Protegrity Data Security Platform
|
|
- Drusilla Manning
- 8 years ago
- Views:
Transcription
1
2 Protegrity Data Security Platform The Protegrity Data Security Platform design is based on a hub and spoke deployment architecture. The Enterprise Security Administrator (ESA) enables the authorized Security Officer to determine and set a unique enterprise wide Data Security Policy, and is the management tool (console) for the central control over policy, keys, and reporting. The Policy set in ESA is deployed to protection points distributed throughout the enterprise where data is acquired, used and stored and where the Policy is enforced by Protegrity Data Protectors. The complexity of business processes and the technologies that support these processes impose many challenges when applying data protection solutions. Delivering a broad interoperability with various databases, operating systems and platforms is essential for Protegrity Data Security Platform to successfully solve critical and complex enterprise data protection challenges. Protegrity s Data Security Platform evolution is a result of many years of experience in delivering data protection solutions to large enterprises. The Protegrity Data Security Platform provides many levels of flexibility including the following; Wide breadth of platform coverage; Extensive interoperability with a large variety of databases, operating systems and platforms. Flexibility in data protection approaches: The availability of different Data Protectors (Database Protector, Application Protector, and File Protector) that provide many options for enforcing the Data Security Policy in a complex enterprise environment. Flexibility in protection methods: Availability of a variety of protection methods for making data unreadable and/or accessible. The Protegrity Data Security Platform is the umbrella name for the complete Protegrity product. Its two major sub-systems; The Enterprise Security Administrator (ESA) and Data Protection System (DPS) are described below. Figure 1: Major Protegrity Data Security Platform components. Enterprise Security Administrator (ESA) Data Security Policy The foundation for protecting sensitive data in the enterprise is the unique Data Security Policy(s) each corporate and institutional customer determines based on its special needs and circumstances. The purpose of the Policy is to enable the Security Officer to determine and specify the following rules; What sensitive data shall be protected? Where in the enterprise shall the Policy be enforced, Who shall have access to the sensitive data, When (day/time)shall access to the sensitive data be available, How will the sensitive data shall be protected, and Audit record of who has touched what data when. Page 2
3 These rules consist of a set of protection attributes that are specified for each type or category of data element. An example of a data element is credit card number or social security number. These protection attributes are stored in a security catalog or database that is separate from the database where the data being protected is residing. The name given to the collection of rules stored in the catalog is the Data Security Policy. The method used to protect data in a database with the use of the security catalogue is protected by the U.S. Patent No. 6,321,201. Once the Policy is determined and set in ESA, the Policy will be deployed to the distributed data protection points within the enterprise for enforcement. Separation of Duties The term Separation of Duties refers to the separation or segregation of those who have control over the Policy (including granting access to sensitive data) from those who work with sensitive data and who may or may not need access to sensitive data. Security Officers control access to sensitive data by controlling the Protegrity Data Security Policy. Security Officers can prevent technologists such as DBAs, programmers, or system engineers from seeing the sensitive data in the clear. They also prevent the technologists from granting sensitive data access to others. This will not however, prevent DBA s, programmers and/or system engineers from performing their jobs of administering different aspects of the enterprise IT, data flows and data environments. Key Management The Protegrity Data Security Platform provides comprehensive Enterprise Key Management capabilities including all core key management functions (create, distribute, use, change, audit, archive, and dispose of symmetric cryptographic keys). Key Management is incorporated into the fabric of the Policy as a part of the data security plumbing and is incorporated in Policy creation and maintenance tasks performed by the Security Officer. This minimizes the number of key custodians needed and provides an easy to use model for managing keys. Reporting When data protection is doing its job, it will be unnoticed. Users having Policy based privileges to view sensitive data will have it available to them and those without access rights will be denied. Business processes will continue to run, and data will move from business process to business process across heterogeneous enterprise environments. Reporting is the tool used to verify that sensitive data is being protected. Reporting is necessary to enable Security Officers to sign-off the effectiveness of internal controls, and to enable compliance assessors to certify compliance with applicable legal and regulatory requirements such as PCI, PII and HIPAA. Properly functioning reporting has also a potential to reduce audit costs. Audit logs capture authorized and unauthorised attempts to access sensitive data at all protection points where data protection products are deployed. This level of granularity is critical to answering who touched what data when ; an important requirement for PCI and HIPAA. The level of protection is determined by the Security Officer, and in support of separation of duties, only the Security Officer can control the level of audit logs to be captured. The Protegrity reporting system also collects audit logs on all changes made to policies by Security Officers. Everyone, including the Security Officer must be made accountable. Page 3
