Bloombase Spitfire StoreSafe Storage Security Server. Bloombase Technologies

Size: px
Start display at page:

Download "Bloombase Spitfire StoreSafe Storage Security Server. Bloombase Technologies"

Transcription

1 Bloombase Spitfire StoreSafe Storage Security Server Bloombase Technologies

2 Bloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire SOA Security Server Bloombase Spitfire Message Security Server Bloombase Keyparc Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire Edge Security Suite Bloombase Spitfire Identity Security Server

3 Overview

4 Enterprise Data At-Rest In Risk Sensitive data are stored in clear-text in storage systems with minimal access control vulnerable to core attacks Hosts and applications require data access in plain

5 How StoreSafe Protects Your Data On-the-fly nondisruptive application transparent encryption and unencryption Proxy Bump-in-thewire

6 Why Traditional Methods Are Inadequate File encryption utilities mcrypt, ccrypt, zip Only for static files, not for dynamic files, e.g. database Database encryption tools Oracle crypto package Tremendous 2 nd development efforts at database tier Huge performance impact, not for business intelligence Crypto tools openssl, JCE, Microsoft capicom, HSM Very steep learning curve Tremendous 2 nd development efforts at application tier Not for business intelligence applications Security = High cost + SkillN +Slow + Instability + Insecure

7 StoreSafe Benefits Secures operational data in databases Protect backup/offsite/remote data from electronic and hardware theft Meet IT governance compliance requirements Assure digital corporate assets integrity Protects websites from deface and assure data integrity Enforce effective change management High ROI lawsuits and worst, bankruptcy Low TCO - One solution for all applications

8 StoreSafe Benefits Management Immediate regulatory compliance Hardware and software independent Application transparent On-the-fly encryption/decryption No programming required No application changes No user behavior changes OS independent Hardware independent

9 Functions and Features

10 Transparent Encryption and Unencryption Fully automated data encryption and unencryption for authorized clients On-premises: SAN, NAS, DAS, CAS, Object Store, etc Cloud: RESTful

11 Features StoreSafe virtualizes physical storage systems Virtual storage sub-system created providing trusted/decrypted/verified replica of physical storage Supports SAN, DAS, NAS, CAS and cloud storage Data protection Access control Privacy Integrity

12 Features Level of protection Disk / Block File Object Hardware and software independent Application transparent On-the-fly encryption/decryption/watermark verification

13 Features No programming required No application changes No user behavior changes File-system independent Works with all file-system types supported by the OS Entensive OS support Application independent Works with virtually all applications

14 Features Plug-in architecture for future cipher upgrades Web-based management console NIST FIPS validated cryptographic module PKCS#11 hardware security module support Chinese National OSCCA crypto module support

15 Industry Proven Security Industry standard cipher algorithm support Regional and special cipher support IEEE 1619 compliant OASIS KMIP support NIST FIPS validated

16 Security Accreditations Security NIST FIPS validated (NIST Certificate #1241) Algorithms NIST FIPS-197 AES encryption and decryption (NIST Certificate #1041) RSA and DSA public key cryptography (NIST Certificate #496) SHA hash generation (NIST Certificate #991) Hash Message Authentication Code HMAC (NIST Certificate #583) Random Number Generator (NIST Certificate #591)

17 Security Accreditations Algorithms NIST FIPS DES encryption and decryption NTT/Mitsubishi Electric Camellia encryption/decryption DES, RC4, RC2, CAST5 encryption and decryption 512, 1024 and 2048 bit public key cryptography MD5 hash generation Standards IEEE 1619 storage in security

18 Unified Storage Support Block storage based, file based, object based FCP, FCoE, iscsi NFS, CIFS HTTP, WEBDAV RESTful cloud

19 Unified Storage Support Fiber Channel Protocol (FCP) Small Computer System Interface (SCSI) Internet SCSI (iscsi) Network File System (NFS) Common Internet File System (CIFS) File Transfer Protocol (FTP) Hyper Text Transfer Protocol (HTTP) Representational State Transfer (REST)

20 Storage System Support Storage Area Network (SAN) Network Attached Storage (NAS) Direct Attached Storage (DAS) Just a Bunch Of Disk (JBOD) SCSI-based local disk arrays Content Addressable Storage (CAS) Cloud storage Object storage, etc

21 Proprietary Object and Cloud Storage Support EMC Atmos EMC Centera Microsoft Windows Azure Amazon Elastic Block Store (EBS) IBM Cloud Caring CAStor / Dell DX Object Storage, etc

