Securing Your Data at Rest With Encryption
|
|
|
- Holly Wiggins
- 10 years ago
- Views:
Transcription
1 Securing Your Data at Rest With Encryption Session Steve Aaker Sr. Principal Product Strategy Manager
2 Why encryption? Confidential Data Intellectual Property Personally Identifiable Information (PII) Company confidential or private information Why Encryption Regulatory compliance Increasing mobility of sensitive information Protection from Data Breach, Brand Damage, Fines Data Loss Happens Data Security Regulations Payment Card Industry Data Security Standards California Senate Bill 1386
3 Data Loss Happens *Data from Open Security Foundation Data Loss DB, Also see:
4 Records breached 67 % from servers 76 % Breached using weak or stolen credentials Discovered by an 69 % external party 97 % Preventable with basic controls
5 Impact of Security Breaches Direct Losses Customer Data Company Data Loss of Customers Employee Data Digital Assets Fines Indirect Losses Loss of sales/market share Compe11ve Disadvantage Nega1ve Brand Impact Loss of Customer Trust Ongoing Expenses Corrup1on of Data No1fica1on Costs Recovery Costs Con1nuity Costs Legal Exposure Regula1ons Viola1on Execu1ve Liabili1es Disclosure Requirements Lawsuits / SeHlements
6 Data Security Drivers PCI DSS v2.0 October Store cryptographic keys securely in the fewest possible locations and forms Verify that key-management procedures are implemented for periodic key changes And more! Payment Card Industry Data Security Standards (PCI-DSS) 12 requirements to meet security control objectives California Senate Bill 1386 Requires notification to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person 40+ states have adopted similar legislation HIPAA Security Rule and HITECH Act Security Rule requires appropriate safeguards to ensure the confidentiality, integrity, and security of electronic protected health information HITECH Act requires HIPAA covered entities to provide notification following a breach of unsecured protected health information Sarbanes-Oxley, EU Data Protection Directive, Japan s Personal Information Protection Law and many others
7 Would you risk 60% of your business? 20% of people who were notified of a privacy breach involving their data immediately terminated their accounts with the firm suffering the data breach. 40% more were considering termination. * Consumers Report Card on Data Breach Notification, Ponemon Institute LLC
8 Encryption solves the problem Data encryption uses algorithms to transform plaintext into cyphertext, a form that is non-readable to unauthorized parties Customer or regulatory body notification is not required as information is not accessible to unauthorized parties Provides protection from both off-site and on-premise information loss Enables secure shipment of data Supports time-based data expiration and secure data disposal
9 It s All About the Keys Encryption keys determine the functional output of a given encryption algorithm Keys convert the data into cyphertext and are used to convert the data back to a readable form (cleartext) Keys must be strong Randomly and securely generated Securely managed The longer the key length, the more secure the encryption method AES 256 is most secure encryption standard available today Symmetric, block cipher-based method 256 bit key length Lose the keys and you lose the data!
10 Key Management Best Practices Keys must be always available Redundant servers with Backup/recovery Keys must be secure Proper access control: quorum, role-based, separation of duty for administration Hardened solution with FIPS certification Key management system must scale economically Easy-to-use interface with Simple client enrollment & setup Key management system must be openly architected Wide range of environments and client-end points, Standard protocols Key management system must offer auditing/reporting tools Key lifecycle, policy compliance, alerts
11 Data Encryption Models
12 Encryption Key Management Models Key Management Appliance Software-Based Key Manager Definition Dedicated security server / network Application that can be co-hosted with other applications Sample Products Pros Oracle Key Manager (OKM) RSA Key Manager for the Data Center Increased security Dedicated / isolated hardware Resistant to tampering / hacking Performance and availability Simplified deployment NetApp Lifetime Key Manager (LKM) IBM Tivoli Lifetime Key Manager (TLKM) Can be integrated with backup application No hardware investment Cons Dedicated hardware Complex installation and setup Less secure Potential for interoperability issues Risk of CPU resource contention and performance issues