4 Data Protection System (DPS) Data Protectors at Protection Points Providing a comprehensive enterprise solution strategy requires a collaborative set of data protection products (Data Protectors) that can be combined to protect sensitive data end to end; from the point of creation to the point of archive or purging. Protegrity s Data Security Platform and more specifically its Data Protection System (DPS) include the following data protection products; Database Protector, Application Protector, and File Protector. These products provide a diverse set of functions needed to protect sensitive data across the complex heterogeneous environments existing in the enterprise. These Data Protectors are used to enforce the enterprise Data Security Policy as set in by the Security Officer from ESA. Database Protector The Database Protector performs column level data protection in accordance with the protection rules define in the Data Security Policy set by the Security Officer in ESA. This product delivers transparency (little or no modifications) to applications that use the database being protected. The method used in database protection is protected by the U.S. Patent No. 6,321,201. Security Officers use the protection attributes to define the proper specific data protection method (making data unreadable) and to control what type of access to the sensitive data is given to the various groups of users. For example, DBA s will not be able to view sensitive data that has been encrypted in clear text, but they will be able to continue to perform their duties administering and optimizing the database. File Protector As files move through the enterprise, they are typically dropped into folders by one process and are picked up from the folder by another process without human intervention. Protegrity s File Protector employs a highly transparent approach to protecting files that are used throughout the enterprise data flow. Use of File Protector is transparent in two primary aspects; The process of dropping the files into the protected folder does not have to change. The process that picks up the protected file from the folder will be given or delegated the credentials needed to gain access to the protected files. This is done without having to change the process. System engineers who are responsible for maintaining and administering enterprise systems through which files traverse will not have access to sensitive data in the clear. The Security Officer has the control of authorizing access to sensitive data through the Policy. Application Protector The Application Protector provides a simple Application Programming Interface (API) that can be integrated with existing applications to protect sensitive data. It adds a level of flexibility beyond the Database Protector and File Protector that is sometimes required when a solution is needed for a complex enterprise data environment. The Application Protector strongly supports separation of duties. Even though a developer can use API functions to encrypt or to decrypt sensitive data, the developer never controls the data encryption key, the crypto algorithm, or the access control to sensitive data in clear. The Security Officer is in control of this and defines it in a Data Security Policy. Page 4
5 Data Protection through Tokenization Protegrity s scalable and distributed tokenization solution enables enterprises holding PCI, PHI, and PII information to replace sensitive data with high-performance tokens and manage them consistently across complex environments. Tokenization reduces the cost of data protection, and in the case of PCI compliance, minimizes the scope of assessments. Many enterprises today are especially excited about tokenization, and it is easy to understand why. Tokenization is the process of replacing sensitive data with an inert value that has no worth to a thief while retaining certain characteristics of the original data that minimizes impact to operational systems. Tokenization substantially lowers the bar for implementing data security due to its simplicity and transparency. When PCI compliance is a requirement, then tokenizing sensitive data is a good way to reduce compliance scope and cost. Performance and Scalability The high-speed performance of Protegrity Token Server provides fast creation of new data tokens and quick recovery of the original data when needed. A recent performance study benchmarked Protegrity s token creation in the range of 200,000 tokens per second from a single commodity Token Server. Scaling the solution to very large token volumes is as simple as adding commodity boxes to run the Protegrity Token Server. You can optionally deploy a load balancer of your choosing in front of the Token Servers to ensure that you get the most out of each server. The additional processing horsepower equates directly to higher tokenization throughput. Flexible Deployment; Distributed or Centralized Tokenization For geographically distributed environments, Token Servers can easily be deployed as independent, remote Token Servers to tokenize in close proximity to where the data resides. Moving