Self-Encrypting Hard Disk Drives in the Data Center
|
|
|
- Anissa Patterson
- 10 years ago
- Views:
Transcription
1 Technology Paper Self-Encrypting Hard Disk Introduction At least 35 U.S. states now have data privacy laws that state if you encrypt data-at-rest, you don t have to report breaches of that data. U.S. Congressional bills have similar provisions. The Payment Card Industry Data Security Standard, which requires rendering sensitive cardholder data unreadable anywhere it is stored, lists strong cryptography as an acceptable method of doing so. For these and other reasons, data center administrators have compelling motivations for encrypting data at rest. Nearly all drives eventually are decommissioned from use in a data center. When the drives leave the data center, the majority are still operable and their data is still readable. It is not just the drive that is leaving the data center; it s also the data. Even data that has been striped across many drives in a RAID array is vulnerable to data theft. The stripe size in today s arrays is big enough to expose large, intelligible segments of data. Current drive disposal practices that aim to make the data unreadable are time-consuming and subject to human failure. For this reason, many data centers choose to hire professional disposal services. However, sending a drive offsite for secure disposal puts the drive s data at the same risk as tape data leaving the data center unsecured. Data centers routinely decommission drives, and it only takes one drive to fall through the cracks to possibly cost a company millions of dollars in remedies for the breached data. The beauty of encryption is that from the moment the drive or system is removed from the data center, whether intentionally or otherwise, the data on the drive is secure. No advance action or thought is required on the part of the data center administrator to secure this data. There is no way for the data to be breached should the drive be mishandled.
2 Several years ago, before Seagate started working on encryption for the drive, the National Security Agency (NSA) analyzed the problem of data security and determined that the place to perform encryption is in the hard drive. The NSA has spoken publicly at conferences in support of encrypting drives. However, data center administrators have been reluctant to implement encryption. A major reason for this is fear of losing the key to decrypt their data. Even if they have experience with a good key management system for tape drive encryption, and are convinced that key loss can be prevented, there are concerns about complexity, interoperability, performance and cost. This paper will discuss how self-encrypting hard disk drive technology addresses those concerns. Technology Overview This technology consists of three components, described in Figure 1: self-encrypting hard drives, a key management service that stores, manages and serves authentication keys (i.e., passwords), and a storage system that passes these authentication keys to the correct drive. The self-encrypting drives perform full disk encryption. When a write is performed, clear text enters the drive and, before being written to the disk, is encrypted using an encryption key embedded within the drive. When a read is performed, the encrypted data on the disk is decrypted before leaving the drive. The black line in Figure 1 denotes the clear text data. The drive requires an authentication key (otherwise known as a password) from an outside source before the drive will unlock for read/write operations. In addition to its traditional functions, the storage system defines secure volume groups, gets the authentication keys from the key management service, and passes the key to the correct drive. The orange line in Figure 1 denotes this operation. The storage system makes the encryption function transparent to the hosts and applications. The key management service may include software- or hardware-secure key stores. At the request of the storage system, it will create and assign keys transparently to hosts and applications. The key management service can leverage existing security management policies to define keys and restrict access to keys. Key management includes backup and synchronization, key life-cycle management, auditing, and long-term retention. The key management service can employ existing highavailability and disaster-recovery configurations. The key material can be automatically included within the server backup data and stored offsite. Figure 1
