Crittografia e Enterprise Key Management una sfida possibile da affrontare
|
|
|
- Gervase Morton
- 10 years ago
- Views:
Transcription
1 <Insert Picture Here> Crittografia e Enterprise Key Management una sfida possibile da affrontare Giuseppe Russo Oracle Chief Technologist [email protected] Simone Mola SafeNet Sales Engineer [email protected]
2 Agenda Encryption, Keys and Enterprise Key Management headache How OASIS Key Management Interoperability Protocol help to solve this problem Some jointly Oracle Security Solutions and Safenet solution KMIP Use Cases for Enterprise Key Management
3 Data Loss Happens *Data from Open Security Foundation Data Loss DB,
4 Impact of Security Breaches $ Damage to corporate brand $ Loss of customers $ Fines $ Lawsuits / Settlements $ Operational costs to address breach
5 Encryption Solves the Problem Data encryption uses algorithms to transform plaintext into cyphertext, a form that is non-readable to unauthorized parties Provides protection from both off-site and on-premise information loss Enables secure shipment of data Supports time-based data expiration and secure data disposal Data Security Regulations around the world ask for encryption of sensitive data
6 It s All About the Keys Encryption keys determine functional output of encryption algorithm Keys convert the data into cyphertext and convert the data back to a readable form (clear text) Keys must be strong Randomly and securely generated Securely managed The longer the key length, the more secure the encryption method AES 256 is most secure encryption standard available today Symmetric, block cipher-based method 256 bit key length Lose the keys and you lose the data!
7 Enterprise Key Management Best Practices Keys must be always available Redundant servers with Backup/recovery Keys must be secure Proper access control: quorum, role-based, separation of duty for administration Hardened solution with FIPS certification Key management system must scale economically Easy-to-use interface with Simple client enrollment & setup Key management system must be openly architected Wide range of environments and client-end points, Standard protocols Key management system must offer auditing/reporting tools Key lifecycle, policy compliance, alerts
8 Headache reasons Enterprise Cryptographic Environments Staging Replica Production Database CRM Portals Enterprise Applications Collaboration & Content Mgmt VPN Systems LAN File Server WAN Disk Arrays ecommerce Applications Backup System Business Analytics Disparate, Often Proprietary Protocols Backup Disk Dev/Test Obfuscation Backup Tape Key Management System Key Management System Key Management System Key Management System Key Management System Key Management System Key Management System Key Management System
9 KMIP source: OASIS Single Protocol Supporting Enterprise Cryptographic Environments Enterprise Cryptographic Environments Staging Replica Collaboration & Portals Production Content Mgmt Database VPN Systems LAN Enterprise CRM Applications File Server WAN Disk Arrays ecommerce Backup System Applications Business Analytics Backup Disk Dev/Test Obfuscation Backup Tape Key Management Interoperability Protocol Enterprise Key Management
10 What is KMIP source: OASIS (Organization for the Advancement of Structured Information Standards) is a not-forprofit consortium that drives the development, convergence and adoption of open standards for the global information society The Key Management Interoperability Protocol (KMIP) enables key lifecycle management. KMIP supports legacy and new encryption applications, supporting symmetric keys, asymmetric keys, digital certificates, and other "shared secrets." KMIP offers developers templates to simplify the development and use of KMIP-enabled applications. KMIP defines the protocol for encryption client and keymanagement server communication. Key lifecycle operations supported include generation, submission, retrieval, and deletion of cryptographic keys. Vendors will deliver KMIP-enabled encryption applications that support communication with compatible KMIP key-management servers.