13 Oracle Key Manager 3 (OKM 3) Overview Key management appliance (KMA) Solaris 11 on Netra SPARC T4-1 server Oracle key management software Crypto Accelerator Card (optional) OKM management server OKM management GUI OKM cluster 2 to 20 KMAs, connected via Ethernet network Attach Kits Switches and cabling Encryption end-points Java applications Oracle Database & ZFS Tape drives & libraries Netra SPARC T4-1
14 Oracle Key Manager 3 Simple to Install and Operate Automated, policy-driven system Server, O/S, application neutral Secure Strongest encryption (AES-256) end-to-end Strong key protection mechanisms Conforms to federal security certifications (FIPS) Scales Economically Supports large sites & multiple storage technologies Easily adds more key management appliances, sites and drives as needed
15 FIPS Level 3 Supporting Federal Information Processing Standards (FIPS 140) Level 1 = No security mechanism but uses approved algorithm - Oracle LTO tape drives Level 2 = Temper evident, role-based authentication - Select Oracle StorageTek Enterprise tape drives Level 3 = Tamper detection and response (i.e., zeroizes all cleartext) - SCA 6000 card
16 Tape Drives - Enterprise T10K A, B, C, D & T9840D All drives shipped crypto-ready FIPS Certified T10000D: 8.5TB native capacity, 250MB/s native transfer rate Re-use media from T10000 A, B, and C T9840D: 75GB capacity, 30MB/s transfer rate Re-use media from T9840A/B/C No performance impact with encryption Drive-level compression maintained
17 Tape Drives - Midrange LTO4 800GB capacity, 120MB/s transfer rate OKM communication is supported by interface board mounted on the library tray ( Belisarius or Dionne card) LTO5 1.5TB capacity, 140MB/s transfer rate HP LTO5 has Dionne card built in, IBM LTO5 requires a Belisarius card LTO6 2.5TB capacity, 160MB/s transfer rate HP LTO6 has Dionne card built in, IBM LTO6 requires a Belisarius card No performance impact with encryption; Drive-level compression maintained
18 Separate Key and Data Paths Key communication over dedicated Ethernet port Drive compresses data before encrypting Non-disruptive Coexist with non-encrypting devices No changes/awareness required in storage server and data network Storage server Data Com press OKM Encr ypt Key
19 How OKM Works 1. new tape cartridge is mounted, drive sends 2. a request to create a new encryption key Agent interacts with OKM to generate and retrieve keys on behalf of tape drive 4. drive caches the encryption key until tape unload, encrypts 3. OKM generates and forwards the key data with the key to OKM agent
20 High Level Architecture
21 Mirroring Key, policy and administration changes made in single KMA are automatically propagated to all parts of the cluster Key database is replicated across entire cluster Robust fault tolerance Any KMA can supply keys to any device in its cluster
22 Disaster Recovery Live DR Site Pair of KMAs at DR site included in the production cluster DR site KMAs always have latest copy of all keys
23 Disaster Recovery Backup DR Use DR provider s KMAs, restored from latest backup Avoids dedicated DR KMAs and WAN link
24 Simple Easy to install and set-up Intuitive User Interface and CLI Unattended, policy-driven appliance system Lights-out system No manual intervention required once properly installed No administration required for appliance Fully automated Automatic key generation & retrieval Automatic key replication across cluster Automatic policies and settings replication across cluster Automated event logging
25 Secure Dedicated key management and key transport (service) networks Hardened solution; No other applications, patches/upgrades and/or administration settings to compromise security Conforms to stringent federal security certifications (FIPS level 3) Strong key protection mechanisms Strong encryption (AES-256) end-to-end Role & access control Quorum functionality