3 This technology is designed to be standardsbased and to be part of an interoperable solution. The Trusted Computing Group (TCG) Storage Work Group has developed a security communication protocol for self-encrypting drives. Supporting transport commands in T10 and T13 are ratified. IEEE is developing a standard authentication key management protocol. All hard drive vendors and major storage vendors are participating in the Trusted Computing Group. Leading storage system vendors and key management vendors are participating in IEEE Ultimately, this technology will apply across the entire data center, as shown in Figure 2. Self-encrypting drives may be in storage arrays, on SANs, NAS, and servers, in data centers, branch offices and small businesses. A unified key management service will support the key management requirements for all forms of storage (as well as other security applications). Proven technology available today is shown highlighted in green in Figure 3. An example is IBM s Key Management for tape encryption. It has been operating with TS1120 encrypting tape drives for over a year, and it has recently been extended to support encryption on their LTO4 tape drives. Seagate full disk encryption (FDE) drives are currently being used in notebooks, and Seagate has announced a desktop version of those drives. This paper will now take a closer look at FDE drive technology as it will be used in enterprise drives. The Hard Drive s Authentication and Encryption Process It may seem impossible that the encrypting hard drive can provide a secure encryption function without also holding some secret, such as the password or encryption key. Clearly, if it did, any hacker learning a secret would have access to the encrypted data on the drive. In fact, the drive contains no secret that, if discovered, would reveal the encrypted data. A simple description of the unlock process shows how this is true. The unlock process is the part of the power-on activity that enables access to the encrypted data. The drive expects a credential to be supplied to it, which it verifies as proof that the drive is being accessed by an authorized user. Figure 2 Figure 3
4 These are the steps of the authentication process with a previously secured drive, as depicted in Figure 4: 1. Authentication The storage system gets the authentication key from the key management service and sends it to the correct locked drive. The drive hashes the authentication key, and compares that with the hashed authentication key that is stored in a secure area of the disk. If the two hashed authentication keys do not match, the authentication process ends, and the drive will not permit reading data from the disk. The drive never sends cipher text from the drive. The drive remains locked. 2. Decrypt the encrypted encryption key If the two hashes match, the drive is then unlocked and the drive uses the authentication key it received from the storage system to decrypt a copy of the encryption key, which was previously encrypted with the authentication key. The encrypted encryption key is stored in a secure area of the disk. This authentication process occurs when the drive is first powered on. After the authentication process is successfully completed, the drive is unlocked until the next time it is powered down. The authentication process does not repeat with each read and write operation. The authentication process does not occur again until the next time the drive is powered up. 3. Clear encryption key encrypts and decrypts the data. The clear-text encryption key is then used to encrypt data to be written to the disk, and to decrypt data that is being read from the disk. The drive now works in a standard fashion during data transfers with encryption and decryption occurring in the background transparently. Change of Ownership This section covers the setup process during initial installation of the drive, repurposing of the drive, and disposal. The drive generates its own encryption key, using noise from normal internal drive processes as input for random number generation. When the owner acquires the drive, this embedded encryption key is in clear text form, allowing the end user to use the drive as a normal non-encrypting drive. The drive is in an unsecured state. The drive will always encrypt and decrypt all data that it writes to the disk and reads from the disk; however, authentication will not be required, allowing anyone to write and read the clear text data from the disk. If the owner wishes to use the drive in a secured state, the owner should take steps to lock the drive. To initiate this, the owner should first perform a secure erase, which changes the encryption key. Once the encryption key is changed, any data that had already been written to the disk is unreadable, so normally this operation is performed as soon as the drive is installed. Performing a secure erase prevents a warehouse attack. The owner then establishes a password by entering the SID (proof of ownership) from the drive s external label and sets the password. This password, or authentication key, is used to encrypt the encryption key. The password is also used to lock the drive until the password in given. The drive is now in a secured state. Once the drive is powered down, it will be locked, and when powered up will require authentication before becoming unlocked. Figure 4 If the owner wishes to repurpose the drive; i.e., change the drive from being in a secured state to an unsecured state so that someone else can