11 KMIP Objects source: OASIS Objects Certificate, with type and value Symmetric Key, with Key Block Public Key, with Key Block Private Key, with Key Block Split Key, with parts and Key Block Secret Data, with type and Key Block Managed Objects Template and Policy Template: Managed Objects Certificate Symmetric Key Public Key Private Key Split Key Template Policy Template Secret Data Opaque Object Key Block (for keys) or value (for certificates) Template has a subset of Attributes that indicate what an object created from such a template is Policy Template has a subset of Attributes that indicate how an object created from such a template can be used Note that (Policy) Templates have nothing except Attributes: for convenience these Attributes are included in the (Policy) Template structure too. Opaque Object, without Key Block
12 KMIP Operations source: OASIS 26 client-to-server operations defined 2 server-to-client operations defined Generate objects Search and obtain objects Set/get attributes Use the objects Support of optional operations Support for asynchronous responses Create Create Key Pair Register Re-key Derive Key Certify Re-certify Locate Check Get Get Attributes Get Attribute List Add Attribute Modify Attribute Delete Attribute Obtain Lease Get Usage Allocation Activate Revoke Destroy Archive Recover Validate (optional) Query Cancel (optional) Poll (optional) Notify (optional) Put (optional) Server-to-client operations
13 KMIP Attributes source: OASIS 33 Attributes defined Describes what is the object Describes how to use the object Describes other features of the object Unique Identifier Name Object Type Cryptographic Algorithm Cryptographic Length Cryptographic Parameters Cryptographic Domain Parameters Certificate Type Certificate Identifier Certificate Issuer Certificate Subject Digest Operation Policy Name Cryptographic Usage Mask Lease Time Usage Limits State Initial Date Activation Date Process Start Date Protect Stop Date Deactivation Date Destroy Date Compromise Occurrence Date Compromise Date Revocation Reason Archive Date Object Group Link Application Specific ID Contact Information Last Change Date Custom Attribute
14 Request / Response Model source: OASIS Enterprise Key Manager Respons e Header Symmetric Key Unique Identifier Key Value Request Header Get Unique Identifier Name: XYZ SSN: Acct No: 45YT-658 Status: Gold Unencrypted data Encrypting %#*@(*$%%%%#@ Encrypted data Host
15 Authentication source: OASIS Authentication is external to the protocol All servers should support at least SSL/TLS Authentication message field contains the Credential Base Object Client or server certificate in the case of SSL/TLS Host SSL/TLS Enterprise Key *&^%$#&%$#$%*!^ Identity *&^%$#&%$#$%*!^ Identity certificate
16 Use Cases Ecosystem HSM Virtualization & Cloud
17 Ecosystem SAN Brocade SAN switch SafeNet StorageSecure Applications, DB, Files Applications, DB, Files HSM Client Tape Library NetApp Storage Encryption
18 Oracle + SafeNet KMIP Ecosystem Encrypt DB information in a scalabel and secure way Ingredients: Oracle DB Oracle TDE Solaris Operating Systems Solaris Crypto File System SPARC T4 processor SafeNet LUNA PCI-E HSM LUNA EKM Client SafeNet KeySecure
19 Oracle TDE Trasparent Data Encryption part of Oracle's comprehensive portfolio of database security solutions helps organizations comply with privacy and regulatory mandates TDE transparently encrypt all application data or specific sensitive columns, such as credit cards, social security numbers, or personally identifiable information
20 Keys used for Oracle Transparent Data Encryption
21 Places to Store the Master Key Oracle Wallet This is the default Stores Masterkey and Certificates in a file in your filesystem Required software is part of Oracle software distribution Hardware Security Modules (HSM) Specialized hardware device External or internal to server Might be FIPS certified and tamper proof Required software supplied by Vendor Master Key Hardware Security Module
22 Solaris Cryptographic Framework is an architecture that enables applications in the Oracle Solaris operating system to use or provide cryptographic services interactions with the framework are based on the RSA PKCS#11 Cryptographic Token Interface (Cryptoki)
23 Solaris Cryptographic Framework
24 Oracle SPARC T4 Processor 18 On Chip Crypto functions Balanced high-bandwidth interfaces and internals 3.0 GHz Out of Order Execution 2 On Chip 10 GbE Networking Dynamic Threading 8 Cores, 64 Threads Co-engineered with Oracle software 2 On Chip Dual-Channel DDR3 Memory Controllers 2 On Chip x8 PCIe gen2 I/O Interfaces
