Data at Rest & Data in Motion. Mark Baldwin

Size: px
Start display at page:

Download "Data at Rest & Data in Motion. Mark Baldwin"

Transcription

1 Data at Rest & Data in Motion Mark Baldwin

2 SafeNet Protects Sensitive Data SafeNet provides the only end-to-end enterprise data protection solution that secures data at rest, data in motion, as well as data in use - across application, device, network, and database layers.

3 SafeNet DataSecure Solution Enterprise Encryption and Key Management Remote Location SafeNet EdgeSecure Laptop/ Device Web Servers Databases Application z/os Servers Mainframes File Servers Storage/ Tape SafeNet DataSecure Data Center

4 DataSecure Solution DataSecure Appliance High-performance encryption Integrated management interfaces Hardened Linux appliance FIPS and Common Criteria certified Connector Software Connects DataSecure capabilities to applications, databases, file servers Load balancing, health checking, connection pooling, SSL

5 Benefits of SafeNet DataSecure Security Performance Flexibility Manageability Availability Hardware-based, centralized key and policy management FIPS/CC certified solution Authentication and authorization High performance encryption offload, over 100K TPS Batch processing for massive amounts of data Efficient backup/restore capabilities, local encryption option Support for heterogeneous environments (app, db, file) Support for open standards and APIs Range of enterprise deployment models Intuitive, easy-to-use administration Separation of duties Centralized policy management Enterprise clustering and replication Load balancing, health checking, and failover Geographically distributed redundancy

6 Centralized Enforcement Security Security administrators control data protection policy Keys created and stored in a single location Dual Administrative Control Separation of Duties Logging, Auditing and Alerts FIPS & Common Criteria Certified Solution FIPS Level 2 & CC EAL2 Certified Keys stored separately from sensitive data AES, 3DES, RSA and others Built-in Certificate Authority Authentication & Authorization Multi-factor system-to-system authentication and access control Granular, key-based, cryptographic policy Support for LDAP

7 Encryption Offload Optimized, high-performance hardware Frees up database and application servers Latency less than 300 microseconds per request Local Encryption Option Configurable for hardware offload or local encryption Batch Processing Perform batch encrypts/decrypts for high performance More than 100k TPS Batch tools include: Transform Utility ICAPI Easy integration into existing applications Performance

8 Flexibility Heterogeneous Environments Comprehensive enterprise solution Web, Application, Database, Mainframe or File Server Data Center or Distributed Environments Open Standards-based APIs, cryptographic protocols Scalability Models with capacity from 2,500 TPS to 100,000 TPS Clustering further increases capacity and redundancy Licensing structure enables cost-effective build-out

9 Intuitive Administration Graphical and command line interfaces Point-and-click policy management Encryption rights management Key management Network and system management Simple configuration, analogous to a switch or router Separation of Duties Security administrators administer security Maximize productivity, minimize liability Extensible Management Platform Cohesive, consistent elements across the enterprise Common management protocols, processes Standard implementation, integration methodology Manageability

10 Availability Boulder (US Operations) DataSecure Cluster Clustering Keys and policy are shared/replicated among DataSecures in a global cluster Load Balancing Connector software can load balance across a group of appliances Multi-tier load balancing enables transparent fail over to alternate appliance(s) Hong Kong (Asia-Pacific)

11 Database Integration Customer Database SafeNet DataSecure Database Connectors Oracle 8i, 9i, 10g, 11g IBM DB2 version 8, 9 Microsoft SQL Server 2000, 2005, 2008 Teradata Application changes not required Batch processing tools for managing large data sets

12 Application Integration E-Commerce Application Customer Database Reporting Application Application Connectors Microsoft.NET, CAPI JCE (Java) PKCS#11 (C/C++) SafeNet ICAPI (C/C++) z/os (Cobol, Assembler, etc.) XML Support for virtually all application and web server environments SafeNet DataSecure