tokenization close to the data significantly reduces the latency of token operations as compared to tokenization solutions from other vendors. Each independently functioning Token Server has the ability to generate the same token for the same piece of original data, and vice versa. Distributed tokenization will operate without the need to synchronize or replicate between servers. Distributed tokenization enables the deployment of a single, unified solution across data collection, processing, and storage locations that may be distributed across the globe. There is no need to worry about the possibility of data tokens colliding (and creating duplicate values), even for very large quantities of tokens. On the other hand, the Token Server can also be deployed in a central topology as is done with most token servers today. Having the choice to deliver distributed or centralized tokenization solution enables optimization of performance and security. Page 5
6 Purpose-built Token Servers Delivering tokenization for specific functions is made possible due to the ease with which Token Servers can be deployed and distributed. For example, tokenizing payment transactions can be segregated from tokenization of healthcare related information. This allows for more control over different security and performance requirements that may be impose by different business processes or industries. Multiple Token Types and Formats The Token Server delivers flexibility on the number of token types that can be created and how tokens are created. Multiple token formats are supported including numeric, alphanumeric, and masked tokens. Tokens can be created with masks that bleed part of the original data through. This can be useful when applications expect to use only certain marts of the sensitive data for business processing. Platform Approach The Protegrity Tokenization solution benefits greatly from being part of the larger Protegrity Data Security Platform. The platform provides Protegrity Data Protectors that can deliver tokenization capabilities on a diverse set of operating systems and database. All Data Protectors enforce the Protegrity Data Security Policy and collect granular enforcement audit logs that are used in compliance and forensic reports. Two distinct protectors that expose tokenization as a data protection method include: The Protegrity Application Protector (API) The Database Protector (including the Database Protector for Teradata). Risk Adjusted Data Protection Having more than a single data protection choice is important to delivering the flexibility needed to apply the right protection. The most secure data protection method, strong encryption, should not be considered the only approach. The most valuable and most exposed data, data that has the highest risk of being stolen, will require strong encryption, while other categories of data may not need as strong protection, but access to such data may still require close monitoring. Having many data protection choices under one policy and being able to apply different degree of protection depending on the sensitivity of the data enables the corporation to do Risk Adjusted Data Protection in a manner optimized for the Security Officers needs, resources, industry and regulatory requirements and for any other unique circumstances of the corporation. Protegrity supports the following data protection methods; Monitoring with no encryption Hashing Format Controlling Encryption Strong Encryption Tokenization Additionally, masking can be used to protect sensitive data by exposing in clear for example last four digits of a credit card number to an authorized users of the data while rest of the digits are kept unreadable. Page 6
7 Protecting Data in a Heterogeneous Enterprise Databases and Operating Systems Today s enterprise holds a variety of hardware, operating systems and database platforms that must collaborate to support business processes. All these may be of their respective latest version, but they may in some occasions even include environments and versions no longer supported by the vendor or third parties. Databases: Large enterprises utilize many different databases from different vendors. Common databases include Oracle, DB2. SQL Server, Informix, and Sybase. Operating Systems: Large enterprises utilize many different operating systems from different vendors. Common operating systems include Linux, UNIX, Windows, and operating systems on mainframes such as z/os and on the AS/400. Data Warehouse Platforms: Many large enterprises use Teradata Data Warehouse platforms for their Data Warehouse needs. Protegrity data protection solutions started from protecting sensitive data in DB2 databases on the mainframe. Expansion into standard databases such as Oracle, SQL Server, and DB2 on non-mainframe platforms took off as compliance requirements such as PCI become a requirement. Over the years, Protegrity Data Security Platform has grown to support the heterogeneity inherent in all large enterprises. Protegrity currently offers solutions for; Most generations of the leading databases such as Oracle, DB2, SQL Server, and Informix, and the high performing Teradata data warehouse. Most generations of the most common operating platforms including Windows, UNIX, Linux, AS/400, and the IBM mainframe supporting the z/os operating system. With the complex and often legacy driven infrastructure of today s large scale enterprise, any enterprise data security solution must be able to be interoperable with and work in a large variety of operating platforms from legacy platforms to the most current versions of these platforms. Key Management Point Solutions As enterprises