26 Scalable Scales economically Supports multiple sites/devices concurrently Tested with up to 2,000 drives and 1,000,000 keys Transparent/non-disruptive growth Add more OKM appliances, sites and drives as needed Flexible management Supports managing multi-site installation from any single location Supports multiple user roles
27 Oracle s Storage Portfolio Data Security is Table Stakes for Long-term Storage Engineered Systems NAS Storage SAN Storage Tape and Virtual Tape SL8500 SL3000 VSM Exadata Exalogic SPARC SuperCluster Big Data Appliance ZFS Storage Appliances 2500-M2 Pillar Axiom 600 LTO T9840 T10K SL150 Cloud Storage Deployment Options: Private, Public, Hybrid Services: IaaS, PaaS, SaaS Consumption Options: Build, Manage, Subscribe Storage Software Storage Management: OEM, ASM, Storage Analytics, CAM, ACSLS, ELS Automated Tiering: Partitions, SAM QFS, Hybrid Storage Pools, VSM Data Reduction: 11g ACO, HCC, RMAN, ZFS Storage Appliance Dedup/Comp Data Protection: Data Guard, RMAN, OSB, ZFS Storage Appliance Snap/Rep, MaxRep Security/Encryption: ASO, Oracle Key Manager, Disk/Tape Encryption
28 Learn More About Storage and Virtual Tape Monday 4:15pm Securing Your Data at Rest With Encryption Steve Aaker, Room 305 (Session 15913) Tuesday 7:00pm Free Wine at the Oracle Booth! 2 8
29 Learn More About Storage and Virtual Tape Wednesday 8:30am Modern Long-Term Data Storage Realities: Tape, Disk, or the Cloud? Kevin Horn, Room 318, Session :00am Announcing Oracle's New StorageTek T10000D Tape Drive Record-Breaking Capacity and Performance to Help You Consolidate, Simplify, and Save Money Kevin Horn, Room 302, Session :15pm Ensure Your Data is Available When You Need It With Proactive Monitoring Steve Aaker, Room 305, Session
30 Learn More About Storage and Virtual Tape Thursday 10:00am How to Ensure Your Disaster Recovery Plan Really Works Damon Clark, Room 405, Session :30pm Revolutionary New Storage Architectures Designed to Meet Mainframe High Availability Requirements Damon Clark, Room 318, Session
31 Thank you!
Optimizing Storage for Oracle ASM with Oracle Flash-Optimized SAN Storage
Optimizing Storage for Oracle ASM with Oracle Flash-Optimized SAN Storage Simon Towers Architect Flash Storage Systems October 02, 2014 Program Agenda 1 2 3 4 5 6 Goals Flash Storage System Environment
Crittografia e Enterprise Key Management una sfida possibile da affrontare
Crittografia e Enterprise Key Management una sfida possibile da affrontare Giuseppe Russo Oracle Chief Technologist [email protected] Simone Mola SafeNet Sales Engineer [email protected]
Optimizing Storage for Better TCO in Oracle Environments. Part 1: Management INFOSTOR. Executive Brief
Optimizing Storage for Better TCO in Oracle Environments INFOSTOR Executive Brief a QuinStreet Excutive Brief. 2012 To the casual observer, and even to business decision makers who don t work in information
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g
Many government agencies are requiring disclosure of security breaches. 32 states have security breach similar legislation
Is it safe? The business impact of data protection. Bruce Master IBM LTO Program Linear Tape-Open, LTO, LTO Logo, Ultrium and Ultrium Logo are trademarks of HP, IBM and Quantum in the US and other countries.
Solutions for Encrypting Data on Tape: Considerations and Best Practices
Solutions for Encrypting Data on Tape: Considerations and Best Practices NOTICE This white paper may contain proprietary information protected by copyright. Information in this white paper is subject to
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures
1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
How To Encrypt Data On A Network With Cisco Storage Media Encryption (Sme) For Disk And Tape (Smine)
Data Sheet Cisco Storage Media Encryption for Disk and Tape Product Overview Cisco Storage Media Encryption (SME) protects data at rest on heterogeneous tape drives, virtual tape libraries (VTLs), and
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
APPENDIX C PRICING INDEX DIR-TSO-2540
Product Category MSRP DIR Customer from MSRP [or Firm Fixed Price] Systems Hardware and Software Global Price List See Note 1 See Note 3 Oracle E-business Component Applications Global Price List Oracle
Thales e-security keyauthority Security-Hardened Appliance with IBM Tivoli Key Lifecycle Manager Support for IBM Storage Devices
