular storage The Dell MD storage family Dell MD Family Simplifying IT The MD Family simplifies IT by optimizing your data storage architecture and ensuring the availability of your data.
More informationPractical Storage Security With Key Management. Russ Fellows, Evaluator Group
Practical Storage Security With Key Management Russ Fellows, Evaluator Group SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies
More informationKeep Your Data Secure in the Cloud Using encryption to ensure your online data is protected from compromise
Protection as a Priority TM Keep Your Data Secure in the Cloud to ensure your online data is protected from compromise Abstract The headlines have been dominated lately with massive data breaches exposing
More informationACHIEVING HIPAA COMPLIANCE WITH POSTGRES PLUS CLOUD DATABASE
ACHIEVING HIPAA COMPLIANCE WITH POSTGRES PLUS CLOUD DATABASE TABLE OF CONTENTS 03 04 04 05 08 INTRODUCTION FUNDAMENTALS OF HIPAA AND HITECH HIPAA-COMPLIANT DATA MANAGEMENT IN THE CLOUD POSTGRES PLUS CLOUD
More information