build their operational systems over time, software vendors concerned with protecting data in their applications deliver security built into the applications. These systems create their own keys to protect their own data. Sometimes the keys are well protected and sometimes not. These are point solutions. The reality is that data moving through the enterprise moves from one data repository to another and from one business function to another, across many different types of systems and applications supported by different vendors. The movement of data across point solutions having silo key management and audit function can become extremely complex and consistent enforcement is impossible. The Protegrity Data Protection Platform delivers a consistent key management function across the enterprise. Security Officers administer key management via the data protection policy set in Protegrity Enterprise Security Administrator across the enterprise, across disparate systems. The Protegrity Data Protectors can be used to integrate to applications and databases throughout the data flow and deliver a unified and consistent security function supporting policy based protection rules enforcement, auditing, and reporting. Page 7
8 Putting it all Together: Protecting the Enterprise The typical enterprise data flow is depicted in Figure 2. Whether it is from retail, banking, financial services, healthcare or manufacturing, data is often collected at many collection points that are widely distributed and disconnected. These collection points can take the form of the web (e-commerce), point-of-sale terminals, branch office kiosks, hand-held devices collecting credit card data (in stores, airplanes and elsewhere), and many others. These distributed collection points are not as secure as the corporate IT center with its extensive firewalls and various types of perimeter and internal security, both physical and software based. On-site technical support is minimal and they are often not connected to the corporate IT with persistent connections. Instead they depend on nightly batch jobs to get data to the corporate IT center for processing. The sheer number, the distributed nature, and the exposure of these collection points pose a challenge for data protection. Collection File Protection, API Crypto Libraries Goal: protect sensitive data on the collection point and as it flows to Aggregation Aggregation Database Protection, API Crypto Libraries, File Protection Goal: change Security Zone, protect sensitive data at aggregation, distribute operational systems on different zones Operations Database Protection, API Crypto Libraries, File Protection Goal: protect sensitive data in different security zones, and different business applications and technologies. Analysis Database Protection Goal: High performance column level protection is required for these large analytical systems. Storage Database Protection, File Protection, API Crypto Libraries Goal: Archive protected systems with the ability to restore. Figure 2: Flow of corporate data and protection options. Data often travels to a central aggregation point at the corporate IT center. The massive amount of data funnelling into the aggregation points can easily slow down the business process. In retail, the longer the data takes to reach the settlement process, the slower they will get paid for their transactions. The typical challenge at the aggregation point is meeting Service Level Agreements (SLAs) that have been set to ensure business flow. Data leaving the aggregation point can often flow to several operational systems simultaneously. Corporate IT has built these operational systems over time. The strategy may have been based on a best-of-class strategy or there may have been home grown systems used to complement off-the-shelf systems. They may use state-of-the-art technology side by side with legacy technology. Bottom line is that the challenging characteristic of these operational systems is a highly mixed and heterogeneous set of systems that were not built with a particular attention on data security. Page 8
9 Analysis systems are often large data warehouses that are fed from many disparate sources. Enterprise Data Warehouses (EDWs) are used by many companies and can get extremely large. They often use special parallel databases to deliver the speed needed to sift through massive amounts of data required for analysis. To pick up trends, analysis requires year s worth of data which contains a gold mine of sensitive data. Data marts are often created and they propagate the sensitive data in an uncontrolled manor beyond the core EDW. Due to the massive amount of sensitive data and the exposure from the number of people that use it for analysis, the EDW is often the place to start data protection initiatives. While the archiving step appears to be the end of the enterprise data lifecycle, it can turn into the beginning. There are many reasons why companies must archive operational data for years after the transactions have been settled. Sometimes, these records must be brought back from archive. While bringing back archived data after 5 years may pose its own challenges, consider the additional impact of bringing back encrypted data. Protegrity understands these challenges and the outcome of many years of delivering end-to-end enterprise data protection solutions is the Protegrity Data Security Platform. Combined with extensive data protection methods, flexible data protection approaches policy management, key management, and robust reporting; all under one roof differentiate the Protegrity Data Security Platform from any other product in the market. About