13 File System Integration File Server SafeNet DataSecure File System Connectors Windows Server 2003 Linux File Encryption Keys (FEKs) protect files on disk FEKs are encrypted with a Key Encryption Key (KEK) that resides on the DataSecure appliance Policy configured on DataSecure and sent to file server

14 DataSecure Appliances Use Case Scenarios i10 EdgeSecure Remote Locations/ Distributed Environments i116 DataSecure Low-End Appliance i430 DataSecure High-End Appliance Performance (TPS) 2,500 11, ,000 Form Factor 11.6 x 10.3 x 2.5 1U, rackmountable 1U, rackmountable (w, d, h) Network Ethernet Interfaces One: 10/100 One: 10/100 Two: 10/100/1000 Power Supplies/ Redundancy One PS One PS Two PS, two fans, two disks (RAID1) FIPS and CC no yes yes

15 Database Encryption Process (slide 1 of 8) Step 1: Identify what data you want to secure and where that data resides. CUSTOMER Name Account SSN Address City Irwin M. Fletcher Main Street Santa Barbara Josh Ritter st Ave San Francisco Steve Garvey First Ave Brentwood CUSTOMER Table Structure Column Name Data Type Length Name VARCHAR 60 SSN CHAR 9 Address VARCHAR 75 SSN_NEW VARBINARY 16

16 Database Encryption Process (slide 2 of 8) Step 2: Alter table to add columns CUSTOMER Name Account SSN Address City SSN_NEW Irwin M. Fletcher Main Street Santa Barbara Josh Ritter st Ave San Francisco Steve Garvey First Ave Brentwood CUSTOMER Table Structure Column Name Data Type Length Name VARCHAR 60 SSN CHAR 9 Address VARCHAR 75 SSN_NEW VARBINARY 16

17 Database Encryption Process (slide 3 of 8) Step 3: Migrate, encrypt data CUSTOMER Name Account SSN Address City SSN_NEW Irwin M. Fletcher Main Street Santa Barbara 0xEED95DB Josh Ritter st Ave San 0x21010B370F8752D5 Francisco Steve Garvey First Ave Brentwood 0xC5187FC3A3286B7F CUSTOMER Table Structure Column Name Data Type Length Name VARCHAR 60 SSN CHAR 9 Address VARCHAR 75 SSN_NEW VARBINARY 16 SafeNet DataSecure Appliance

18 Database Encryption Process (slide 4 of 8) Step 4: Null the original cleartext data CUSTOMER Name Account SSN Address City SSN_NEW Irwin M. Fletcher NULL 411 Main Street Santa Barbara 0xEED95DB Josh Ritter NULL st Ave San 0x21010B370F8752D5 Francisco Steve Garvey NULL 123 First Ave Brentwood 0xC5187FC3A3286B7F CUSTOMER Table Structure Column Name Data Type Length Name VARCHAR 60 SSN CHAR 9 Address VARCHAR 75 SSN_NEW VARBINARY 16 SafeNet DataSecure Appliance

19 Database Encryption Process (slide 5 of 8) Sensitive data is now stored in encrypted format. Application integration can be completed with no further database changes, or CUSTOMER Name Account SSN Address City SSN_NEW Irwin M. Fletcher NULL 411 Main Street Santa Barbara Josh Ritter NULL st Ave San Francisco 0xEED95DB x21010B370F8752D5 Steve Garvey NULL 123 First Ave Brentwood 0xC5187FC3A3286B7F

20 Database Encryption Process (slide 6 of 8) Step 5: Implement database integration: Rename database, create views, triggers and stored procedures to automate updates and inserts CUSTOMER (View) Name Account SSN Address City Irwin M. Fletcher Main Street Santa Barbara Josh Ritter st Ave San Francisco Steve Garvey First Ave Brentwood CUSTOMER CUSTOMER_NEW Dynamic Encryption and Decryption of Data via Triggers and Views Name Account SSN Address City SSN_NEW Irwin Name M Account NULL SSN 411 Address Main Santa City 0xEED95DB SSN_NEW Fletcher Irwin M NULL Street 411 Main Barbara Santa 0xEED95DB Josh Fletcher Ritter NULL 1801 Street 21 st Ave San Barbara 0x21010B370F8752D5 Josh Ritter NULL st AveFrancisco San 0x21010B370F8752D5 Steve Garvey NULL 123 First Ave Brentwood Francisco 0xC5187FC3A3286B7F Steve Garvey NULL 123 First Ave Brentwood 0xC5187FC3A3286B7F