> Thales e-security keyauthority Security-Hardened Appliance with IBM Tivoli Key Lifecycle Manager Support for IBM Storage Devices WHITE PAPER November 2011 www.thales-esecurity.com TABLE OF CONTENTS THE
WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY
WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY CONTENTS Storage and Security Demands Continue to Multiply.......................................3 Tape Keeps Pace......................................................................4
Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution
1 Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution Table of Contents What s New? Target Customers Customer Benefits Competitive Positioning Technical Sales Questions General Sales
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland
Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)
Oracle Cloud Computing Strategy
Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The following is intended
Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant
Backup and Recovery Solutions for Exadata Ľubomír Vaňo Principal Sales Consultant Fundamental Backup and Recovery Data doesn t exist in most organizations until the rule of 3 is complete: Different Media
Oracle Maximum Availability Architecture with Exadata Database Machine. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska
Oracle Maximum Availability Architecture with Exadata Database Machine Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska MAA is Oracle s Availability Blueprint Oracle s MAA is a best practices
Alliance AES Encryption for IBM i Solution Brief
Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it
SAN TECHNICAL - DETAILS/ SPECIFICATIONS
SAN TECHNICAL - DETAILS/ SPECIFICATIONS Technical Details / Specifications for 25 -TB Usable capacity SAN Solution Item 1) SAN STORAGE HARDWARE : One No. S.N. Features Description Technical Compliance
High Availability Databases based on Oracle 10g RAC on Linux
High Availability Databases based on Oracle 10g RAC on Linux WLCG Tier2 Tutorials, CERN, June 2006 Luca Canali, CERN IT Outline Goals Architecture of an HA DB Service Deployment at the CERN Physics Database
How Secure Is Your Data Be Safe, or Be Sorry
How Secure Is Your Data Be Safe, or Be Sorry John Szlendak Principal Product Manger Oracle ZFS Storage 29 October, 2015 Copyright 2015, Oracle and/or its affiliates. All rights reserved. Focus on Security
Delivery Method Chart: Replacement Parts and Installation of Integrated Software Updates
Delivery Method Chart: Replacement Parts and Installation of Table of Contents Overview:... 3 Replacement Parts Delivery Method... 3 Delivery Method... 3 Oracle Desktop and Thin Client... 4 Sun Desktop...
SecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
BANKING SECURITY and COMPLIANCE
BANKING SECURITY and COMPLIANCE Cashing In On Banking Security and Compliance With awareness of data breaches at an all-time high, banking institutions are working hard to implement policies and solutions
Oracle Cloud Update November 2, 2015. Eric Frank Oracle Sales Consultant. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
Oracle Cloud Update November 2, 2015 Eric Frank Oracle Sales Consultant Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE. By Libby McTeer
DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE By Libby McTeer CONTENTS ABSTRACT 3 WHAT IS ENCRYPTION? 3 WHY SHOULD I USE ENCRYPTION? 3 ENCRYPTION METHOD OVERVIEW 4 LTO4 ENCRYPTION BASICS 5 ENCRYPTION
An Oracle White Paper September 2011. Oracle Exadata Database Machine - Backup & Recovery Sizing: Tape Backups
An Oracle White Paper September 2011 Oracle Exadata Database Machine - Backup & Recovery Sizing: Tape Backups Table of Contents Introduction... 3 Tape Backup Infrastructure Components... 4 Requirements...
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
UN 4013 V - Virtual Tape Libraries solutions update...
UN 4013 V - Virtual Tape Libraries solutions update... - a Unisys storage partner Key issues when considering virtual tape Connectivity is my platform supported by whom? (for Unisys environments, MCP,
DATA BACKUP & RESTORE
DATA BACKUP & RESTORE Verizon Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable. Offsite backup is
Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description
Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.
