Data At Rest Protection
|
|
|
- Rudolf May
- 10 years ago
- Views:
Transcription
1 Data At Rest Protection Dell Data Protection Encryption Full Volume Encryption Whitepaper October 2011 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF ANY KIND
2 The Dell Data Protection Encryption (DDPE) provides Dell customers with a solution for protecting sensitive data while at rest. Protecting data at rest means the data is protected while residing on storage media attached to or residing in the system. The storage media can be any platform-supported media and is not restricted to the system boot volume. In addition to the system boot volume, examples of storage media for which protection is available include USB, hot-pluggable 1394, esata TM storage and optical drives. Protection is provided by encrypting the data. There are a number of encryption solutions in today s market. Each of them attempts to address the customer problem: self-encrypting hard disk drive (HDD) technology as provided by Seagate Secure and new Trusted Computing Group Opal-compliant encrypted storage technology, which only protect data when stored on the system volume, and encrypted USB devices such as IronKey only protect data when stored on the encrypting USB device. Software solutions bridge some of the gap in recognizing and accommodating different storage technologies, however, software solutions carry an overhead performance penalty, are not easy to use, often do not provide configurability and are not seamless. In addition, software encryption, by design, must expose encryption keys and un-encrypted as well as encrypted data in system memory, thus becoming a potential security target. The Dell Data Protection Encryption Full Volume Encryption (DDPE FVE), a new feature of our encryption solution portfolio helps tackle those issues and consists of five basic parts: A hardware component called an Hardware Encryption Accelerator. Encryption accelerator device driver a WDM device driver interface to the encryption accelerator hardware. A software library layer that handles key management, key blob generation, key binding and provisioning and TPM functionality. Application software that provides the user interface, management and implementation software. The application consists of a local (1 to 1) and a remote (1 to many) management and configuration console for policy definition, encryption implementation and policy enforcement engines. BIOS support supports boot process for initializing the encryption accelerator and TPM prior to booting the system and using the encryption accelerator s capabilities during the boot process. DDPE FVE implements the best features of each technology and avoids the weaknesses. In response to the performance penalty associated with a software solution, the Dell solution implements a hardware offload encryption accelerator that is capable of streaming data in excess of 3.0Gbs. The Hardware Encryption Accelerator provides encryption and hashing flexibility by offering multiple algorithms, strengths and modes. It does not care what the encryption key is or derived from as long as it conforms to the requirements of the algorithm. The accelerator is media agnostic: it does not care where the data comes from or where the data is going. Provide an encryption key, data and a specific algorithm and the accelerator will crypt the data. The accelerator is U.S. Federal Information Processing Standards (FIPS) Level 3 Appendix C compliant. FIPS requires protecting secrets against attack, binding and ownership, encryption key protection and authentication within the hardware module. 2
3 The accelerator module implements the Suite B algorithms consisting of AES 128 and 256, Elliptic Curve Digital Signature Algorithm, SHA-256 and SHA-384. In addition to the Suite B complement, the accelerator also implements AES 192, RSA-2048, SHA-1, SHA-512, and 3DES. Not all of the accelerator s capabilities are utilized in the FVE solution, but by using additional software, these features are available on an as needed basis. The supporting software for DDP E FVE is implemented in a traditional three layer approach. The application layer provides the user interface for configuration, management and information. Application components are also responsible for configuration of Data Leakage Protection (DLP) policies. Default templates and Wizards assume the bulk of the encryption complexity and enable ease of use aspects of encryption technology. Drill-down capabilities are available to users that require specific functionality. The software library abstracts the mechanics of implementing key handling and binding functionality within the application. It also performs key management and local storage, TPM setup, binding and ownership and key load session management for accelerator tasks. Additional functional capabilities within the library assist with user migration and recovery, backup and restoration. These functions enable application software to easily perform these vital functions without being implementation-aware. As part of the initial setup of DDP E FVE, the client-based policy enforcement engine and library create the necessary credential blobs to be migrated/moved or initiates user credentials in migration, restore or recovery sessions. The Hardware Encryption Accelerator device driver is a kernel-mode driver written in compliance with Microsoft s WDM specification. It is architected in such a manner as to minimize kernel mode/user mode transitions when performing requested tasks. The device driver services two interfaces: a kernel-mode interface that is utilized by kernel-mode software used for full volume encryption and a user-mode interface used for on demand application and DLP software. Kernel requests are given priority in order to prevent stalls. Task requests are run to completion at which time the next request is initiated. If a kernel-mode and user-mode request both exist, the kernel request is executed. BIOS provides boot services in support of FVE, local storage for the system volume encryption blob and power-on, pre-operating system authentication. The DDP E FVE Process The DDP E FVE process begins with the decision at the management console to encrypt the system storage drive. The policy is sent to the client for enforcement. In order to protect the encryption key, key blobs are created that bind the key to specific client elements. In the initial state, the TPM and Hardware Encryption Accelerator are un-initialized and unowned. The process begins by initializing and taking ownership of these two vital components. The components can be manually set up or default values will be initiated for ease of use and minimum direct touch. 3