21 Application and Database Encryption Process (Slide 7 of 8) Subsequent updates and inserts preserve data privacy CUSTOMER (View) Name Account SSN Update Trigger Address City Irwin M. Fletcher Main Street Santa Barbara Josh Ritter st Ave San Francisco Steve Garvey First Ave Brentwood CUSTOMER_NEW Name Account SSN Address City SSN_NEW Irwin M. Fletcher NULL 411 Main Street Santa Barbara 0x5FC09A148B Josh Ritter NULL st Ave San Francisco 0x21010B370F8752D5 Steve Garvey NULL 123 First Ave Brentwood 0xC5187FC3A3286B7F

22 Application and Database Encryption Process (Slide 8 of 8) Subsequent updates and inserts preserve data privacy CUSTOMER (View) Name Account SSN Update Address Trigger City Irwin M. Fletcher Main Street Santa Barbara Josh Ritter st Ave San Francisco Steve Garvey First Ave Insert Brentwood Trigger Henry Baker Convention Gilroy CUSTOMER_NEW Name Account SSN Address City SSN_NEW Irwin M. Fletcher NULL 411 Main Street Santa Barbara 0x5FC09A148B Josh Ritter NULL st Ave San Francisco 0x21010B370F8752D5 Steve Garvey NULL 123 First Ave Brentwood 0xC5187FC3A3286B7F Henry Baker NULL 787 Convention San Francisco 0xF5253HU4A4657C3P

23 Encrypting Structured Data Three options: Database Encryption and decryption are initiated from the DB using Ingrian views and triggers Makes use of DB Connector Application Encryption and decryption are initiated from the application Makes use of Application Connector Hybrid Crypto operations are initiated from both the DB and the App Makes use of both DB and Application Connectors

24 Database Connector installed on Database Server (Oracle/MSSQL/DB2) User Tom WebServer Application Server query Response Database - field encrypted with Key x User Bob X3%R7!>W Tom can access Key x, Bob cannot x Datasecure

25 DB Integration Pros Theoretically very easy Can be done from the GUI No need to modify applications Cons Lower performance (2,000 Op/s max) Maintenance is more difficult No range queries Might cause problems for OTS applications

26 Application Connector installed on Application Server (PKCS#11/MS/Java/ICAPI/XML) User Tom WebServer Application Server query Response X3%R7!>W Database - field encrypted with Key x User Bob X3%R7!>W x Datasecure Tom can access Key x, Bob cannot

27 App Integration Pros Very easy 20 lines of code required High performance (can multi-thread apps) Less maintenance required Less risk of injury More secure than DB integration Cons You have to modify all your apps Might not have access to source code App Integration is the preferred method!

28 Application Integration, JCE Example 1 // Create NAE session 2 NAESession session = NAESession.getSession("username","password ); // Retrieve secret key IvParameterSpec iv = new IvParameterSpec(); SecretKey key = NAEKey.getSecretKey("AESKey", session); // Create cipher instance Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding, "IngrianProvider"); byte[ ] buffer = new byte [8192]; Outputstream os = new outputstream; cipher.init(cipher.encrypt_mode, key, iv); // Use the cipher instance to encrypt the input stream int readbytes; while ((readbytes = is.read(buffer)) >= 0) { byte[ ] result = cipher.update(buffer, 0, readbytes); if (result!= null) { // Write the encrypted string to output stream os.write(result); } } os.write(cipher.dofinal()); os.flush();