22 File System Support File system independent Raw / Uncooked Solaris UFS Symantec Veritas VxFS IBM JFS HPFS Red Hat GFS XFS Linux Ext3 Windows NTFS, FAT32 and FAT CDFS, etc

23 Database Support Supports all database systems Oracle IBM DB2 IBM Informix Sybase Microsoft SQLServer MySQL Hadoop, etc

24 Application Support Native Java client library Native C client library Java RMI connectivity Web Services connectivity Socket connectivity, etc

25 Appliance Platform Support Hardware architecture Intel x86-based Intel Itanium-2 AMD64 based IBM PowerPC based Appliance operating platform Bloombase SpitfireOS

26 Operating Platform Support IBM AIX IBM z/os IBM i5/os HP-UX Oracle Sun Solaris Linux Windows Mac OS X, etc

27 Virtual Platform Support VMware ESX, ESXi, Server Red Hat KVM Citrix XenServer Oracle VirtualBox Microsoft Hyper-V IBM PowerVM, etc

28 Compute Cloud Platform Support EMC Atmos Windows Azure Amazon Elastic Compute Cloud (EC2), etc

29 Key Management Stored separately from encrypted information Key vault protected by AES-256 strong encryption Supports 3 rd party PKCS#11 HSMs and KMIP-compliant key managers

30 Host Security and Access Control User-based authentication: LDAP, MSAD, Kerberos, CHAP Host-based authentication: network address, LUN mask

31 High Availability Spitfire High Availability Module to provide Automated failover of nodes or load-balancing Cluster monitoring Cluster management Configuration synchronization Spitfire Quorum Server to strengthen robustness of Spitfire cluster and avoid potential split-brain scenario

32 Management Web-based and CLI management consoles Privilege-based administrator access control Separation of duties (SoD) Recovery quorum Operator smart tokens

33 Network Management SNMP (v1, v2, v3) Syslog Windows Event Monitor Audit trail Log viewer and export Dashboard

34 Audit Trail and Logging Customizable system log Full storage access audit trail Web-based management console accessible Log export and digital signing :23:47,798 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\movie_0001.wmv, from : / , by : demo :23:47,801 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\movie_0001.wmv, from : / , by : demo :23:47,804 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\movie_0001.wmv, from : / , by : demo :23:47,807 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\movie_0001.wmv, from : / , by : demo :23:47,810 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\movie_0001.wmv, from : / , by : demo :23:47,812 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\movie_0001.wmv, from : / , by : demo :23:47,815 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\movie_0001.wmv, from : / , by : demo :23:47,875 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\movie_0001.wmv, from : / , by : demo :24:56,751 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/, from : / , by : demo :24:58,263 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/movie_0001.wmv, from : / , by : demo :28:32,729 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/movie_0001.wmv, from : / , by : demo :30:20,340 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/, from : / , by : demo :30:21,621 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/movie_0001.wmv, from : / , by : demo :30:38,467 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/movie_0001.wmv, from : / , by : demo :30:57,152 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/movie_0001.wmv, from : / , by : demo1

35 Product Editions StoreSafe appliance with built-in SpitfireOS StoreSafe QEMU OVF-compliant virtual appliance StoreSafe for Windows StoreSafe for Linux StoreSafe for IBM AIX StoreSafe for HPUX StoreSafe for Solaris

36 Specifications Maximum number of CIFS servers/shares: no definite limit Maximum number of NFS servers/shares: no definite limit Maximum number of iscsi targets: no definite limit Maximum number of SAN LUNs: no definite limit Maximum number of RESTful service endpoints: no definite limit

37 Technology In Depth

38 Inside StoreSafe Application, server and storage transparent Automated encryption Turnkey and immediate regulatory compliance Scale-up and scale-out Cost-effective High availability ready for mission critical applications

39 Storage Cryptography Transparency Extract payload from storage commands (SCSI, NFS, REST, etc) Encrypt/decrypt/verify storage contents on-the-fly and recompose cryptoprocessed commands

40 Why Now Not Earlier? Advancement in solid state and network technologies Network speed far excels storage speed Multi-core processors Multi-processor systems High-performance computing systems

41 Ready For Giga/Tera/Petabyte Data? Storage network access protocols Block based rather than file based Random access rather than sequencial On-demand encryption/decryption Not giga/tera/peta-byte but kilo/byte!!!