5 use the drive, the owner issues the secure erase command, which replaces the encryption key and leaves the drive in an unsecured state, just as it was delivered from the factory. If the drive is believed to be misplaced or stolen, the owner can simply delete all copies of the authentication key, which is equivalent to deleting the encryption key. Security When a drive is decommissioned from the data center, the drive is always in danger of falling into the wrong hands. Figure 5 depicts what potential attackers will have if they obtain this locked drive. Some may assume that because the encryption is performed within the drive, a copy of the encryption key must be kept in the drive. However, as was shown above, the encryption key is not kept in the drive only an encrypted version of the encryption key is kept in the drive. There are no clear text secrets anywhere on the drive; just a fingerprint (hash) of the password. In designing the drive, Seagate assumes an attacker might have complete knowledge of the drive s design and the location of any secrets held by the drive. Since there is no clue on the drive that could result in deciphering the data, knowing the intricate details of the drive s design and construction in no way benefits hackers. Similarly, breaking one drive provides no secrets that would allow the attacker to break other drives more easily. Both the data and the encryption key are encrypted using the AES 128 algorithm, the same encryption algorithm approved by the U.S. government for protecting secret-level classified information. Generally, cipher text exposure can aid an attack. For instance, if the file system on the drive is a well-known structure, a hacker might be able to take advantage of the fact that certain sectors always contain known values to begin an attack on the encryption. Database structures are also well known. But since the self-encrypting drive does not send cipher text from itself, this type of attack is effectively thwarted. Moreover, the drive can lock itself down after a predetermined number of failed authentication attempts. The drive has protected firmware downloads; an attacker cannot insert modified firmware into the drive. The self-encrypting drive does not protect against threats within the data center. If an attacker gets access to a server, for example, and the server can access the unlocked drive, then the attacker will be able to read the clear text coming from the drive. This encryption technology does not replace the data center s access controls; rather it is complementary to those controls. Manageability The data center administrator doesn t need to escrow the encryption key to maintain data recoverability, because the drive keeps encrypted copies of the encryption key in multiple locations on the drive. If the drive lost all instances of its copies, it is likely caused by drive failure, which makes its data unreadable anyway. Additional encryption keys are automatically added with data redundancy each time the data is mirrored onto another self-encrypting drive, that drive will have its own set of encrypted encryption keys. Because the data center administrator doesn t need to escrow the encryption key, the key stays protected within the drive. Figure 5 Separation of authentication and encryption keys provides several management benefits for the user. Because the encryption key itself is encrypted and doesn t leave the drive, the data center administrator doesn t need to change the encryption key periodically; the way a person may change his/her password periodically for security
6 reasons. That means not having to decrypt and re-encrypt the data, a highly resource-intensive process. The authentication key can be changed as often as desired, without requiring reencryption. Should a storage administrator leave or a new operator arrive, their rights to access the storage can be incorporated without affecting the encrypted data. Secure erase involves simply deleting the encryption key or all copies of the authentication key. If the data center administrator wishes to repurpose a drive, the encryption key in the drive can be changed, making the data on the disk unreadable and the drive ready for use by someone else. If the owner wants to return the drive to the manufacturer under warranty, it can be done after performing a secure erase, which lets the manufacturer analyze the drive without exposing the user data. Without encryption, if the owner doesn t want the manufacturer to see the data, they don t even return the drive, losing the benefits of warranty and preventing the manufacturer from learning from the failure to improve future drives. It s easy to add disk drives with different embedded encryption algorithms to an existing array. The data center can have a mix of encryption algorithms in the same array, because the encryption algorithm is transparent to the system. As drive models change and newer encryption technology gets incorporated into hard drives, they can be intermixed with older drives in storage systems that support encryption without making any changes specific to the new drives higher level of protection. Performance The self-encrypting hard drive uses hardwarebased encryption. The encryption engine is in the controller ASIC. There is an encryption engine dedicated to each port on the drive. The encryption engine matches each drive port s maximum speed. Encryption will not slow the system down. Even better, this scales automatically. As more drives are added, the encryption bandwidth increases commensurately. The data center administrator doesn t have to think about balancing encryption workloads when adding more drives to an array or more arrays to the data center. Conclusion Data center administrators have good reason to want to encrypt their data at