29 Application Integration, C# Code Example // Create NAE session NAESession session = new NAESession( username, password ); // Retrieve secret key SymmetricAlgorithm key = (Rijndael)session.GetKey( AESkey ); // Set the initialization vector, padding, and mode byte[ ] iv = { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5 }; key.iv = iv; key.padding = PaddingMode.PKCS5; key.mode = CipherMode.CBC; // Read in data to encrypt UTF8Encoding utf8 = new UTF8Encoding(); byte[ ] inputbytes = utf8.getbytes( String_To_Encrypt ); System.IO.MemoryStream memstr = new System.IO.MemoryStream(); // Create a crypto stream and encrypt data CryptoStream encrstr = new CryptoStream(memstr, key.createencryptor(), CryptoStreamMode.Write); encrstr.write(inputbytes, 0, inputbytes.length); encrstr.close(); byte[ ] encrbytes = memstr.toarray(); // Create encrypted string String m_encryptedstring = Convert.ToBase64String(encrBytes);

30 File Encryption Process Encryption Polices and KEKs are sent to File Server and stored in memory. File Encryption Keys (FEKs) are generated at the File Server and used to encrypt files. FEKs are encrypted using the KEK before they are sent to disk. File Header Individual File #1 in Cleartext format Original File File Servers 2) Encrypt File Encryption Key with Key Encryption Key 1)Encrypt cleartext data with File Encryption Key 7ndfhe34sherkjysu File Header sdfsdff wret345fbcfdsgfmhityur6c Encrypted File SafeNet DataSecure Policies are created at the DataSecure. A Key Encryption Key (KEK) is created for each directory.

31 Conclusion DataSecure Solution Secure, appliance-based solution for encryption and key management Provides high performance cryptographic offload Supports web, application, database and file server environments Centralizes management and enforces control of enterprise data protection policy Scales globally while ensuring high availability

32 ProtectDrive Industry-Leading Hard Drive encryption solution SC Magazine 5 Stars in all Categories Customer Deployments for 1000 s of Laptops 100% hard drive encryption by partition or full hard drive (all data encrypted - registry, temp files, etc) Encryption at physical drive level Pre Boot Server version for RAID Strong encryption algorithm - AES-256 Pre-boot Authentication (PBA) using Microsoft logon credentials Single Sign On Logon by Password, OR Logon by Digital Certificate with Strong two-factor authentication (USB tokens, smart cards) Support for Windows 2000 / XP / 2003 / Vista Microsoft Active Directory-based central administration for easy network deployment and management no separate management console required Port and Device Control Removable media encryption USB flash drives, and External Hard Drives FIPS-certified encryption functions EAL4 Common Criteria certification in process Strong Key Recovery and Emergency Login procedures

33 WAN Encryption devices FIPS and CC Certification Physically tamper-proof Minimal latency (typical < 10 microseconds) Point to Multipoint connection capability (not Link) Each connection uses unique AES256 symmetric key (changed every hour) Connections can be set to Encrypt, Bypass or Discard Zero Overhead data payload only encrypted For each type, there are different models to suit different bandwidths (capacities) and with different interfaces (connectors) to suit local environments

34 WAN Encryptor Topology SMC Telco Carrier Circuits Telco Edge Switch SafeNet Encryptor Customer Router LAN

35 Thank You

How To Protect Your Data From Harm With Safenet

How To Protect Your Data From Harm With Safenet SafeNet Information Security Government Solutions Disk & File Encryption Database & Application Encryption Network & WAN Encryption Identity & Access Management Application & Transaction Security Information

More information

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File

More information

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and Management SafeNet Network Encryption and Isolation Solution

More information

Securing Data at Rest: Database Encryption Solution using Empress Embedded Database

Securing Data at Rest: Database Encryption Solution using Empress Embedded Database Securing Data at Rest: Database Encryption Solution using Empress Embedded Database By: Srdjan Holovac Empress Software Inc. June 2012 White Paper Contents Introduction... 2 Importance of security... 2

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

Alliance Key Manager Solution Brief

Alliance Key Manager Solution Brief Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major

More information

Managed Portable Security Devices

Managed Portable Security Devices Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of

More information

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With

More information

High speed Ethernet WAN: Is encryption compromising your network?