How To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5
Cisco MDS 9000 Family Solution for Cloud Storage All enterprises are experiencing data growth. IDC reports that enterprise data stores will grow an average of 40 to 60 percent annually over the next 5
Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets
WHITE PAPER Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Abstract... 3 Introduction... 3 The Solution... 3 The
A Strategic Approach to Enterprise Key Management
Ingrian - Enterprise Key Management. A Strategic Approach to Enterprise Key Management Executive Summary: In response to security threats and regulatory mandates, enterprises have adopted a range of encryption
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
Exam : IBM 000-061. : IBM NEDC Technical Leader. Version : R6.1
Exam : IBM 000-061 Title : IBM NEDC Technical Leader Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products A) Offline Testing engine
<Insert Picture Here> Infrastructure as a Service (IaaS) Cloud Computing for Enterprises
Infrastructure as a Service (IaaS) Cloud Computing for Enterprises Speaker Title The following is intended to outline our general product direction. It is intended for information
EVault Technology Build Cloud-Connected Backup and Recovery Services for Datacenter
EVault Technology Build Cloud-Connected Backup and Recovery Services for Datacenter ROMA 18/09/2013 JUKU UNPLUGGED Antonio Naletto - [email protected] 28/09/13 2012 EVault, Inc. All Rights Reserved
Vodacom Managed Hosted Backups
Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers
Things You Need to Know About Cloud Backup
Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing
Oracle s Cloud Computing Strategy
Oracle s Cloud Computing Strategy Making IT Consumable Richard Garsthagen Director Cloud Business Development EMEA Copyright 2014, Oracle and/or its affiliates. All rights reserved. Trends Driving IT Innovation
An Oracle White Paper March 2014. Integrated High-Performance Disk-to-Disk Backup with the Oracle ZFS Storage ZS3-BA
An Oracle White Paper March 2014 Integrated High-Performance Disk-to-Disk Backup with the Oracle ZFS Storage ZS3-BA Executive Overview... 2 Introduction... 2 Oracle Exadata Backup and Recovery Solution
Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption
Whitepaper What You Need to Know About Infrastructure as a Service (IaaS) Encryption What You Need to Know about IaaS Encryption What You Need to Know About IaaS Encryption Executive Summary In this paper,
STORAGETEK SL150 MODULAR TAPE LIBRARY
STORAGETEK SL150 MODULAR TAPE LIBRARY Oracle s modular tape library is the first scalable tape library designed for growing businesses. Built from Oracle software and StorageTek library technology, it
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
Data Center Op+miza+on
Data Center Op+miza+on Sept 2014 Jitender Sunke VP Applications, ITC Holdings Ajay Arora Sr. Director, Centroid Systems Justin Youngs Principal Architect, Oracle 1 Agenda! Introductions! Oracle VCA An
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Secure Backup and Recovery Whitepaper. Securing Data in Backup and Disaster Recovery Sites with Decru DataFort Appliances
Secure Backup and Recovery Whitepaper Securing Data in Backup and Disaster Recovery Sites with Decru DataFort Appliances September 2005 Introduction... 2 Decru DataFort Storage Security Appliances... 2
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
STORAGETEK VIRTUAL STORAGE MANAGER SYSTEM
STORAGETEK VIRTUAL STORAGE MANAGER SYSTEM KEY BENEFITS BUSINESS RESUMPTION NOW! Manage massive data growth. Support your legacy and growing business applications by dramatically increasing the amount of
Managed Cloud Database Service
Managed Cloud Database Service Transform your Business with Managed Database Cloud On-premise Guru Shashikumar Director, Product Management Oracle Managed Cloud Services October 2014 Agenda 1 2 3 4 Oracle
White Paper: Librestream Security Overview
White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing
Cloud Backup Service Service Description. PRECICOM Cloud Hosted Services
Cloud Backup Service Service Description PRECICOM Cloud Hosted Services Table of Contents Table of Contents 2 1. Cloud Backup Service Service Summary 3 2. Cloud Backup Service Service Definition 4 2.1.