Protegrity Protegrity is the leading global security software company providing high performance, infinitely scalable, end-to-end data security solutions. Protegrity customers centrally develop, manage and control data security policy that protects sensitive information across the enterprise in databases, applications and file systems from the point of acquisition to deletion. Protegrity s solutions give corporations the ability to implement a variety of data protection methods, including strong encryption, tokenization, masking and monitoring to ensure the protection of their sensitive data and enable compliance for PCI-DSS, HIPAA and other data security requirements. Protegrity s award winning software products and innovative technology are backed by 12 industry patents, all of which differentiate the Protegrity Data Security Platform from point solutions. Protegrity employees are security technology specialists with deep industry expertise in data security approaches and techniques, including key management, forensics reporting and security policy definition and management. Protegrity has more than 200 enterprise customers worldwide who use its comprehensive data security solutions to fulfill their obligations to protect their sensitive data, brand, and business reputation. Protegrity is headquartered in Stamford, Connecticut USA. For more information visit or call Copyright 2010 Protegrity Corporation. All rights reserved. Protegrity and the Protegrity logo, are trademarks of Protegrity Corporation. 10/2010 Page 9
Protegrity Tokenization
Securing Sensitive Data for PCI, HIPAA and Other Data Security Initiatives 2011 Edition Who should read it System architects, security experts, and other IT professionals who are looking to use tokenization
More informationTeradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
More informationData Breaches Gone Mad. Straight Away! Wednesday September 28 th, 2011
Data Breaches Gone Mad Learn how to Secure your Data Warehouse Straight Away! Wednesday September 28 th, 2011 Martin Willcox Director Product & Solutions Marketing Teradata Europe, Middle East & Africa
More informationStronger database security is needed to accommodate new requirements
Enterprise Database Security A Case Study Abstract This Article is a case study about an Enterprise Database Security project including the strategy that addresses key areas of focus for database security
More informationSafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
More informationCompliance for the Road Ahead
THE DATA PROTECTION COMPANY CENTRAL CONTROL A NTROL RBAC UNIVERSAL DATA PROTECTION POLICY ENTERPRISE KEY DIAGRAM MANAGEMENT SECURE KEY STORAGE ENCRYPTION SERVICES LOGGING AUDITING Compliance for the Road
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
More informationIBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking
IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking IBM and ACI offer unparalleled expertise in designing and optimizing payment systems As leading
More informationSolving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction
Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction Introduction In today s dynamic business environment, corporation s intangible
More informationDebunking The Myths of Column-level Encryption
Debunking The Myths of Column-level Encryption Vormetric, Inc. 888.267.3732 408.433.6000 sales@vormetric.com www.vormetric.com Page 1 Column-level Encryption Overview Enterprises have a variety of options
More informationEnterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
More informationWhitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam. info@sepusa.com www.sepusa.com Copyright 2014 SEP
Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam info@sepusa.com www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW... 3 SOLUTION COMPONENTS... 4-5 SAP HANA... 6 SEP
More informationData Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
More informationAPPLICATION COMPLIANCE AUDIT & ENFORCEMENT
TELERAN SOLUTION BRIEF Building Better Intelligence APPLICATION COMPLIANCE AUDIT & ENFORCEMENT For Exadata and Oracle 11g Data Warehouse Environments BUILDING BETTER INTELLIGENCE WITH BI/DW COMPLIANCE
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from
More informationIBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS!
The Bloor Group IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS VENDOR PROFILE The IBM Big Data Landscape IBM can legitimately claim to have been involved in Big Data and to have a much broader
More informationVormetric Encryption Architecture Overview
Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls and Auditing Vormetric, Inc. 2545 N. 1st Street, San Jose, CA 95131 United States: 888.267.3732
More informationProvide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
More informationAn Oracle White Paper January 2011. Oracle Database Firewall
An Oracle White Paper January 2011 Oracle Database Firewall Introduction... 1 Oracle Database Firewall Overview... 2 Oracle Database Firewall... 2 White List for Positive Security Enforcement... 3 Black
More informationHow To Know The Roi Of Cesp Workload Automation Software
WHITE PAPER CA ESP Workload Automation Software: Measuring Business Impact and ROI Sponsored by: CA Tim Grieser Eric Hatcher September 2009 Randy Perry Global Headquarters: 5 Speen Street Framingham, MA
More informationAdvanced Analytics for Financial Institutions
Advanced Analytics for Financial Institutions Powered by Sybase IQ on HP Servers product brochure www.sybase.com Over the past 18 months the global financial industry has gone through a huge transformation.