High speed Ethernet WAN: Is encryption compromising your network? High speed Ethernet WAN: Is encryption compromising your network? Trademark: 2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names

More information

SafeNet MSSQL EKM Provider User Guide

SafeNet MSSQL EKM Provider User Guide SafeNet MSSQL EKM Provider User Guide Version 4.8.5 Documentation Version: 20080705 Copyright Information 2009 SafeNet, Inc. All rights reserved All intellectual property is protected by copyright. All

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

A Strategic Approach to Enterprise Key Management

A Strategic Approach to Enterprise Key Management Ingrian - Enterprise Key Management. A Strategic Approach to Enterprise Key Management Executive Summary: In response to security threats and regulatory mandates, enterprises have adopted a range of encryption

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

KeySecure CUSTOMER RELEASE NOTES. Contents. Version: 8.1.0 Issue Date: 2 February 2015 Document Part Number: 007-012896-001, Rev A.

KeySecure CUSTOMER RELEASE NOTES. Contents. Version: 8.1.0 Issue Date: 2 February 2015 Document Part Number: 007-012896-001, Rev A. KeySecure CUSTOMER RELEASE NOTES Version: 8.1.0 Issue Date: 2 February 2015 Document Part Number: 007-012896-001, Rev A Contents Product Description... 3 Key Management... 3 High Performance... 3 Broad

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Axway Validation Authority Suite

Axway Validation Authority Suite Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to

More information

PrivateServer HSM EKM Provider for Microsoft SQL Server

PrivateServer HSM EKM Provider for Microsoft SQL Server PrivateServer HSM EKM Provider for Microsoft SQL Server January 2014 Document Version 1.1 Notice The information provided in this document is the sole property of Algorithmic Research Ltd. No part of this

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information

SafeNet DataSecure vs. Native Oracle Encryption

SafeNet DataSecure vs. Native Oracle Encryption SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises

More information

Alliance AES Encryption for IBM i Solution Brief

Alliance AES Encryption for IBM i Solution Brief Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information

More information

SafeNet Securing Microsoft Solutions

SafeNet Securing Microsoft Solutions SafeNet Securing Microsoft Solutions SafeNet and Microsoft work closely to enhance the security of Microsoft solutions. The Microsoft on Windows provides customizable services for creating and managing

More information

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Todays Agenda Fibre is safe

More information

Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets

Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets WHITE PAPER Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Abstract... 3 Introduction... 3 The Solution... 3 The

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across

More information

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,

More information

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Oracle Database Security Advanced Security Option Thanos Terentes Printzios DB & Options Specialist A&C Technology Adoption Office Oracle Partner Business Development, ECEMEA 2 What is a customers INFORMATION

More information

Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services

Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services What You Will Learn Windows Server on WAAS reduces the cost and complexity

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

AEP Systems. Federal PKI Technical Working Group June 2003

AEP Systems. Federal PKI Technical Working Group June 2003 AEP Systems Federal PKI Technical Working Group June 2003 Company Background Founded: 1998 Employees: 62 The marriage of two companies: Baltimore Technologies Hardware Group (Zergo) (Security) AEP Systems

More information

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

KeySecure User Guide KEYSECURE USER GUIDE 1

KeySecure User Guide KEYSECURE USER GUIDE 1 KeySecure User Guide KEYSECURE USER GUIDE 1 Software Version: 7.1 Documentation Version: 20131014 Part Number: 007-012362-001 (Rev A) 2013 SafeNet, Inc. All rights reserved Preface All intellectual property

More information

Oracle Database 11g Comparison Chart

Oracle Database 11g Comparison Chart Key Feature Summary Express 10g Standard One Standard Enterprise Maximum 1 CPU 2 Sockets 4 Sockets No Limit RAM 1GB OS Max OS Max OS Max Database Size 4GB No Limit No Limit No Limit Windows Linux Unix