Proposal for Online Backup
Proposal for Online Backup Prepared for: Prepared by: Prepared on: Custom Proposal Prepared for Account Manager KeepItSafe 6922 Hollywood Blvd Los Angeles, CA 90028 Ph. 888 965 9988 [Prospect Name] [Company
Universal Backup Device The Essential Facts of UBD
Information Technology Solution Brief Universal Backup Device The Essential Facts of UBD Fibre Channel Disk to Disk Backup for IBM Power Systems Copyright (c)2014 Electronic Storage Corporation Information
Implementing Offline Digital Video Storage using XenData Software
using XenData Software XenData software manages data tape drives, optionally combined with a tape library, on a Windows Server 2003 platform to create an attractive offline storage solution for professional
An Oracle Technical White Paper October 2011. Oracle Optimized Solution for Oracle Secure Backup
An Oracle Technical White Paper October 2011 Oracle Optimized Solution for Oracle Secure Backup Introduction... 1 Oracle Optimized Solution for Oracle Secure Backup... 2 Architecture Overview... 3 Reference
Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive
Using XenData Software and a Spectra Logic Archive With the Video Edition of XenData Archive Series software on a Windows server and a Spectra Logic T-Series digital archive, broadcast organizations have
EMC BACKUP MEETS BIG DATA
EMC BACKUP MEETS BIG DATA Strategies To Protect Greenplum, Isilon And Teradata Systems 1 Agenda Big Data: Overview, Backup and Recovery EMC Big Data Backup Strategy EMC Backup and Recovery Solutions for
ClearPath Storage Update Data Domain on ClearPath MCP
ClearPath Storage Update Data Domain on ClearPath MCP Ray Blanchette Unisys Storage Portfolio Management Jose Macias Unisys TCIS Engineering September 10, 2013 Agenda VNX Update Customer Challenges and
Oracle Database Backup Service. Secure Backup in the Oracle Cloud
Oracle Database Backup Service Secure Backup in the Oracle Cloud Today s organizations are increasingly adopting cloud-based IT solutions and migrating on-premises workloads to public clouds. The motivation
<Insert Picture Here> Cloud Archive Trends and Challenges PASIG Winter 2012
Cloud Archive Trends and Challenges PASIG Winter 2012 Raymond A. Clarke Enterprise Storage Consultant, Oracle Enterprise Solutions Group How Is PASIG Pronounced? Is it PASIG? Is it
Oracle Cloud Strategy. Sudip Datta Vice President of Product Management
Oracle Cloud Strategy Sudip Datta Vice President of Product Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation
Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office
Data Protection Report 2008 Best Practices in Data Backup & Recovery
Data Protection Report 2008 Best Practices in Data Backup & Recovery Prepared for: Executive Summary Data is growing at an incredible rate. As a result, the demands of data protection increase as well.
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
Protect Data... in the Cloud
QUASICOM Private Cloud Backups with ExaGrid Deduplication Disk Arrays Martin Lui Senior Solution Consultant Quasicom Systems Limited Protect Data...... in the Cloud 1 Mobile Computing Users work with their
Oracle s Cloud Computing Strategy
Oracle s Cloud Computing Strategy Your Strategy, Your Cloud, Your Choice Sandra Cheevers Senior Principal Product Director Cloud Product Marketing Steve Lemme Director, Cloud Builder Specialization Oracle
INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT
INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT UNPRECEDENTED OBSERVABILITY, COST-SAVING PERFORMANCE ACCELERATION, AND SUPERIOR DATA PROTECTION KEY FEATURES Unprecedented observability
Protecting Data at Rest with Vormetric Data Security Expert
V O R M E T R I C W H I T E P A P E R Protecting Data at Rest with Vormetric Data Security Expert Deploying Encryption and Access Control to Protect Stored Data Across the Enterprise Enterprise Information
ABC of Storage Security. M. Granata NetApp System Engineer
ABC of Storage Security M. Granata NetApp System Engineer Encryption Challenges Meet Regulatory Requirements No Performance Impact Ease of Installation Government and industry regulations mandate protection
We look beyond IT. Cloud Offerings
Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking
Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security [email protected]
Cloud Security Case Study Amazon Web Services Ugo Piazzalunga Technical Manager, IT Security [email protected] Agenda 1. Amazon Web Services challenge 2. Virtual Instances and Virtual Storage
An Oracle White Paper November 2010. Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager
An Oracle White Paper November 2010 Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager Introduction...2 Oracle Backup and Recovery Solution Overview...3 Oracle Recovery
CON9488 The Enterprise Cloud Simplified with Oracle VM
CON9488 The Enterprise Cloud Simplified with Oracle VM Andy Herm, Senior Architect, Cloud Infrastructure, Oracle Conor Wentz, Senior Architect, Cloud Infrastructure, Oracle Honglin Su, Sr. Director of
Secure Your Business with EVault Cloud-Connected Solutions
Secure Your Business with EVault Cloud-Connected Solutions Winfried Posthumus Channel Sales Manager NL [email protected] 11/22/2012 2012 EVault, Inc. All Rights Reserved 1 Agenda Who is EVault