rest. This technology addresses those reasons and the concerns that have prevented encryption of data at rest in the data center. It is simple: the data is secure the moment a drive is removed from the system. A drive may be compromised, but it will not expose the data. The fear of losing the authentication key and being unable to decrypt one s own data is addressed with proven key management capabilities, operational in the largest financial businesses. Keys can be securely backed up, replicated and mirrored in disaster-recovery centers. Self-encrypting hard drives also address questions of complexity, interoperability, performance and cost. The technology is designed to be standards-based for optimal manageability and interoperability, and all major hard drive manufacturers are participating in the standards activity. Also, standards drive volume and competition, which drives cost. This technology is designed to be integrated into standard products. The encryption is transparent to normal storage management and end users. Performance scales linearly, automatically. Encryption in the drive provides superior performance, manageability and security. For that reason, many analysts, system manufacturers and government agencies like the NSA are suggesting it should be done there. The bottom line: This is a significant leap forward to improve security and management in the world s data centers. AMERICAS Seagate Technology LLC 920 Disc Drive, Scotts Valley, California 95066, United States, ASIA/PACIFIC Seagate Technology International Ltd Ang Mo Kio Avenue 5, Singapore , EUROPE, MIDDLE EAST AND AFRICA Seagate Technology SAS , rue de Silly, 92773, Boulogne-Billancourt Cedex, France Copyright 2007 Seagate Technology LLC. All rights reserved. Printed in USA. Seagate, Seagate Technology and the Wave logo are registered trademarks of Seagate Technology LLC in the United States and/or other countries. All other trademarks or registered trademarks are the property of their respective owners. Seagate reserves the right to change, without notice, product offerings or specifications. Seagate does not guarantee the accuracy of the information contained on this document. The information provided on this document does not constitute legal advice and should not be relied upon as such. You should consult with your own legal counsel for such advice. Additionally, the information contained on this document is current as of the date indicated herein and as such this document may not reflect changes in the law following this date. Publication Number: TP US, November 2007
Seagate Instant Secure Erase Deployment Options
Technology Paper Seagate Instant Secure Erase Introduction When hard drives are retired and moved outside the data centre into the hands of others, the data on those drives is put at significant risk.
128-Bit Versus 256-Bit AES Encryption
Technology Paper 128-Bit Versus 256-Bit AES Encryption Authentication Module Encryption Engine Background There is some confusion around the market for full disk encryption (FDE) products. Seagate Technology
Self-encrypting drives (SED): helping prevent data loss, theft, and misplacement
Self-encrypting drives (SED): helping prevent data loss, theft, and misplacement White paper Version: 1.0 Updated: Abstract: This white paper introduces Infortrend self-encrypting drive technology, or
Data Security Using TCG Self-Encrypting Drive Technology
Data Security Using TCG Self-Encrypting Drive Technology June 11, 2013 2:00PM EDT Copyright 2013 Trusted Computing Group 1 Copyright 2013 Trusted Computing Group 2 Tom Coughlin, Founder, Coughlin Associates.
Solid-State Drives with Self-Encryption: Solidly Secure
Solid-State Drives with Self-Encryption: Solidly Secure 09/22/2011 Michael Willett Storage Security Strategist SAMSUNG SOLID STATE DRIVES Solid-State Drives SSD ADVANTAGES SOLID STATE DRIVES Save $$ on
Data-at-Rest Encryption Addresses SAN Security Requirements
Data-at-Rest Encryption Addresses SAN Security Requirements QLogic 2500 Series Fibre Channel Adapters Meet Enterprise Security Needs Key Findings SAN security via encryption is necessary for protecting
Keep Your Data Secure: Fighting Back With Flash
Keep Your Data Secure: Fighting Back With Flash CONTENTS: Executive Summary...1 Data Encryption: Ensuring Peace of Mind...2 Enhanced Encryption and Device Decommission in the Enterprise...3 Freeing Up
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
XTREMIO DATA AT REST ENCRYPTION
White Paper XTREMIO DATA AT REST ENCRYPTION Abstract Data at Rest Encryption is a mandatory requirement in various industries that host private or sensitive data. This white paper introduces and explains
Seagate Secure Technology
Seagate Secure Technology Marketing Bulletin Frequently Asked Questions What is the value of a self-encrypting drive (SED)? SEDs ensure user data can be quickly deleted (erased) using standard drive commands,
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
Solutions for Encrypting Data on Tape: Considerations and Best Practices
Solutions for Encrypting Data on Tape: Considerations and Best Practices NOTICE This white paper may contain proprietary information protected by copyright. Information in this white paper is subject to
Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.