More information

IBM i25 Trends & Directions

IBM i25 Trends & Directions Gl. Avernæs 20. November 2013 Erik Rex Cert. Consultant [email protected] Thanks to Steve Will IBM i Chief Architect 2013 IBM Corporation The Family Tree 1975 1988 2013 2013 IBM Corporation 3 2013 IBM Corporation

More information

Microsoft SQL Server Integration Guide

Microsoft SQL Server Integration Guide Microsoft SQL Server Integration Guide Document Information Document Part Number 007-011108-001 (Rev J) Release Date August 2013 Trademarks All intellectual property is protected by copyright. All trademarks

More information

How To Encrypt Data On A Network With Cisco Storage Media Encryption (Sme) For Disk And Tape (Smine)

How To Encrypt Data On A Network With Cisco Storage Media Encryption (Sme) For Disk And Tape (Smine) Data Sheet Cisco Storage Media Encryption for Disk and Tape Product Overview Cisco Storage Media Encryption (SME) protects data at rest on heterogeneous tape drives, virtual tape libraries (VTLs), and

More information

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2 BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution

More information

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security Database Security & Compliance with Audit Vault and Database Firewall Pierre Leon Database Security 1 Topics Encryption Authentication Authorising highly privileged users Access control by data classification

More information

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white

More information

SQL Server 2008 Designing, Optimizing, and Maintaining a Database Session 1

SQL Server 2008 Designing, Optimizing, and Maintaining a Database Session 1 SQL Server 2008 Designing, Optimizing, and Maintaining a Database Course The SQL Server 2008 Designing, Optimizing, and Maintaining a Database course will help you prepare for 70-450 exam from Microsoft.

More information

Storage Guardian Remote Backup Restore and Archive Services

Storage Guardian Remote Backup Restore and Archive Services Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,

More information

SQL Server An Overview

SQL Server An Overview SQL Server An Overview SQL Server Microsoft SQL Server is designed to work effectively in a number of environments: As a two-tier or multi-tier client/server database system As a desktop database system

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client LANDesk White Paper LANDesk Management Suite for Lenovo Secure Managed Client Introduction The Lenovo Secure Managed Client (SMC) leverages the speed of modern networks and the reliability of RAID-enabled

More information

FAMILY BROCHURE Sensitive data is everywhere. So are we.

FAMILY BROCHURE Sensitive data is everywhere. So are we. WHERE IS YOUR DATA? WHERE ARE YOUR KEYS? Structured Data Unstructured Data Live Data 1 Site-to-site Virtualized Data 2 Stored & Archived Data 3 Key Management and Root of Trust 4 SaaS Apps Access WHO AND

More information

etoken TMS (Token Management System) Frequently Asked Questions

etoken TMS (Token Management System) Frequently Asked Questions etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

Innovative Secure Boot System (SBS) with a smartcard.

Innovative Secure Boot System (SBS) with a smartcard. Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable

More information

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has

More information

High Speed Ethernet WAN: Is encryption compromising your network?

High Speed Ethernet WAN: Is encryption compromising your network? High Speed Ethernet WAN: Is encryption compromising your network? 2015 Gemalto 2015. All rights reserved. Gemalto, the Gemalto logo, are trademarks and service marks of Gemalto and are registered in certain

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Stratusphere. Architecture Overview

Stratusphere. Architecture Overview Stratusphere Architecture Overview Introduction This guide has been authored by experts at Liquidware Labs in order to provide an architecture overview of Liquidware Labs Stratusphere product, the leading

More information

Base One's Rich Client Architecture

Base One's Rich Client Architecture Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.

More information

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...