4 After initialization of the system components, the crypt key is bound to the encryption accelerator hardware. The resulting blob is then bound to the platform TPM, producing a doublewrapped key blob. The FVE encryption process encrypts all sectors on the system drive or all sectors except forensic data sectors. The management console enables opt-in to support these forensic data sectors. Therefore, the boot process must be supported within system BIOS. Once the key blob has been created, it is stored in BIOS environment space through an interface designed to support provisioning and releasing the blob within BIOS. This is one-way as BIOS is incapable of releasing a key blob to an external request of any kind. Key blobs can only be deleted or over-written. The only time the key resides in system memory in any form is during this creation process. The next step in the process is to establish user authentication for the boot process and Windows. Authentication support depends on system capabilities, but must originate in the BIOS process. Successful BIOS user authentication releases the key blob to the platform authentication process using the TPM as the platform root of trust. Upon successful TPM authentication of the key blob, it is then instantiated into the encryption accelerator using its FIPS-approved authentication process. If any one of these authentication processes fail, the FVE crypt key is not loaded into the encryption accelerator hardware. All that remains prior to encrypting the system volume is the backup of the key blob and components necessary to support recovery and migration. A backup/recovery package is created containing the necessary components and this package must be stored off of the platform storage. The recovery package can be stored on a USB storage device, network attached storage or other removable media, but it cannot be placed on the system s resident storage. In the IT-managed case, the package is stored in the remote console s key management capability. The system is now ready to begin encrypting the disk. When all basic requirements have been fulfilled, a specific set of information is created on the system hard drive to inform the encryption system components that FVE is enabled and where FVE is within the encryption process. The process can begin immediately or be postponed until a specific time. The encryption process can be suspended if system performance becomes an issue. If suspended, encryption is only done during system idle time. During the initial encryption process, the user is free to power off the platform, enter standby or hibernate the system. The process log keeps track of where the encryption process is, and will resume activity as necessary when powered on. When notified of an impending power cycle, the encryption process is immediately suspended, the log is updated and full attention is given to supporting a rapid power transition. This process, by design, requires very little user or management interaction and happens in the background. 4
5 The FVE Cold Boot Process When BIOS is ready to begin the boot process, BIOS verifies that FVE is enabled and the user has been successfully authenticated. The key blob is retrieved by BIOS-controlled storage and is verified by the TPM and Hardware Encryption Accelerator and, if successful, begins the boot process. Once the key is loaded within the accelerator, a binding session is established between the FVE BIOS support code and the accelerator and the accelerator configuration supporting FVE is locked down. It is only unlocked during a power transition, thereby disabling denial of service attacks by changing the accelerator s configuration or stealing the session. The boot process continues with BIOS examining the available storage devices. When the boot device is determined, the FVE encryption process log is loaded into BIOS. This enables the BIOS FVE support code to know when and when not to decrypt or encrypt blocks as they are read or written to the boot storage device. At the transition from the BIOS to the operating system boot process, an operating system kernel component acquires the session handle from BIOS. The support code is written to allow this hand-off only one time during a power-on session. The appropriate operating system components and BIOS components share the responsibility of saving the encryption session identifier information securely to support resume from standby successfully and seamlessly without user intervention. Resuming from hibernation occurs in a fashion similar to the boot process, although some of the component parts change as required during the creation of the hibernation file and resuming from a hibernated system is handled outside the normal Windows file management system. Migration and Recovery In the event that the platform system board fails, the Encryption Accelerator fails or the user is moved to a new platform and retains the FVE encrypted drive, tools executing within a WinPE environment are available to move the encrypted system drive to a new environment. These tools, with the backup key blob, will restore the environment to a state necessary to support the encrypted drive without having to perform a decrypt/re-provision/re-encrypt process. In order to tear down the system, it is necessary to clear ownership of the TPM, the Encryption Accelerator and power-on authentication. Clearing ownership of the Encryption Accelerator is all that is necessary to clear the active FVE condition. However, there are a finite number of times Encryption Accelerator ownership can be cleared before the Encryption Accelerator is un-usable. It is not necessary to clear Encryption Accelerator ownership to accomplish the goal of disabling the FVE environment. 5
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
Trustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust Dan Griffin DefCon 2013 Time-Bound Keys Announcements New tool: TimedKey.exe New whitepaper: Trusted Tamperproof Time on Mobile
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
ThinkPad USB Portable Secure Hard Drive User Guide
ThinkPad USB Portable Secure Hard Drive User Guide Note Before installing the product, be sure to read the information in Lenovo Limited Warranty on page B-1 and Before you begin the installation on page
BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011
BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011 Purpose To provide a step-by-step procedure for encrypting installed laptop
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Windows BitLocker Drive Encryption Step-by-Step Guide
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
Management of Hardware Passwords in Think PCs.
Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction
YubiKey Integration for Full Disk Encryption
YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012 Introduction Disclaimer yubico Yubico is the leading provider of simple, open online identity protection. The
Windows BitLocker TM Drive Encryption Design Guide
Windows BitLocker TM Drive Encryption Design Guide Microsoft Corporation Published: August 2007 Abstract This document describes the various aspects of planning for deploying Windows BitLocker Drive Encryption
Encrypting with BitLocker for disk volumes under Windows 7
Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1
Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
Dell Client BIOS: Signed Firmware Update
Dell Client BIOS: Signed Firmware Update An Implementation and Deployment Guide to NIST SP800-147 BIOS Protections for Dell Client BIOS Rick Martinez Dell Client BIOS This white paper is for informational
Disk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
How to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
ACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
Windows 7 BitLocker Drive Encryption Security Policy For FIPS 140-2 Validation
Windows 7 BitLocker Security Policy Page 1 of 16 Windows 7 BitLocker Drive Encryption Security Policy For FIPS 140-2 Validation For Windows 7 Document version 1.0 08/31/2011 1. Table of Contents 1. TABLE
BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation
BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker
EMBASSY Remote Administration Server (ERAS) Administrator Manual
EMBASSY Remote Administration Server (ERAS) Administrator Manual Part III BitLocker, Trusted Platform Module, SafeNet ProtectDrive and Dell BIOS & CV Management ERAS Version 2.8 Document Version 1.0.0.20
Using BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
EMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
Opal SSDs Integrated with TPMs
Opal SSDs Integrated with TPMs August 21, 2012 Robert Thibadeau, Ph.D. U.S. Army SSDs Must be Opal s We also Studied using the TPM (Trusted Platform Module) with an Opal SSD (Self-Encrypting Drive) 2 Security
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
XTREMIO DATA AT REST ENCRYPTION
White Paper XTREMIO DATA AT REST ENCRYPTION Abstract Data at Rest Encryption is a mandatory requirement in various industries that host private or sensitive data. This white paper introduces and explains
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
TPM. (Trusted Platform Module) Installation Guide V2.1
TPM (Trusted Platform Module) Installation Guide V2.1 Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM... 6 2.2 Installing
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide
EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide BitLocker Deployment Guide Document Version 0.0.0.5 http://www.wave.com ERAS v 2.8 Wave Systems Corp. 2010 Contents Contents... 2
Cautions When Using BitLocker Drive Encryption on PRIMERGY
Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
SafeGuard Enterprise upgrade guide. Product version: 7
SafeGuard Enterprise upgrade guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6 4.1
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Using Remote Desktop Clients
CYBER SECURITY OPERATIONS CENTRE December 2011 Using Remote Desktop Clients INTRODUCTION 1. Remote access solutions are increasingly being used to access sensitive or classified systems from homes and
SafeGuard Easy upgrade guide. Product version: 7
SafeGuard Easy upgrade guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6 4.1 Upgrade
End User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
2014 IBM Corporation
2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session
1. System Requirements
BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P: 222.333.4444
Working Together Managing and Securing Enterprise Mobility WHITE PAPER Larry Klimczyk Digital Defence P: 222.333.4444 Contents Executive Summary... 3 Introduction... 4 Security Requirements... 5 Authentication...
How Endpoint Encryption Works
WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint
Full Disk Encryption Policy Reference
www.novell.com/documentation Full Disk Encryption Policy Reference ZENworks 11 Support Pack 2 October 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents
Kaspersky Lab s Full Disk Encryption Technology
Kaspersky Lab s Full Disk Encryption Technology In the US alone, an estimated 12,000 laptops are lost or stolen each week. According to the Ponemon Institute, a laptop is stolen every 53 seconds; more
VERITAS NetBackup TM 6.0
VERITAS NetBackup TM 6.0 System Administrator s Guide, Volume II for UNIX and Linux N15258B September 2005 Disclaimer The information contained in this publication is subject to change without notice.