More informationKey Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
More informationEnforcive /Cross-Platform Audit
Enforcive /Cross-Platform Audit Enterprise-Wide Log Manager and Database Activity Monitor Real-time Monitoring Alert Center Before & After Change Image Custom Reports Enforcive's Cross-Platform Audit (CPA)
More information8 Steps to Holistic Database Security
Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security
More information05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
More informationVeritas NetBackup 6.0 Server Now from Symantec
Veritas NetBackup 6.0 Server Now from Symantec Innovative data protection As the recognized leader for enterprise-class backup and recovery, Veritas NetBackup Server software is designed to help provide
More informationAn Oracle White Paper January 2012. Oracle Database Firewall
An Oracle White Paper January 2012 Oracle Database Firewall Introduction... 2 Oracle Database Firewall Overview... 3 Oracle Database Firewall... 3 White List for Positive Security Enforcement... 4 Black
More informationPrivileged User Monitoring for SOX Compliance
White Paper Privileged User Monitoring for SOX Compliance Failed login, 6:45 a.m. Privilege escalation, 12:28 p.m. Financial data breach, 11:32 p.m. Financial data access, 5:48 p.m. 1 Privileged User Monitoring
More informationMayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation
Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup
More informationModernizing enterprise application development with integrated change, build and release management.
Change and release management in cross-platform application modernization White paper December 2007 Modernizing enterprise application development with integrated change, build and release management.
More informationW H I T E P A P E R T h e C r i t i c a l N e e d t o P r o t e c t M a i n f r a m e B u s i n e s s - C r i t i c a l A p p l i c a t i o n s
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e C r i t i c a l N e e d t o P r o t e c t M a i n f r a m e B u s i n e
More informationSecuring Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
More informationProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
More informationSolution White Paper Monetizing the Service Provider Cloud
Solution White Paper Monetizing the Service Provider Cloud Deliver the value-added cloud services that customers need while maximizing revenue Table of Contents 1 EXECUTIVE SUMMARY 2 EVOLUTION OF THE CLOUD
More informationSecurity management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.
Security management solutions White paper IBM Tivoli and Consul: Facilitating security audit and March 2007 2 Contents 2 Overview 3 Identify today s challenges in security audit and compliance 3 Discover
More informationWhat is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
More informationSecuring and protecting the organization s most sensitive data
Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered
More informationQ1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
More informationSuccessfully managing geographically distributed development
IBM Rational SCM solutions for distributed development August 2004 Successfully managing geographically distributed development Karen Wade SCM Product Marketing Manager IBM Software Group Page 2 Contents
More informationSecurity Solutions. MyDBA s. Security Solutions. For Databases. October 2012. Copyright 2012 MyDBA CC. Version 3
MyDBA s Security Solutions For Databases October 2012 Version 3 The Protection of Personal Information (POPI) Bill The Bill requires that: Anyone who processes personal information will need to take appropriate
More informationVERITAS NetBackup BusinesServer
VERITAS NetBackup BusinesServer A Scalable Backup Solution for UNIX or Heterogeneous Workgroups V E R I T A S W H I T E P A P E R Table of Contents Overview...................................................................................1
More informationReducing Corporate Risk: Best-practices Data Protection Strategy. for Remote and Branch Offices (ROBOs) Best-practices Data Protection Strategy
UBISTOR WHITE PAPER: Reducing Corporate Risk: Best-practices Data Protection Strategy for Remote and Reducing Branch Corporate Offices (ROBOs) Risk: Best-practices Data Protection Strategy for Remote and
More informationAlliance AES Encryption for IBM i Solution Brief
Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it
More informationComplying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
More informationPATROL From a Database Administrator s Perspective
PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks
More informationEfficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g
More informationMySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationA TECHNICAL WHITE PAPER ATTUNITY VISIBILITY
A TECHNICAL WHITE PAPER ATTUNITY VISIBILITY Analytics for Enterprise Data Warehouse Management and Optimization Executive Summary Successful enterprise data management is an important initiative for growing
More informationOracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
More informationSymantec Backup Exec 11d for Windows Servers New Encryption Capabilities
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities White Paper: Enterprise Security Symantec Backup Exec 11d for Windows Servers Contents Executive
More informationMcAfee Database Security. Dan Sarel, VP Database Security Products
McAfee Database Security Dan Sarel, VP Database Security Products Agenda Databases why are they so frail and why most customers Do very little about it? Databases more about the security problem Introducing
More informationVERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights
VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION As the recognized leader for enterprise-class backup and recovery, VERITAS NetBackup Enterprise Server software is designed to help provide
More informationAlliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
More informationOffload Enterprise Data Warehouse (EDW) to Big Data Lake. Ample White Paper
Offload Enterprise Data Warehouse (EDW) to Big Data Lake Oracle Exadata, Teradata, Netezza and SQL Server Ample White Paper EDW (Enterprise Data Warehouse) Offloads The EDW (Enterprise Data Warehouse)
More informationProtect SAP HANA Based on SUSE Linux Enterprise Server with SEP sesam
Protect SAP HANA Based on SUSE Linux Enterprise Server with SEP sesam Many companies of different sizes and from all sectors of industry already use SAP s inmemory appliance, HANA benefiting from quicker
More informationOverview Western 12.-13.9.2012 Mariusz Gieparda
Overview Western 12.-13.9.2012 Mariusz Gieparda 1 Corporate Overview Company Global Leader in Business Continuity Easy. Affordable. Innovative. Technology Protection Operational Excellence Compliance Customer
More informationCERULIUM TERADATA COURSE CATALOG
CERULIUM TERADATA COURSE CATALOG Cerulium Corporation has provided quality Teradata education and consulting expertise for over seven years. We offer customized solutions to maximize your warehouse. Prepared
More informationArchive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration
Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta
More informationAuditing Data Access Without Bringing Your Database To Its Knees
Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant Agenda
More informationRSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
More informationData Integration for the Real Time Enterprise
Executive Brief Data Integration for the Real Time Enterprise Business Agility in a Constantly Changing World Overcoming the Challenges of Global Uncertainty Informatica gives Zyme the ability to maintain
More informationApplication Monitoring for SAP
Application Monitoring for SAP Detect Fraud in Real-Time by Monitoring Application User Activities Highlights: Protects SAP data environments from fraud, external or internal attack, privilege abuse and
More informationSymantec Backup Exec 2012
Better backup for all Data Sheet: Backup and Disaster Recovery Overview is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and recovers
More informationDigital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ. 0844 586 0040 intouch@digitalpathways.co.uk www.digpath.co.
Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ 0844 586 0040 intouch@digitalpathways.co.uk Security Services Menu has a full range of Security Services, some of which are also offered as a fully
More informationDATA ARCHIVING. The first Step toward Managing the Information Lifecycle. Best practices for SAP ILM to improve performance, compliance and cost
DATA ARCHIVING The first Step toward Managing the Information Lifecycle Best practices for SAP ILM to improve performance, compliance and cost 2010 Dolphin. West Chester, PA All rights are reserved, including
More informationReal-Time Database Protection and. Overview. 2010 IBM Corporation
Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio
More informationBusiness Usage Monitoring for Teradata
Managing Big Analytic Data Business Usage Monitoring for Teradata Increasing Operational Efficiency and Reducing Data Management Costs How to Increase Operational Efficiency and Reduce Data Management
More informationWhy Add Data Masking to Your IBM DB2 Application Environment
Why Add Data Masking to Your IBM DB2 Application Environment dataguise inc. 2010. All rights reserved. Dataguise, Inc. 2201 Walnut Ave., #260 Fremont, CA 94538 (510) 824-1036 www.dataguise.com dataguise
More informationRequirements Checklist for Choosing a Cloud Backup and Recovery Service Provider
Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist
More informationAn Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
More informationTurnkey Deduplication Solution for the Enterprise
Symantec NetBackup 5000 Appliance Turnkey Deduplication Solution for the Enterprise Mayur Dewaikar Sr. Product Manager, Information Management Group White Paper: A Deduplication Appliance Solution for
More informationMETALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide
METALOGIX REPLICATOR FOR SHAREPOINT: Supporting Government and Military Missions Worldwide Contents Introduction...2 Coalition and extranet collaboration... 3 Deploying military units... 4 Fob-rob collaboration...4
More informationPhoenix backs up servers using Windows and Linux operating systems. Here is a list of Windows servers that Phoenix supports:
Druva About Phoenix What is Phoenix? Druva Phoenix is a cloud based backup and archival solution aimed primarily at remote office servers. Since Phoenix is cloud-targeted backup, there is no elaborate
More informationRSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
More informationHADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics
HADOOP SOLUTION USING EMC ISILON AND CLOUDERA ENTERPRISE Efficient, Flexible In-Place Hadoop Analytics ESSENTIALS EMC ISILON Use the industry's first and only scale-out NAS solution with native Hadoop
More informationData-Centric Security vs. Database-Level Security
TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides
More informationMicrosoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
More informationAchieving PCI Compliance for: Privileged Password Management & Remote Vendor Access
edmz Introduces Achieving PCI Compliance for: & Remote Vendor Access [ W H I T E P A P E R ] Written by e-dmz Security, LLC February 2010 C o p y r ig h t 2 0 1 0 e - D M Z S e c u r i t y, LL C. A l l
More informationSeven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
More informationYour Data, Any Place, Any Time.
Your Data, Any Place, Any Time. Microsoft SQL Server 2008 provides a trusted, productive, and intelligent data platform that enables you to: Run your most demanding mission-critical applications. Reduce
More informationHow To Use Shareplex
Data consolidation and distribution with SharePlex database replication Written by Sujith Kumar, Chief Technologist Executive summary In today s fast-paced mobile age, data continues to accrue by leaps
More informationOptimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
More informationOracle Role Manager. An Oracle White Paper Updated June 2009
Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship
More informationHow To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
More informationWHITE PAPER GoundWork: Bringing IT Operations Management to Open Source and Beyond
WHITE PAPER GoundWork: Bringing IT Operations Management to Open Source and Beyond Sponsored by: GroundWork Open Source Stephen Elliot April 2007 EXECUTIVE SUMMARY Global Headquarters: 5 Speen Street Framingham,
More informationQRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
More informationComprehensive Agentless Cloud Backup and Recovery Software for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this
More informationOracle Health Sciences Network. 1 Introduction. 1.1 General Security Principles
Oracle Health Sciences Network Security Guide Release 2.0.0.0 E50290-02 September 2015 1 Introduction The main challenge sponsors face in clinical trials is the elapsed time from the start of the protocol
More informationEMC Data Domain Boost for Oracle Recovery Manager (RMAN)
White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with
More informationFacilitating Efficient Data Management by Craig S. Mullins
Facilitating Efficient Data Management by Craig S. Mullins Most modern applications utilize database management systems (DBMS) to create, store and manage business data. The DBMS software enables end users
More informationPerformance Management for Enterprise Applications
performance MANAGEMENT a white paper Performance Management for Enterprise Applications Improving Performance, Compliance and Cost Savings Teleran Technologies, Inc. 333A Route 46 West Fairfield, NJ 07004
More informationSafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
More informationSafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
More informationIBM InfoSphere Optim Test Data Management
IBM InfoSphere Optim Test Data Management Highlights Create referentially intact, right-sized test databases or data warehouses Automate test result comparisons to identify hidden errors and correct defects
More informationP u b l i c a t i o n N u m b e r : W P 0 0 0 0 0 0 0 4 R e v. A
P u b l i c a t i o n N u m b e r : W P 0 0 0 0 0 0 0 4 R e v. A FileTek, Inc. 9400 Key West Avenue Rockville, MD 20850 Phone: 301.251.0600 International Headquarters: FileTek Ltd 1 Northumberland Avenue
More informationDaymark DPS Enterprise - Agentless Cloud Backup and Recovery Software
Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this is the lifeblood
More informationSecuring sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File
More informationData Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description
Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.
More informationComparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
More informationWelcome. Changes and Choices
Welcome Changes and Choices Today s Session Thursday, February 23, 2012 Agenda 1. The Fillmore Group Introduction 2. Reasons to Implement Replication 3. IBM s Replication Options How We Got Here 4. The
More information