Technical Note Installing Micron SEDs in Windows 8 and 10 TN-FD-28: Installing Micron SEDs in Windows 8 and 10 Introduction Introduction Self-encrypting drives (SEDs) can provide an effective way of protecting
Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution
Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution NOTICE This Technology Brief may contain proprietary information protected by copyright. Information
Perceptions about Self-Encrypting Drives: A Study of IT Practitioners
Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Executive Summary Sponsored by Trusted Computing Group Independently conducted by Ponemon Institute LLC Publication Date: April 2011
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant Flash Memory Summit 2014 Santa Clara, CA 1 The Problem 2005-2013: over 864,108,052
Increase Database Performance by Implementing Cirrus Data Solutions DCS SAN Caching Appliance With the Seagate Nytro Flash Accelerator Card
Implementing Cirrus Data Solutions DCS SAN Caching Appliance With the Seagate Nytro Technology Paper Authored by Rick Stehno, Principal Database Engineer, Seagate Introduction Supporting high transaction
Data Security using Encryption in SwiftStack
Data Security using Encryption in SwiftStack May 2015 Copyright 2015 SwiftStack, Inc. swiftstack.com Page 1 of 11 Table of Contents Introduction... 3 Defining Three Threat Models... 3 Encrypted Data and
Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer
Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer The Data Breach Epidemic Continues.. 1 Data Encryption Choices for Businesses................... 2 The Hardware
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide
Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide Securing sensitive client and company data is becoming an IT task of paramount importance. Often
EMC Symmetrix Data at Rest Encryption
Detailed Review Abstract This white paper provides a detailed description of EMC Symmetrix Data at Rest Encryption features and operations. March 2011 Copyright 2010, 2011 EMC Corporation. All rights reserved.
DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE. By Libby McTeer
DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE By Libby McTeer CONTENTS ABSTRACT 3 WHAT IS ENCRYPTION? 3 WHY SHOULD I USE ENCRYPTION? 3 ENCRYPTION METHOD OVERVIEW 4 LTO4 ENCRYPTION BASICS 5 ENCRYPTION
EMC VMAX3 DATA AT REST ENCRYPTION
EMC VMAX3 DATA AT REST ENCRYPTION ABSTRACT In the interconnected world, data and intellectual property is the highest value currency which can be held by corporations. From recent newsworthy examples,
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
EMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
Management of Hardware Passwords in Think PCs.
Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution
1 Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution Table of Contents What s New? Target Customers Customer Benefits Competitive Positioning Technical Sales Questions General Sales
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
Encrypted SSDs: Self-Encryption Versus Software Solutions
Encrypted SSDs: Self-Encryption Versus Software Solutions Michael Willett Storage Security Strategist and VP Marketing Bright Plaza Flash Memory Summit 2015 Santa Clara, CA 1 The Problem 2005-2013: over
ACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
Dell Compellent 6.5 SED Reference Architecture and Best Practices
Dell Compellent 6.5 SED Reference Architecture and Best Practices Dell Storage Technical Solutions May 2014 A Dell Reference Architecture Revisions Date May 2014 Description Initial release THIS WHITE
IBM System Storage DR550
An innovative information-retention solution IBM System Storage DR550 Highlights Repository for all kinds of Offers low TCO by using multiple content structured and storage tiers (disk, tape, unstructured
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
Why cloud backup? Top 10 reasons
Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking
Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like
Securing Data in the Cloud
Securing Data in the Cloud Meeting the Challenges of Data Encryption and Key Management for Business-Critical Applications 1 Contents Protecting Data in the Cloud: Executive Summary.....................................................
