Bloombase StoreSafe Security Best Practice

Size: px
Start display at page:

Download "Bloombase StoreSafe Security Best Practice"

Transcription

1 Bloombase StoreSafe Security Best Practice How to Harden Bloombase StoreSafe and Get the Most from Bloombase Next-Generation Data At-Rest Security B E S T P R A C T I C E Bloombase - Next Generation Data Security info@bloombase.com web Copyright 2014 Bloombase, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase in United States and/or other jurisdictions. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. Item No. BLBS-BP-Bloombase-StoreSafe-Security-Best-Practice-USLET-EN-R6

2 Overview Bloombase StoreSafe provides turnkey, agentless, non-disruptive, application-transparent security of atrest data no matter they are managed at physical data center, virtual data center, or cloud. Unlike traditional encryption tools which aim to work on application level with protection on very fine granularity at the expense of simplicity and performance, Bloombase delivers real-time, high performance, automated encryption and un-encryption of businesssensitive data on storage networking layer. Application-specific data security tools are designed to support proprietary applications on very specific operating platforms. Some of them are even hardwired on very particular editions or versions of an application which make them difficult to extend to other applications. Adding the fact that these tools were built with less of a concern on platform portability, scalability and being future-proof, reason why when it comes to data encryption, customers tend to think it is mission impossible and choose to stay away from it. Bloombase delivers a transformative and unique approach on at-rest data encryption protection that allows customers running any IT infrastructure from application, operating system (OS), storage and datacenter platform, to lock-down their business critical information on storage services with least efforts. More About Bloombase StoreSafe managed in Block-based storage devices File-based network storage services File-systems Sequential mass storage devices Object-based stores Cloud storage Bloombase StoreSafe operates as-if a storage proxy as bump-in-the-wire at the storage path between storage system and host. It presents backend multiprotocol storage targets to hosts as protocolpreserving virtual targets. To backend storage, it works as if it is a host system. Working as a storage proxy, when host applications write data, Bloombase StoreSafe turns plain-text payload contents into cipher-text and stores at backend storage. As host pulls cipher-text data on physical disks of backend storage system, Bloombase StoreSafe un-encrypts the payload and returns the on -demand virtual clear-text to the application. The entire process guarantees no application change, no end user workflow, least impact to the overall IT infrastructure, and wirespeed performance. Bloombase StoreSafe software appliance can be deployed on stand-alone hardware as physical server appliance or on virtual hypervisor as virtual appliance. It can also be deployed as compute instance on the cloud securing off-premise enterprise data enabling low-cost, high availability cloud computing at no expense of data privacy and trust. End result is customers can achieve regulatory compliance and various information confidentiality requirements easily and cost-effectively. Bloombase StoreSafe provides standard-based and security proven encryption protection of at-rest data B E S T P R A C T I C E / 2

3 Cipher Algorithm Bloombase StoreSafe provides a rich set of cipher algorithms to enable customers from around the globe and any market verticals to meet their data encryption needs. Customers are suggested to only choose cipher algorithms that are regarded advanced and secure as recommended by industry leading data security organizations such as NIST and IEEE. A good cipher algorithm of choice is AES which is purpose designed for massive data encryption needs with varying bit lengths 128, 192 and 256 for high speed encryption protection of stored data. IEEE Storage In Security Working Group 1619 standardizes best practices and technologies for organizational customers who need to deal with data protection for long term storage. Encryption Key As a matter of fact, the strength of encryption increases with key sizes. In scenario where an unauthorized entity gets hold of a piece of ciphertext without knowledge of the encryption key ciphering the plain text, the longer the key bit length, the bigger the key search space, and the more combination of bruteforce attacks by exhaustive key search would be needed before the entity can uncover meaningful information. National Security Agency (NSA) recommends the use of AES-256-bit-key for protection of top secret information whereas AES-128-bit-key for information classified secret. For details of Bloombase StoreSafe virtual storage management, please refer to Bloombase StoreSafe Management Console Administration IEEE 1619 mandates the use of XEX-based Tweaked CodeBook mode (TCB) with ciphertext stealing (CTS) XTS-AES for random access type of block storage resources. For details of Bloombase StoreSafe virtual storage management, please refer to Bloombase StoreSafe Management Console Administration B E S T P R A C T I C E / 3

4 Fiber Channel Virtual Storage Security storage volumes over Fiber Channel Protocol (FCP) as virtual storage volumes for transparent storage device encryption. Fiber channel protocol was initially designed to provide networked storage fabric capability as the core storage subsystem in computing infrastructure. The design principle has been as a critical component in a trusted environment. In today s standard, the security elements of FCP can be viewed as relatively basic. The security features serve more for ease of management than to defend from unauthorized access or even attacks. Fiber channel protocol relies on both Logical Unit Number (LUN) masking and zoning methods to logically segregate FC storage resources and provide LUN -based access control to trusted hosts installed with trusted Host Bus Adapters (HBA). Customers are recommended to implement need-toknow and least-privilege principles by provisioning proper zoning and masking of StoreSafe FC virtual storages to trusted hosts only. Customers should also review the configuration by cross-checking with their latest design and implementation play book to ensure full compliance. For details of Bloombase StoreSafe Fiber Channel virtual storage management, please refer to Bloombase StoreSafe Management Console Administration B E S T P R A C T I C E / 4

5 iscsi Virtual Storage Security storage volumes over iscsi as virtual storage volumes for transparent storage device encryption. For details of Bloombase StoreSafe iscsi virtual storage management, please refer to Bloombase StoreSafe Management Console Administration iscsi relies on Challenge Handshake Authentication Protocol (CHAP) for authentication of iscsi clients. The transmission of iscsi data payloads can be secured from network sniffers by use of industry standard Internet Protocol security (IPsec) technology. As a best practice, customers are recommended to choose a strong secret key in form of a passcode for CHAP for Bloombase StoreSafe iscsi virtual storages. The baseline requirement for a secure CHAP secret key should be at least 12 characters long with a combination of upper and lower case letters, numbers and punctuation characters. Customers can also refer to their corporate standard password policy in assignment of CHAP passcode for iscsi type of storage resources in their existing storage infrastructure. Customers are suggested to enable IPsec for StoreSafe iscsi virtual storages to secure transport of iscsi data payload especially in untrusted network environment. IPsec can also be turned on appliance-wide by provisioning embedded IPsec service in Bloombase OS. This ensures all IP-based network storage services be tunneled in IPsec encryption defending network sniffers from capturing plain sensitive data in network channels. Additionally, customers may utilize third party IPsec, SSL or proprietary link encryption hardware to transfer sensitive storage data in cipher-text format. B E S T P R A C T I C E / 5

6 NFS Virtual Storage Security contents of file-system over NFS as virtual storage network shares for transparent storage share and file encryption. NFS was initially designed as an extension of local file -systems to external storage resources. NFS shares can be mounted as if a local file-system for a complete transparent user experience. As NFS was created to for server-side usage, security elements are relatively basic. NFS supports network level access control which governs the set of host addresses be given the permission to access the NFS share. Bloombase StoreSafe tightens the security policy by disallowing access-by-all. Bloombase StoreSafe extends host access control to subnet level allowing flexibility of defining network security policies. Customers are suggested to narrow network access control down to host level as per need-to-know and least-privilege security principles. For deployment over untrusted networks, customers are suggested to utilize IPsec network encryption feature powered by Bloombase OS, or third party network encryption tools to ensure data at-rest NFS services are delivered securely to client hosts. For details of Bloombase StoreSafe NFS virtual storage configurations, please refer to Bloombase StoreSafe Management Console Administration CIFS Virtual Storage Security contents of file-system over CIFS as virtual storage network shares for transparent storage share and file encryption. CIFS was initially created by Microsoft to provide file sharing service over network to Windows end users. In contrast to NFS, the design principle of CIFS has been largely user-centric. Windows-based network sharing service over CIFS protocol allows anonymous/guest access to the contents. As for user identity access control, standard user name and password authentication has been used. Bloombase StoreSafe hardens the CIFS virtual storage services by disallowing guest access. Bloombase StoreSafe also extends access control from userbased to encapsulate as well network host-based. Customers are recommended to assign CIFS virtual storages to host address and users based on need-toknow and least-privilege security best practice. Customers should enforce the use of strong passwords for CIFS authentication by assigning passphrases of at least 8 characters in length with a combination of upper-case and lower-case letters, numbers and punctuations. Customers are recommended to change their passwords periodically to ensure maximum security for user identity management. In case of deployment of Bloombase CIFS virtual storage resources in untrusted network environment, customers are also suggested to enable IPsec function in B E S T P R A C T I C E / 6