25 Oracle + SafeNet KMIP Ecosystem
26 Monitoring & Remote Foundry Monitor HSM key activity throughout the enterprise, or one or more business units View key status on demand Monitor for Key Creations, Key Deletions and Key Modifications KeySecure logs events such that an Enterprise can act on events if desired Reports changes in attributes, key creations, deletions Logging/audit of key activity for compliance Increased security KeySecure controls key creation and deletion - keys in HSM Keys are created in HSMs - KeySecure appliance does not create keys KeySecure is used to set the key attributes
27 Virtualization & Cloud Tape Drives Brocade SAN switch On Premise Centralized key management for persistence and flexibility On-premise key vault extends trust to the cloud Secure key creation, storage and vault Key archiving and shredding Protect App, ProtectDB, ProtectFile
28 With the [ServiceMesh] Agility Platform, customers can achieve breakthroughs in the flexibility, responsiveness, and affordability of their IT operating model. Core to delivering these benefits is the requirement to secure an organization s sensitive assets across networks, data, users, and machine instances. We re pleased to leverage enterprise-grade solutions like KeySecure for securing and administering cryptographic keys, which is integral to the overall security solution we provide to our enterprise clients. Frank Martinez, CTO
29 SafeNet ProtectV On Premise Centralized key management for persistence and flexibility On-premise key vault extends trust to the cloud Secure key creation, storage and vault Key archiving and shredding
30 What Customers are Looking For in Enterprise Key Management Heterogeneous key lifecycle management solution Single, centralized solution for all cryptographic keys Centrally manage key attributes, state changes and key provisioning Highly scalable to manage millions of heterogeneous keys Open standards-based, enterprise key management Supports Key Management Interoperable Protocol (KMIP) to manage a large number of encryption solutions and vendors Root of trust for physical, virtual, and cloud-based environments High assurance and robustness Appliance-based, tamper-proof hardware (k460) with a hardened OS FIPS level 3 (in process) Hardware key storage
31 SafeNet KeySecure Enterprise Key Lifecycle Management Centrally managed, consolidation of keys store, manage, generate, distribute, rotate, backup, activate, deactivate, and destroy Up to 1 million keys per cluster High Assurance Level Standard based approach OASIS KMIP Broadest Coverage in Industry NAS StorageSecure SAN - Brocade Encryption Solutions (BES and FS8/18) KMIP support (NSE/FDE, Tape Library and other 3 rd Party support) Cloud-enabled (KMIP-based) SafeNet LUNA SA (HSM) and PCI Card Management Hardware- based,secure key replication across multiple appliances Active-Active mode of clustering Geo distribution support Highly scalable for cloud implementations LDAP/Active Directory Integration and Syslog forwarding Heterogeneous solutions: SFNT and non- SFNT devices, applications, databases, storage devices, SAN switches, tape libraries, HSM, network and endpoint devices, etc.
32 Questions?
Key Management Interoperability Protocol (KMIP)
www.oasis-open.org Management Interoperability Protocol (KMIP) Storage Developer s Introduction SNIA Fall 2009 Gordon Arnold, [email protected] Chair, Storage Security Industry Forum 1 2009 Insert Copyright
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
FAMILY BROCHURE Sensitive data is everywhere. So are we.
WHERE IS YOUR DATA? WHERE ARE YOUR KEYS? Structured Data Unstructured Data Live Data 1 Site-to-site Virtualized Data 2 Stored & Archived Data 3 Key Management and Root of Trust 4 SaaS Apps Access WHO AND
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g
Key Management Best Practices
White Paper Key Management Best Practices Data encryption is a fundamental component of strategies to address security threats and satisfy regulatory mandates. While encryption is not in itself difficult
Securing Your Data at Rest With Encryption
Securing Your Data at Rest With Encryption Session 15913 Steve Aaker Sr. Principal Product Strategy Manager Why encryption? Confidential Data Intellectual Property Personally Identifiable Information (PII)
KeySecure CUSTOMER RELEASE NOTES. Contents. Version: 8.1.0 Issue Date: 2 February 2015 Document Part Number: 007-012896-001, Rev A.