More information

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization Understanding Northwestern University s contract with Symantec Symantec Solutions for Cost Reduction & Optimization Chris Hagelin and Shane Scholes Symantec Account Manager and Symantec Sales Engineer

More information

Administering a Microsoft SQL Server 2000 Database

Administering a Microsoft SQL Server 2000 Database Aug/12/2002 Page 1 of 5 Administering a Microsoft SQL Server 2000 Database Catalog No: RS-MOC2072 MOC Course Number: 2072 5 days Tuition: $2,070 Introduction This course provides students with the knowledge

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

The Encryption Anywhere Data Protection Platform

The Encryption Anywhere Data Protection Platform The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,

More information

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Citrix MetaFrame XP Security Standards and Deployment Scenarios Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document

More information

iphone in Business Security Overview

iphone in Business Security Overview iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

DATA BACKUP & RESTORE

DATA BACKUP & RESTORE DATA BACKUP & RESTORE Verizon Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable. Offsite backup is

More information

RSA Digital Certificate Solution

RSA Digital Certificate Solution RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong

More information

IBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform:

IBM Software Information Management Creating an Integrated, Optimized, and Secure Enterprise Data Platform: Creating an Integrated, Optimized, and Secure Enterprise Data Platform: IBM PureData System for Transactions with SafeNet s ProtectDB and DataSecure Table of contents 1. Data, Data, Everywhere... 3 2.

More information

Oracle Database Security and Audit

Oracle Database Security and Audit Copyright 2014, Oracle Database Security and Audit Beyond Checklists Learning objectives Understand Oracle architecture Database Listener Oracle connection handshake Client/server architecture Authentication

More information

6231A - Maintaining a Microsoft SQL Server 2008 Database

6231A - Maintaining a Microsoft SQL Server 2008 Database 6231A - Maintaining a Microsoft SQL Server 2008 Database Course Number: 6231A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft Certified Professional

More information

Database Encryption Design Considerations and Best Practices for ASE 15

Database Encryption Design Considerations and Best Practices for ASE 15 Database Encryption Design Considerations and Best Practices for ASE 15 By Jeffrey Garbus, Soaring Eagle Consulting Executive Overview This article will explore best practices and design considerations

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Managed Encryption Service

Managed Encryption Service Amethyst Cryptographic Services Ltd Managed Encryption Service An Overview Chris Greengrass March 2011 Encryption and Cryptography The use of encryption/decryption is as old as the art of communication.

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security

More information

Service Level Agreement (SLA) Arcplace Backup Enterprise Service

Service Level Agreement (SLA) Arcplace Backup Enterprise Service (SLA) Arcplace Backup Enterprise Service 1. Introduction This Service Level Agreement ( SLA ) forms an integral part of the Agreement between Arcplace and Customer. This SLA describes the Backup Enterprise

More information

Cloud Backup Service Service Description. PRECICOM Cloud Hosted Services

Cloud Backup Service Service Description. PRECICOM Cloud Hosted Services Cloud Backup Service Service Description PRECICOM Cloud Hosted Services Table of Contents Table of Contents 2 1. Cloud Backup Service Service Summary 3 2. Cloud Backup Service Service Definition 4 2.1.

More information

Crittografia e Enterprise Key Management una sfida possibile da affrontare

Crittografia e Enterprise Key Management una sfida possibile da affrontare Crittografia e Enterprise Key Management una sfida possibile da affrontare Giuseppe Russo Oracle Chief Technologist [email protected] Simone Mola SafeNet Sales Engineer [email protected]

More information

Symantec NetBackup 5220

Symantec NetBackup 5220 A single-vendor enterprise backup appliance that installs in minutes Data Sheet: Data Protection Overview is a single-vendor enterprise backup appliance that installs in minutes, with expandable storage

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

Web-Based Data Backup Solutions

Web-Based Data Backup Solutions "IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

SQL Server 2012/2014 AlwaysOn Availability Group

SQL Server 2012/2014 AlwaysOn Availability Group SQL Server 2012/2014 AlwaysOn Availability Group Part 1 - Introduction v1.0-2014 - G.MONVILLE Summary SQL Server 2012 AlwaysOn - Introduction... 2 AlwaysOn Features... 2 AlwaysOn FCI (Failover Cluster

More information

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION

More information