42 Modular Pluggable Cipher Architecture Pluggable cipher architecture for future cipher upgrade User-Customed cipher support Out of the box ciphers - AES, 3DES, DES, Twofish, Blowfish, RC2, RC4, RC5, RC6, Camellia, SEED, ARIA, etc

43 Adaptive Block-based Encryption Random accessible On-demand block-based data encryption/decryption User-defined block size for I/O optimization Enterprise applications access storage block-by-block to reduce I/O overheads and latency Some applications (e.g. Oracle) allow user to configure data unit size to boost application performance User customizable unit of encryption size

44 Round Trip Reduction Encryption block size smaller than application unit of access I/O round trips Cipher re-initialization

45 Payload Reduction Encryption block size larger than application unit of access Encrypt and un-encrypt more than needed

46 Use Cases

47 Share/File-based Encryption StoreSafe appliance with network interface cards (NIC) Transparent file encryption for NFS, CIFS, WebDAV, FTP, etc Protocol conversion

48 iscsi Block-based Encryption StoreSafe appliance with iscsi host-bus adapters (HBA), converged network adapters (CNA) or simply NIC Transparent block storage encryption for iscsi targets StoreSafe virtual storage presented as iscsi targets

49 Fiber Channel SAN Block-based Encryption StoreSafe appliance with fiber channel (FC) host-bus adapters (HBA) Transparent block storage encryption for LUNs of SAN targets StoreSafe virtual storage presented as FC targets

50 Object-based Encryption StoreSafe appliance with network interface cards (NIC) Transparent object encryption for RESTful object store, cloud storage and content addressable storage (CAS) Protocol proprietary object store including EMC Atmos, Dell DX, etc

51 Product Roadmap

52 StoreSafe Product Roadmap

53 Questions? Comments?

54 Conclusion Protect Your Corporate Data Protect your customers Corporate governance Implement Data Protection Access Control Digital Asset Encryption

55 Your Action Items Review your corporate perimeter security measures Identify your enterprise data Classify your enterprise data into levels of security Devise an encryption strategy based on the classification Evaluate impact to users and applications Implement hassle free transparent protection to your corporate storage and message systems

56

Bloombase StoreSafe Security Best Practice

Bloombase StoreSafe Security Best Practice Bloombase StoreSafe Security Best Practice How to Harden Bloombase StoreSafe and Get the Most from Bloombase Next-Generation Data At-Rest Security B E S T P R A C T I C E Bloombase - Next Generation Data

More information

Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption

Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption Bloombase Interoperability Program P1 2015 Bloombase, Inc. Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption April, 2015 Executive Summary Thales e-security

More information

Alliance Key Manager Solution Brief

Alliance Key Manager Solution Brief Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major

More information

The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Bloombase Transparent Data Security: Application Transparent Non-Disruptive Data At-Rest Encryption for Dell Compellent Storage Area Network (SAN) and EqualLogic Network Attached Storage (NAS) This Technical

More information

EMC Information Protection Software Compatibility Guide - Last Updated: June 30, 2008

EMC Information Protection Software Compatibility Guide - Last Updated: June 30, 2008 EMC Information Protection Software Compatibility Guide - Q208 Page 1 of 150 EMC Information Protection Software Compatibility Guide - Last Updated: June 30, 2008 WARNING: To get the latest version of

More information

Compatibility and Support Information Nasuni Corporation Natick, MA

Compatibility and Support Information Nasuni Corporation Natick, MA Information Nasuni Corporation Natick, MA Contents 1. Introduction... 1 2.... 1 2.1. Virtualization platforms... 1 3. Filers... 2 3.1. Filer properties... 2 3.2. Clients... 3 3.3. VSS... 7 3.4. Security...

More information

Dell NetVault Backup. Compatibility Guide

Dell NetVault Backup. Compatibility Guide Dell NetVault Backup 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

10971: Storage and High Availability with Windows Server

10971: Storage and High Availability with Windows Server 10971: Storage and High Availability with Windows Server Prerequisites Before Attending this course, students must have: Knowledge and real world experience working day to day with Windows Server and Windows

More information

Storage and High Availability with Windows Server 10971B; 4 Days, Instructor-led

Storage and High Availability with Windows Server 10971B; 4 Days, Instructor-led Storage and High Availability with Windows Server 10971B; 4 Days, Instructor-led Course Description Get hands-on instruction and practice provisioning your storage requirements and meeting your high availability