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Thales e-security keyauthority Security-Hardened Appliance with IBM Tivoli Key Lifecycle Manager Support for IBM Storage Devices
> Thales e-security keyauthority Security-Hardened Appliance with IBM Tivoli Key Lifecycle Manager Support for IBM Storage Devices WHITE PAPER November 2011 www.thales-esecurity.com TABLE OF CONTENTS THE
Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation
Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified
A Strategic Approach to Enterprise Key Management
Ingrian - Enterprise Key Management. A Strategic Approach to Enterprise Key Management Executive Summary: In response to security threats and regulatory mandates, enterprises have adopted a range of encryption
Samsung SED Security in Collaboration with Wave Systems
Samsung SED Security in Collaboration with Wave Systems Safeguarding sensitive data with enhanced performance, robust security, and manageability Samsung Super-speed Drive Secure sensitive data economically
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Introduction Patient privacy has become a major topic of concern over the past several years. With the majority of
White. Paper. The SMB Market is Ready for Data Encryption. January, 2011
White Paper The SMB Market is Ready for Data Encryption By Mark Peters January, 2011 This ESG White Paper was commissioned by Tandberg Data and is distributed under license from ESG. 2011, Enterprise Strategy
WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY
WHITE PAPER WHY ORGANIZATIONS NEED LTO-6 TECHNOLOGY TODAY CONTENTS Storage and Security Demands Continue to Multiply.......................................3 Tape Keeps Pace......................................................................4
Service Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures
1. Introduction 1.1. Purpose and Background 1.2. Central Coordinator Contact 1.3. Payment Card Industry Data Security Standards (PCI-DSS) High Level Overview 2. PCI-DSS Guidelines - Division of Responsibilities
Intel RAID Controller Premium Feature Key Training
Intel RAID Controller Premium Feature Key Training AXXRPFKSNSH Snapshot Recovery AXXRPFKDE Self Encrypting Drive (SED) AXXRPFKSSD SSD Cache with Fastpath Note: Graphics for this training is based on RAID
2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
SECURITY POLICIES AND PROCEDURES
2014 WorldEscrow N.V./S.A. SECURITY POLICIES AND PROCEDURES This document describes internal security rules within the WorldEscrow N.V./S.A. organization. Content 1) Employee Responsibilities... 1 2) Use
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services Page 2 of 8 Introduction Patient privacy has become a major topic of concern over the past several years. With the majority
User s Guide Part 1. Enterprise Self-Encrypting Drives
User s Guide Part 1 Enterprise Self-Encrypting Drives 100515636 Rev. A August 2009 2009, Seagate Technology LLC All rights reserved. Publication number: 100515636, Rev. A August 2009 Seagate, Seagate Technology
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
CyberSource Payment Security. with PCI DSS Tokenization Guidelines
CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance
Secure Cross Border File Protection & Sharing for Enterprise Product Brief CRYPTOMILL INC
C NNECTED Circles of Trust Secure Cross Border File Protection & Sharing for Enterprise Product Brief www.cryptomill.com product overview OVERVIEW Connected Circles of Trust is an endpoint data security
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Hardware versus Software
Sponsored by Seagate Hardware versus Software A Usability Comparison of Software-Based Encryption with Seagate DriveTrust Hardware-Based Encryption A SANS Whitepaper September 2007 Written by: J.D. Hietala
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Chapter 8: Security Measures Test your knowledge
Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
Aegis Padlock for business
Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration
Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta
Read this guide and you ll discover:
BUSINESS ADVISOR REPORT Provided as an educational service by: Rick Reynolds, General Manager Read this guide and you ll discover: What remote, offsite, or managed backups are, and why EVERY business should
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption
Whitepaper What You Need to Know About Infrastructure as a Service (IaaS) Encryption What You Need to Know about IaaS Encryption What You Need to Know About IaaS Encryption Executive Summary In this paper,
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
Securing Data at Rest ViSolve IT Security Team
Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1
The Case For Secure Email
The Case For Secure Email By Erik Kangas, PhD, President, Lux Scientiae, Incorporated http://luxsci.com Contents Section 1: Introduction Section 2: How Email Works Section 3: Security Threats to Your Email
HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
Learn the essentials of virtualization security
Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage