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager LogRhythm 3195 Sterling Circle, Suite 100 Boulder CO, 80301 USA September 17, 2012 Document Version 1.0 Module Version 6.0.4 Page 1 of 23 Copyright
SafeGuard Easy Administrator help. Product version: 6 Document date: February 2012
SafeGuard Easy Administrator help Product version: 6 Document date: February 2012 Contents 1 About Sophos SafeGuard (SafeGuard Easy)...4 2 Getting started...9 3 Installation...16 4 Log on to SafeGuard
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
How to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
UNCLASSIFIED CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION. Version 1.1. Crown Copyright 2011 All Rights Reserved
11590282 CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION Version 1.1 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for software full disk encryption Document History [Publish
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
SafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
This user guide describes features that are common to most models. Some features may not be available on your computer.
RAID User Guide Copyright 2011 Hewlett-Packard Development Company, L.P. Intel is a trademark of Intel Corporation in the U.S. and other countries. Microsoft and Windows are U.S. registered trademarks
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
Using the TPM: Data Protection and Storage
Using the TPM: Data Protection and Storage Ariel Segall [email protected] Day 2 Approved for Public Release: 12-2749. Distribution unlimited License All materials are licensed under a Creative Commons
The Encryption Anywhere Data Protection Platform
The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,
SimplySecure TM Architecture & Security
Technical Whitepaper SimplySecure TM Architecture & Security Specifications, compliance and certification considerations for the IT Professional Rob Weber November 2014 Foreward First-in-class web-managed
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
PowerChute TM Network Shutdown Security Features & Deployment
PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network
SafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002
Security Policy MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS ENCRYPTION DLL CRYPTOGRAPHIC MODULE REV 1.3, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 2 Terms and Definitions...
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
Lifecycle Controller Platform Update/Firmware Update in Dell PowerEdge 12th Generation Servers
Lifecycle Controller Platform Update/Firmware Update in Dell PowerEdge 12th Generation Servers This Dell Technical White Paper provides detailed information about the capabilities of Lifecycle Controller
SECUDE AG. FinallySecure Enterprise Cryptographic Module. FIPS 140-2 Security Policy
SECUDE AG FinallySecure Enterprise Cryptographic Module (SW Version: 1.0) FIPS 140-2 Security Policy Document Version 2.4 04/22/2010 Copyright SECUDE AG, 2010. May be reproduced only in its original entirety
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
Out of Harms Reach -A Whitepaper on Online Backup
Out of Harms Reach -A Whitepaper on Online Backup Introduction: The world is an unpredictable place, one day your data is there, but the second day they aren t, due to viruses, system crash, and human
Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest
Full Disk Encryption Drives & Management Software The Ultimate Security Solution For Data At Rest Agenda Introduction Information Security Challenges Dell Simplifies Security Trusted Drive Technology Seagate
DELL. Unified Server Configurator: IT and Systems Management Overview. A Dell Technical White Paper
DELL A Dell Technical White Paper Unified Server Configurator: IT and Systems Management Overview By Shelli Allgood, Anand Narayanan, Hai Phung, Pritesh Prabhu and Ganesh Viswanathan THIS WHITE PAPER IS
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
HP ProtectTools User Guide
HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
UEFI Implications for Windows Server
presented by UEFI Implications for Windows Server Taipei UEFI Plugfest March 18-22, 2013 Presented by Arie van der Hoeven (Microsoft Corporation) Updated 2011-06-01 Taipei UEFI Plugfest March 2013 www.uefi.org
Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R
Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install
EVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22
EVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22 Copyright SharePoint Backup and Restore Guide 7.22 Revision: This manual has been created for Version 7.22 (June 2013). Software
Security Options... 1
Effective Server Security Options Period: Last 20 week(s) Generated: For: Brian Bartlett [email protected] By: Ecora Auditor Professional 4.5 - Windows Module 4.5.8010.20310 Using: Customized FFR Definition
Managing BitLocker Encryption
Managing BitLocker Encryption WWW.CREDANT.COM Introduction Organizations are facing a data security crisis. Despite decades of investment in security, breaches of sensitive information continue to dominate
SafeGuard Enterprise upgrade guide. Product version: 6.1
SafeGuard Enterprise upgrade guide Product version: 6.1 Document date: February 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6
Library Recovery Center
Library Recovery Center Ever since libraries began storing bibliographic information on magnetic disks back in the 70 s, the challenge of creating useful back-ups and preparing for a disaster recovery
Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities White Paper: Enterprise Security Symantec Backup Exec 11d for Windows Servers Contents Executive
Rights Management Services
www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,
Microsoft Windows Server 2008: Data Protection
Chapter 5 Microsoft Windows Server 2008: Data Protection Solutions in this chapter: BitLocker Active Directory Rights Management Services Authorization Summary Solutions Fast Track Frequently Asked Questions
Managed Portable Security Devices
Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version 2.42. www.northropgrumman.
Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services FIPS Security Policy Version 2.42 www.northropgrumman.com/m5/ SCS Linux Kernel Cryptographic Services Security Policy Version