More information

SnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009

SnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009 SnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009 1 Table of Contents 1 Introduction... 3 2 ed SnapServer NAS Systems... 3 3 Client Compatibility... 3 3.1 Microsoft Windows... 3 3.2 Apple

More information

Vormetric Data Security Platform Data Sheet

Vormetric Data Security Platform Data Sheet Vormetric Data Security Platform Data Sheet The makes it efficient to manage data-at-rest security across an entire organization. The Vormetric Data Security Platform is a broad set of products that share

More information

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous

More information

IBM InfoSphere Guardium

IBM InfoSphere Guardium IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance Jānis Bērziņš, DPA 08.11.2012 Data is the key target for security breaches.. and Database Servers Are The Primary Source of Breached

More information

A virtual SAN for distributed multi-site environments

A virtual SAN for distributed multi-site environments Data sheet A virtual SAN for distributed multi-site environments What is StorMagic SvSAN? StorMagic SvSAN is a software storage solution that enables enterprises to eliminate downtime of business critical

More information

AN IN-DEPTH VIEW. Cleo Cleo Secure File Sharing An In-Depth View

AN IN-DEPTH VIEW. Cleo Cleo Secure File Sharing An In-Depth View AN IN-DEPTH VIEW 1 OVERVIEW ABOUT THIS PAPER In today s business, people need to share all types and sizes of files with colleagues, customers, and suppliers. Too many business users are using non-sanctioned,

More information

FAMILY BROCHURE Sensitive data is everywhere. So are we.

FAMILY BROCHURE Sensitive data is everywhere. So are we. WHERE IS YOUR DATA? WHERE ARE YOUR KEYS? Structured Data Unstructured Data Live Data 1 Site-to-site Virtualized Data 2 Stored & Archived Data 3 Key Management and Root of Trust 4 SaaS Apps Access WHO AND

More information

HP StorageWorks P4000 G2 SAN Solutions

HP StorageWorks P4000 G2 SAN Solutions P4300 G2 7.2 TB SAS Starter SAN Solution P4300 G2 16 TB MDL SAS Starter SAN Solution P4500 G2 14.4 TB SAS Virtualization SAN Solution P4500 G2 28.8 TB SAS Multi-Site SAN Solution P4500 G2 120 TB MDL SAS

More information

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc. Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety

More information

10971B: Storage and High Availability with Windows Server

10971B: Storage and High Availability with Windows Server 10971B: Storage and High Availability with Windows Server Course Details Course Code: Duration: Notes: 10971B 4 days This course syllabus should be used to determine whether the course is appropriate for

More information

2014 IBM Corporation

2014 IBM Corporation 2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session

More information

PROTECTING DATA IN MULTI-TENANT CLOUDS

PROTECTING DATA IN MULTI-TENANT CLOUDS 1 Introduction Today's business environment requires organizations of all types to reduce costs and create flexible business processes to compete effectively in an ever-changing marketplace. The pace of

More information

SnapServer NAS GuardianOS 6.5 Compatibility Guide May 2011

SnapServer NAS GuardianOS 6.5 Compatibility Guide May 2011 SnapServer NAS GuardianOS 6.5 Compatibility Guide May 2011 1 Table of Contents 1 Introduction... 3 2 Supported SnapServer NAS Systems... 3 3 Client Compatibility... 3 3.1 Recommended Active Concurrent

More information

Pricing & Licensing Guide

Pricing & Licensing Guide Pricing & Licensing Guide arcserve Unified Data v5 Welcome to the Pricing & Licensing Overview for arcserve Unified Data. in this guide, you will find a high level product overview, understand the product

More information

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

IST Infrastructure Standards November 28, 2006

IST Infrastructure Standards November 28, 2006 IST Infrastructure s November 28, 2006 Below are standards for IST infrastructure. If a system is not listed in the standards below, it should not be taken as an indication that it will not be supported.