KeySecure CUSTOMER RELEASE NOTES Version: 8.1.0 Issue Date: 2 February 2015 Document Part Number: 007-012896-001, Rev A Contents Product Description... 3 Key Management... 3 High Performance... 3 Broad
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
ABC of Storage Security. M. Granata NetApp System Engineer
ABC of Storage Security M. Granata NetApp System Engineer Encryption Challenges Meet Regulatory Requirements No Performance Impact Ease of Installation Government and industry regulations mandate protection
Microsoft SQL Server Integration Guide
Microsoft SQL Server Integration Guide Document Information Document Part Number 007-011108-001 (Rev J) Release Date August 2013 Trademarks All intellectual property is protected by copyright. All trademarks
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS)
Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS) How Financial Institutions Can Comply to Data Security Best Practices Vormetric, Inc. 2545 N. 1st Street,
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
How To Encrypt Data On A Network With Cisco Storage Media Encryption (Sme) For Disk And Tape (Smine)
Data Sheet Cisco Storage Media Encryption for Disk and Tape Product Overview Cisco Storage Media Encryption (SME) protects data at rest on heterogeneous tape drives, virtual tape libraries (VTLs), and
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
Compliance for the Road Ahead
THE DATA PROTECTION COMPANY CENTRAL CONTROL A NTROL RBAC UNIVERSAL DATA PROTECTION POLICY ENTERPRISE KEY DIAGRAM MANAGEMENT SECURE KEY STORAGE ENCRYPTION SERVICES LOGGING AUDITING Compliance for the Road
PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.
PLATFORM ENCRYPTlON ARCHlTECTURE How to protect sensitive data without locking up business functionality. 1 Contents 03 The need for encryption Balancing data security with business needs Principles and
Vormetric Encryption Architecture Overview
Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls and Auditing Vormetric, Inc. 2545 N. 1st Street, San Jose, CA 95131 United States: 888.267.3732
Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security [email protected]
Cloud Security Case Study Amazon Web Services Ugo Piazzalunga Technical Manager, IT Security [email protected] Agenda 1. Amazon Web Services challenge 2. Virtual Instances and Virtual Storage
A Strategic Approach to Enterprise Key Management
Ingrian - Enterprise Key Management. A Strategic Approach to Enterprise Key Management Executive Summary: In response to security threats and regulatory mandates, enterprises have adopted a range of encryption
Encrypting Data at Rest
Encrypting Data at Rest Ken Beer Ryan Holland November 2014 Contents Contents Abstract Introduction The Key to Encryption: Who Controls the Keys? Model A: You control the encryption method and the entire
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective
Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective Futurex. An Innovative Leader in Encryption Solutions. For over 30 years, more than 15,000 customers worldwide
Solutions for Encrypting Data on Tape: Considerations and Best Practices
Solutions for Encrypting Data on Tape: Considerations and Best Practices NOTICE This white paper may contain proprietary information protected by copyright. Information in this white paper is subject to
Alliance Key Manager Cloud HSM Frequently Asked Questions
Key Management Alliance Key Manager Cloud HSM Frequently Asked Questions FAQ INDEX This document contains a collection of the answers to the most common questions people ask about Alliance Key Manager
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
ways to enhance security in AWS ebook
9 ways to enhance security in AWS ebook Contents Data security, encryption, and the cloud 3 Value of the public cloud... 3 Securing sensitive data in the cloud... 4 Don t just play it safe keep it safe...
All Things Oracle Database Encryption
All Things Oracle Database Encryption January 21, 2016 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda Database Encryption
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
EMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT IS THIS ebook RIGHT FOR ME? Not sure if this is the right ebook for you? Check the following qualifications to make
ways to enhance security in AWS ebook
6 ways to enhance security in AWS ebook Contents Introduction 3 Value of the public cloud Challenges for sensitive data in the cloud The AWS shared responsibility model Security at the heart of AWS infrastructure
Key Management in the Multi-Platform Environment
White Paper 0x8c1a3291 0x56de5791 0x450a0ad2 axd8c447ae 8820572 0x5f8a153d 0x19df c2fe97 0xd61b5228 0xf32 4856 0x3fe63453 0xa3bdff82 0x30e571cf 0x36e0045b 0xad22db6a 0x100daa87 0x48df 0x5ef8189b 0x255ba12
KeySecure User Guide KEYSECURE USER GUIDE 1
KeySecure User Guide KEYSECURE USER GUIDE 1 Software Version: 7.1 Documentation Version: 20131014 Part Number: 007-012362-001 (Rev A) 2013 SafeNet, Inc. All rights reserved Preface All intellectual property
Transparent Data Encryption: New Technologies and Best Practices for Database Encryption
Sponsored by Oracle : New Technologies and Best Practices for Database Encryption A SANS Whitepaper April 2010 Written by Tanya Baccam, SANS senior instructor and course author for SEC509: Oracle Database
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM Note: Before you use this
Making Data Security The Foundation Of Your Virtualization Infrastructure
Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges
Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage
Clodoaldo Barrera Chief Technical Strategist IBM System Storage Making a successful transition to Software Defined Storage Open Server Summit Santa Clara Nov 2014 Data at the core of everything Data is
RSA Digital Certificate Solution
RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong
How To Protect Your Data From Harm With Safenet
SafeNet Information Security Government Solutions Disk & File Encryption Database & Application Encryption Network & WAN Encryption Identity & Access Management Application & Transaction Security Information
Overview of Luna High Availability and Load Balancing
SafeNet HSM TECHNICAL NOTE Overview of Luna High Availability and Load Balancing Contents Introduction... 2 Overview... 2 High Availability... 3 Load Balancing... 4 Failover... 5 Recovery... 5 Standby
Securing Data at Rest with Encryption
Securing Data at Rest with Encryption Ken Beer and Ryan Holland November 2013 (Please consult http://aws.amazon.com/whitepapers for the latest version of this whitepaper) Page 1 of 15 Abstract Organizational
Encrypt Your Cloud. Davi Ottenheimer flyingpenguin. Session Classification: Advanced
Encrypt Your Cloud Davi Ottenheimer flyingpenguin Session ID: DAS-210 Session Classification: Advanced AGENDA Introduction Cryptography Keys in Clouds Examples Introduction 3 FLYINGPENGUIN flying \fly"ing\,
Secure the AWS Cloud with SafeNet Solutions ebook GEMALTO.COM
Secure the AWS Cloud with SafeNet Solutions ebook GEMALTO.COM Table of Contents Value of the public cloud...3 Securing sensitive data in the cloud...4 Don t just play it safe keep it safe...5 Data security
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Hitachi Virtual Storage Platform Family: Security Overview. By Hitachi Data Systems
Hitachi Virtual Storage Platform Family: Security Overview By Hitachi Data Systems April 2015 Contents Executive Summary... 3 Hitachi Virtual Storage Platform G1000 Security Components... 4 Privileged
SafeNet Securing Microsoft Solutions
SafeNet Securing Microsoft Solutions SafeNet and Microsoft work closely to enhance the security of Microsoft solutions. The Microsoft on Windows provides customizable services for creating and managing
Technical Brief: Virtualization
Technical Brief: Virtualization Technology Overview Tempered Networks automates connectivity and network security for distributed devices over trusted and untrusted network infrastructure. The Tempered
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
How To Encrypt Data On Netapp On A Server On A Microsoft Flash On A Flash Ona2 On A Mini Hard Drive On A Network On A Hard Drive (Flash) On A Computer Or Hard Drive With A Harddrive (Flash On
Integrated Security Protection with NetApp and Safenet Bagus Dewantara Senior System Engineer Agenda Why Storage Encryption? NetApp Storage Encryption (NSE) Solution SafeNet StorageSecure as for Heterogeneous
Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description
Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.
Securing Data in the Cloud
Securing Data in the Cloud Meeting the Challenges of Data Encryption and Key Management for Business-Critical Applications 1 Contents Protecting Data in the Cloud: Executive Summary.....................................................
Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan
The Truth about Data Loss Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors
An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation
Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Oracle SPARC Server for Enterprise Computing Dr. Heiner Bauch Senior Account Architect 19. April 2013 2 The following is intended to outline our general product direction. It is intended for information
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
Protecting Data at Rest with Vormetric Data Security Expert
V O R M E T R I C W H I T E P A P E R Protecting Data at Rest with Vormetric Data Security Expert Deploying Encryption and Access Control to Protect Stored Data Across the Enterprise Enterprise Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
How To Use Aws.Com
Crypto-Options on AWS Bertram Dorn Specialized Solutions Architect Security/Compliance Network/Databases Amazon Web Services Germany GmbH Amazon.com, Inc. and its affiliates. All rights reserved. Agenda
Encryption Key Management for Microsoft SQL Server 2008/2014
White Paper 0x8c1a3291 0x56de5791 0x450a0ad2 axd8c447ae 8820572 0x5f8a153d 0x19df c2fe97 0xd61b5228 0xf32 4856 0x3fe63453 0xa3bdff82 0x30e571cf 0x36e0045b 0xad22db6a 0x100daa87 0x48df 0x5ef8189b 0x255ba12
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Solutions for securing and auditing Oracle database Edgars Ruņģis Technology Consultant Why Are Databases Vulnerable? 80% of IT Security Programs Don t Address Database Security Forrester Research Enterprises
Securing Your Sensitive Data with EKM & TDE. on SQL Server 2008/2012
Securing Your Sensitive Data with EKM & TDE on SQL Server 2008/2012 About The Speaker Founder & CEO of Townsend Security Leading data security expert 30 years IT industry experience Introduction Organizations
IBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform:
Creating an Integrated, Optimized, and Secure Enterprise Data Platform: IBM PureData System for Transactions with SafeNet s ProtectDB and DataSecure Table of contents 1. Data, Data, Everywhere... 3 2.
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Certificate Management
Certificate Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
PrivateServer HSM EKM Provider for Microsoft SQL Server
PrivateServer HSM EKM Provider for Microsoft SQL Server January 2014 Document Version 1.1 Notice The information provided in this document is the sole property of Algorithmic Research Ltd. No part of this
Data-Centric security and HP NonStop-centric ecosystems. Andrew Price, XYPRO Technology Corporation Mark Bower, Voltage Security
Title Data-Centric security and HP NonStop-centric ecosystems A breakthrough strategy for neutralizing sensitive data against advanced threats and attacks Andrew Price, XYPRO Technology Corporation Mark
EMC VMAX3 DATA AT REST ENCRYPTION
EMC VMAX3 DATA AT REST ENCRYPTION ABSTRACT In the interconnected world, data and intellectual property is the highest value currency which can be held by corporations. From recent newsworthy examples,
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this
Microsoft Windows Server 2008 PKI and Deploying the ncipher Hardware Security Module
This is a joint ncipher and IdentIT authored whitepaper Microsoft Windows Server 2008 PKI and Deploying the ncipher Hardware Security Module Abstract This paper discusses the benefits that are unique to
<Insert Picture Here> Infrastructure as a Service (IaaS) Cloud Computing for Enterprises
Infrastructure as a Service (IaaS) Cloud Computing for Enterprises Speaker Title The following is intended to outline our general product direction. It is intended for information
An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance
An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy
Key Management Issues in the Cloud Infrastructure
Key Management Issues in the Cloud Infrastructure Dr. R. Chandramouli (Mouli) [email protected] Dr. Michaela Iorga [email protected] (Information Technology Lab, NIST, USA) ARO Workshop on Cloud Computing
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software
Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this is the lifeblood
CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:
CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification
<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures
1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage
SafeNet security enhancements for IBM solutions
SafeNet security enhancements for IBM solutions Contents Introduction 3 The Role of Security in Modern Business 3 IBM s Best Practices for Data Security 3 SafeNet solutions and IBM validation programs