More information

Chapter 1: EMC NetWorker Fast Start... 5 EMC NetWorker Fast Start 7.6 SP1, 7.6, 7.5 SP1, 7.4 SP3 and 7.4 SP2 5

Chapter 1: EMC NetWorker Fast Start... 5 EMC NetWorker Fast Start 7.6 SP1, 7.6, 7.5 SP1, 7.4 SP3 and 7.4 SP2 5 EMC Software Compatibility Guide January 5, 2012 Contents Chapter 1: EMC Fast Start... 5 EMC Fast Start 7.6 SP1, 7.6, 7.5 SP1, 7.4 SP3 and 7.4 5 Chapter 2: EMC... 9 EMC Server and Client Software 7.6,

More information

How To Encrypt Data On A Network With Cisco Storage Media Encryption (Sme) For Disk And Tape (Smine)

How To Encrypt Data On A Network With Cisco Storage Media Encryption (Sme) For Disk And Tape (Smine) Data Sheet Cisco Storage Media Encryption for Disk and Tape Product Overview Cisco Storage Media Encryption (SME) protects data at rest on heterogeneous tape drives, virtual tape libraries (VTLs), and

More information

Best practices for data migration.

Best practices for data migration. IBM Global Technology Services June 2007 Best practices for data migration. Methodologies for planning, designing, migrating and validating data migration Page 2 Contents 2 Executive summary 4 Introduction

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

Licensing Guide for CA ARCserve & CA XOsoft Products

Licensing Guide for CA ARCserve & CA XOsoft Products Licensing Guide for CA ARCserve & CA XOsoft Products CA ARCserve and CA XOsoft Product Pricing Models CA ARCserve and CA XOsoft products offer a multi-layered data protection solution that combines highperformance

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Enabling Technologies for Distributed and Cloud Computing

Enabling Technologies for Distributed and Cloud Computing Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading

More information

ABC of Storage Security. M. Granata NetApp System Engineer

ABC of Storage Security. M. Granata NetApp System Engineer ABC of Storage Security M. Granata NetApp System Engineer Encryption Challenges Meet Regulatory Requirements No Performance Impact Ease of Installation Government and industry regulations mandate protection

More information

www.goanywhere.com Version 3.5.0 Listed below are the detailed features in GoAnywhere Services shown with all the licensed options.

www.goanywhere.com Version 3.5.0 Listed below are the detailed features in GoAnywhere Services shown with all the licensed options. Version 3.5.0 Listed below are the detailed features in GoAnywhere Services shown with all the licensed options. File Transfer Protocols SFTP FTP over SSH FTPS FTP over SSL/TLS SCP Secure Copy over SSH

More information

The safer, easier way to help you pass any IT exams. Exam : 000-115. Storage Sales V2. Title : Version : Demo 1 / 5

The safer, easier way to help you pass any IT exams. Exam : 000-115. Storage Sales V2. Title : Version : Demo 1 / 5 Exam : 000-115 Title : Storage Sales V2 Version : Demo 1 / 5 1.The IBM TS7680 ProtecTIER Deduplication Gateway for System z solution is designed to provide all of the following EXCEPT: A. ESCON attach

More information

Best Practices for Data Sharing in a Grid Distributed SAS Environment. Updated July 2010

Best Practices for Data Sharing in a Grid Distributed SAS Environment. Updated July 2010 Best Practices for Data Sharing in a Grid Distributed SAS Environment Updated July 2010 B E S T P R A C T I C E D O C U M E N T Table of Contents 1 Abstract... 2 1.1 Storage performance is critical...

More information

Introduction. Scalable File-Serving Using External Storage

Introduction. Scalable File-Serving Using External Storage Software to Simplify and Share SAN Storage Creating Scalable File-Serving Clusters with Microsoft Windows Storage Server 2008 R2 and Sanbolic Melio 2010 White Paper By Andrew Melmed, Director of Enterprise

More information

Introduction to Gluster. Versions 3.0.x

Introduction to Gluster. Versions 3.0.x Introduction to Gluster Versions 3.0.x Table of Contents Table of Contents... 2 Overview... 3 Gluster File System... 3 Gluster Storage Platform... 3 No metadata with the Elastic Hash Algorithm... 4 A Gluster

More information

Hypervisor Competitive Differences: Beyond the Data Sheet. Chris Wolf Senior Analyst, Burton Group

Hypervisor Competitive Differences: Beyond the Data Sheet. Chris Wolf Senior Analyst, Burton Group Hypervisor Competitive Differences: Beyond the Data Sheet Chris Wolf Senior Analyst, Burton Group Agenda Project background Evaluation criteria Vendor scorecards Project Background Three month Burton Group

More information

C p o y p r y i r g i h g t D t e a t i a lie l d

C p o y p r y i r g i h g t D t e a t i a lie l d of EISOO AnyBackup Appliance Copyright 2003-2012 EISOO Software Co.,Ltd. No company or individual are allowed to copy, distribute and extract all or parts of this document without the permission of EISOO

More information

How To Use Aws.Com

How To Use Aws.Com Crypto-Options on AWS Bertram Dorn Specialized Solutions Architect Security/Compliance Network/Databases Amazon Web Services Germany GmbH Amazon.com, Inc. and its affiliates. All rights reserved. Agenda

More information

Big data Devices Apps

Big data Devices Apps Trends driving IT pressures Cloud Big data Devices Apps Devices: Info Workers Will Erase Boundary Between enterprise And Consumer Technologies. Forrester Research. August 30, 2012 Apps: Gartner: Predicts

More information

SapphireIMS Business Service Monitoring Feature Specification

SapphireIMS Business Service Monitoring Feature Specification SapphireIMS Business Service Monitoring Feature Specification All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission

More information

Alliance AES Encryption for IBM i Solution Brief

Alliance AES Encryption for IBM i Solution Brief Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it

More information

Supported File Systems

Supported File Systems System Requirements VMware Infrastructure Platforms Hosts vsphere 5.x vsphere 4.x Infrastructure 3.5 (VI3.5) ESX(i) 5.x ESX(i) 4.x ESX(i) 3.5 vcenter Server 5.x (optional) vcenter Server 4.x (optional)

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Software Store Option Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner Snow Integration

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution

More information

Course 10971:Storage and High Availability with Windows Server

Course 10971:Storage and High Availability with Windows Server Course 10971:Storage and High Availability with Windows Server Type:Course Audience(s):IT Professionals Technology:Windows Server Level:300 This Revision:B Delivery method: Instructor-led (classroom) Length:4

More information

McAfee Firewall Enterprise 8.2.1

McAfee Firewall Enterprise 8.2.1 Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall

More information

Guardium Change Auditing System (CAS)

Guardium Change Auditing System (CAS) Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity

More information

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File

More information

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides

More information

SOLUTIONS CLOUD - DPS JEUDI 19 NOVEMBRE 2015

SOLUTIONS CLOUD - DPS JEUDI 19 NOVEMBRE 2015 SOLUTIONS CLOUD - DPS JEUDI 19 NOVEMBRE 2015 Christian LE CORRE - DPS Advisory Systems Engineer DATA PROTECTION EVERYWHERE On Premise Virtual Hybrid Born In The Cloud 30 Retention (LTR) BaaS & DRaaS Archive

More information

Netapp Interoperability Matrix

Netapp Interoperability Matrix Netapp Interoperability Matrix FC, FCoE, iscsi and NAS (NFS) Storage Interoperability The Interoperability Matrix (IMT) defines the components and versions that have been qualified and which can be used

More information

Course Description. Course Audience. Course Page - Page 1 of 7

Course Description. Course Audience. Course Page - Page 1 of 7 Course Page - Page 1 of 7 Storage and High Availability with Windows Server M-10971 Length: 4 days Price: $2,495.00 Course Description Get hands-on instruction and practice provisioning your storage requirements

More information

365 Cloud Storage. Security Brief

365 Cloud Storage. Security Brief 365 Cloud Storage Security Brief Overview Surveys reveal time and again that security and data protection concerns are the top barriers to Cloud adoption. At, we take these concerns seriously and have

More information

SapphireIMS 4.0 BSM Feature Specification

SapphireIMS 4.0 BSM Feature Specification SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams

More information

Red Hat Enterprise Linux 6. Stanislav Polášek ELOS Technologies sp@elostech.cz

Red Hat Enterprise Linux 6. Stanislav Polášek ELOS Technologies sp@elostech.cz Stanislav Polášek ELOS Technologies sp@elostech.cz Red Hat - an Established Global Leader Compiler Development Identity & Authentication Storage & File Systems Middleware Kernel Development Virtualization

More information

Storage and High Availability with Windows Server

Storage and High Availability with Windows Server Course 10971A: Storage and High Availability with Windows Server Course Details Course Outline Module 1: Disks and Volumes with Windows Server This module introduces you to different storage technologies.

More information

Securing Data in Oracle Database 12c

Securing Data in Oracle Database 12c Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Encrypting Data at Rest

Encrypting Data at Rest Encrypting Data at Rest Ken Beer Ryan Holland November 2014 Contents Contents Abstract Introduction The Key to Encryption: Who Controls the Keys? Model A: You control the encryption method and the entire

More information

Business Application Continuity CA ARCserve Backup CA ARCserve D2D CA ARCserve Replication and High Availability

Business Application Continuity CA ARCserve Backup CA ARCserve D2D CA ARCserve Replication and High Availability Business Application Continuity CA ARCserve Backup CA ARCserve D2D CA ARCserve Replication and High Availability Tamas.Jung@ca.com CEE RMDM Technical Sales CA Recovery Management R 15 Total protection

More information

CRYPTOGRAPHY AS A SERVICE

CRYPTOGRAPHY AS A SERVICE CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,

More information

Microsoft Windows Apple Mac OS X

Microsoft Windows Apple Mac OS X Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OS X Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-04-02

More information

Datasheet NetApp FAS8000 Series

Datasheet NetApp FAS8000 Series Datasheet NetApp FAS8000 Series Respond more quickly to changing IT needs with unified scale-out storage and industry-leading data management KEY BENEFITS Support More Workloads Run SAN and NAS workloads

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

KeySecure CUSTOMER RELEASE NOTES. Contents. Version: 8.1.0 Issue Date: 2 February 2015 Document Part Number: 007-012896-001, Rev A.

KeySecure CUSTOMER RELEASE NOTES. Contents. Version: 8.1.0 Issue Date: 2 February 2015 Document Part Number: 007-012896-001, Rev A. KeySecure CUSTOMER RELEASE NOTES Version: 8.1.0 Issue Date: 2 February 2015 Document Part Number: 007-012896-001, Rev A Contents Product Description... 3 Key Management... 3 High Performance... 3 Broad

More information

Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION

Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION v 1.0/Updated APRIl 2012 Table of Contents Introduction.... 3 Storage Protocol Comparison Table....4 Conclusion...10 About the

More information

Distributed File System Choices: Red Hat Storage, GFS2 & pnfs

Distributed File System Choices: Red Hat Storage, GFS2 & pnfs Distributed File System Choices: Red Hat Storage, GFS2 & pnfs Ric Wheeler Architect & Senior Manager, Red Hat June 27, 2012 Overview Distributed file system basics Red Hat distributed file systems Performance

More information

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...

More information

SAN TECHNICAL - DETAILS/ SPECIFICATIONS

SAN TECHNICAL - DETAILS/ SPECIFICATIONS SAN TECHNICAL - DETAILS/ SPECIFICATIONS Technical Details / Specifications for 25 -TB Usable capacity SAN Solution Item 1) SAN STORAGE HARDWARE : One No. S.N. Features Description Technical Compliance

More information

Datasheet The New NetApp FAS3200 Series Enables Flash, Clustering to Improve IT Agility and Performance

Datasheet The New NetApp FAS3200 Series Enables Flash, Clustering to Improve IT Agility and Performance Datasheet The New NetApp FAS3200 Series Enables Flash, Clustering to Improve IT Agility and Performance DATA CENTER SOLUTIONS For More Information: (866) 787-3271 Sales@PTSdcs.com KEY BENEFITS Designed

More information

Key & Data Storage on Mobile Devices

Key & Data Storage on Mobile Devices Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography

More information

PART 1: Breaking the Connections

PART 1: Breaking the Connections STORAGE VIRTUALIZATION SEMINAR PRESENTATION DOWNLOAD presented by PART 1: Breaking the Connections Storage virtualization is here, breaking the connection between physical storage infrastructure and the

More information

RSA Digital Certificate Solution

RSA Digital Certificate Solution RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong

More information

Netapp Interoperability Matrix

Netapp Interoperability Matrix Netapp Interoperability Matrix Storage Solution : Snap for Oracle (SMO) NetApp FC, FCoE, iscsi and NAS (NFS) Storage System Interoperability The NetApp Interoperability Matrix (IMT) defines the components

More information

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Citrix MetaFrame XP Security Standards and Deployment Scenarios Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document

More information

Compliance and Security Challenges with Remote Administration

Compliance and Security Challenges with Remote Administration Sponsored by Netop Compliance and Security Challenges with Remote Administration A SANS Whitepaper January 2011 Written by Dave Shackleford Compliance Control Points Encryption Access Roles and Privileges

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4.1 Support Matrix

EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4.1 Support Matrix EMC Smarts SAM, IP, ESM, MPLS, NPM, OTM, and VoIP Managers 9.4.1 Version 9.4.1.0 302-002-262 REV 01 Abstract Smarts 9.4.1 Suite can be installed in a typical or a fully distributed, multi-machine production

More information

Securing Networked Storage: Decru DataFort Appliance

Securing Networked Storage: Decru DataFort Appliance Securing Networked Storage: Decru DataFort Appliance Contents 1. Executive Summary 2. Trends in Data Security and Privacy 3. Current Approaches 4. Decru DataFort Security Appliance 5. Backup, Mirroring

More information

Storage and High Availability with Windows Server

Storage and High Availability with Windows Server CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Course 10971 Storage and High Availability with Windows Server Length: 5 Days Audience: IT Professionals

More information

Symantec NetBackup Appliances

Symantec NetBackup Appliances Symantec NetBackup Appliances Simplifying Backup Operations Geoff Greenlaw Manager, Data Centre Appliances UK & Ireland January 2012 1 Simplifying Your Backups Reduce Costs Minimise Complexity Deliver

More information

Windows Host Utilities 6.0 Installation and Setup Guide

Windows Host Utilities 6.0 Installation and Setup Guide Windows Host Utilities 6.0 Installation and Setup Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.A. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 4-NETAPP

More information

Securing Data at Rest ViSolve IT Security Team

Securing Data at Rest ViSolve IT Security Team Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1

More information

(Scale Out NAS System)

(Scale Out NAS System) For Unlimited Capacity & Performance Clustered NAS System (Scale Out NAS System) Copyright 2010 by Netclips, Ltd. All rights reserved -0- 1 2 3 4 5 NAS Storage Trend Scale-Out NAS Solution Scaleway Advantages

More information

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION

More information

Enabling Technologies for Distributed Computing

Enabling Technologies for Distributed Computing Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies

More information

EMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers

EMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers EMC VPLEX FAMILY Continuous Availability and Data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is

More information

McAfee Firewall Enterprise 8.3.1

McAfee Firewall Enterprise 8.3.1 Configuration Guide Revision A McAfee Firewall Enterprise 8.3.1 FIPS 140-2 The McAfee Firewall Enterprise FIPS 140-2 Configuration Guide, version 8.3.1, provides instructions for setting up McAfee Firewall

More information

Enterprise Manager. Version 6.2. Administrator s Guide

Enterprise Manager. Version 6.2. Administrator s Guide Enterprise Manager Version 6.2 Administrator s Guide Enterprise Manager 6.2 Administrator s Guide Document Number 680-017-017 Revision Date Description A August 2012 Initial release to support version

More information

Huawei OceanStor V3 Converged Storage Interoperability Matrix

Huawei OceanStor V3 Converged Storage Interoperability Matrix Huawei OceanStor V3 Converged Storage Interoperability Matrix Date: 2/7/204 Copyright Huawei Technologies Co., Ltd. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support

More information

EMC Solutions for Disaster Recovery

EMC Solutions for Disaster Recovery EMC Solutions for Disaster Recovery EMC RecoverPoint Daniel Golic, Technology Consultant Banja Luka, May 27 th 2008 1 RecoverPoint 3.0 Overview 2 The CIO s Information Storage and Management Requirements

More information

iscsi: Accelerating the Transition to Network Storage

iscsi: Accelerating the Transition to Network Storage iscsi: Accelerating the Transition to Network Storage David Dale April 2003 TR-3241 WHITE PAPER Network Appliance technology and expertise solve a wide range of data storage challenges for organizations,

More information

Windows Host Utilities 6.0.2 Installation and Setup Guide

Windows Host Utilities 6.0.2 Installation and Setup Guide Windows Host Utilities 6.0.2 Installation and Setup Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.A. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277

More information

EMC NetWorker Software Compatibility Guide. October 13, 2015

EMC NetWorker Software Compatibility Guide. October 13, 2015 EMC Software Compatibility Guide October 13, 2015 NOTE: Compatibility information for 8.2 and later releases, including Module for Microsoft, Module for Databases and Applications, Module for SAP and Module

More information

Infortrend ESVA Family Enterprise Scalable Virtualized Architecture

Infortrend ESVA Family Enterprise Scalable Virtualized Architecture Infortrend ESVA Family Enterprise Scalable Virtualized Architecture R Optimized ROI Ensures the most efficient allocation of consolidated capacity and computing power, and meets wide array of service level

More information

Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4

Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4 Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4 Application Note Abstract This application note explains the configure details of using Infortrend FC-host storage systems

More information

MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved. MySQL Strategy Morten Andersen, MySQL Enterprise Sales Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not

More information