7 Bloombase OS or utilize third party network encryption tools to ensure end-to-end privacy on transmission of CIFS data payloads. For details of Bloombase StoreSafe CIFS virtual storage configurations, please refer to Bloombase StoreSafe Management Console Administration REST Virtual Storage Security contents of RESTful type of software-defined storage service endpoints as virtual storage network services for transparent storage object encryption. Bloombase StoreSafe supports a range of RESTful protocols in particular AWS S3, EMC Atmos and ViPR, OpenStack Swift, etc. As RESTful storage services are purpose designed for usage over untrusted network environment, the security model design is relatively advanced and complete. Bloombase StoreSafe extends the model by adding network based access control over host addresses and subnets. Customers are recommended to assign strong shared secret for user authentication. Different REST service has its own requirement on the actual contents of shared secret or password. Customers are advised to consult individual service provider for best practice of picking a strong passphrase as shared secret. Bloombase StoreSafe disallows REST virtual storage services to be delivered over plain-text HTTP. Bloombase StoreSafe mandates REST data payloads to be exchanged only by HTTP over SSL to ensure end-toend network secrecy, trust and integrity. For details of Bloombase StoreSafe RESTful virtual storage configurations, please refer to Bloombase StoreSafe Management Console Administration B E S T P R A C T I C E / 7

8 Additional Bloombase Products and Add-ons Bloombase StoreSafe Bloombase StoreSafe Storage Security Server provides application transparent high-speed encryption protection of storage systems enabling enterprises to meet various information security regulatory compliance requirements easily and cost-effectively. Bloombase StoreSafe integrates seamlessly with Bloombase KeyCastle Key Management Security Server providing on-the-fly at-rest data encryption security for on and off-premises data environments from physical and virtual data centers, through big data, to the cloud, including storage area network (SAN), network attached storage (NAS), direct attached storage (DAS), tape library, virtual tape library (VTL), object store, content addressable storage (CAS), hypervisor data store, RESTful cloud storage service endpoints, etc. Bloombase SOA Bloombase SOA Security Server offers high speed application level cryptographic processing of application data from unstructured to structured XML, further to service oriented webservices and beyond. Bloombase Message Bloombase Message Security Server provides digital signature generation, verification, encryption and decryption for standard based secure messages, fully transparent for both messaging clients and servers. Bloombase Identity Bloombase Identity Manager brings strong authentication to enterprise end user identity management solving identity thefts and impersonation issues by state-of-the-art one-timepassword, PKI and smart card technologies. Support and Professional Services Bloombase offers global Subscription and Support services to all Bloombase customers. For customers that require additional services, Bloombase also offers professional services engagements on best practices and getting started with your Bloombase deployment, both directly and through an extensive network of authorized professionals. How to Buy To purchase Bloombase Servers, use the online Bloombase Partner Locator to find an authorized Bloombase business partner in your area: Learn More To learn more about Bloombase information security solutions, contact your Bloombase product specialist and/or account manager, or visit: Bloombase - Next Generation Data Security info@bloombase.com web Copyright 2014 Bloombase, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase in United States and/or other jurisdictions. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. Item No. BLBS-BP-Bloombase-StoreSafe-Security-Best-Practice-USLET-EN-R6

The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Bloombase Transparent Data Security: Application Transparent Non-Disruptive Data At-Rest Encryption for Dell Compellent Storage Area Network (SAN) and EqualLogic Network Attached Storage (NAS) This Technical

More information

Bloombase Spitfire StoreSafe Storage Security Server. Bloombase Technologies

Bloombase Spitfire StoreSafe Storage Security Server. Bloombase Technologies Bloombase Spitfire StoreSafe Storage Security Server Bloombase Technologies Bloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire SOA Security Server Bloombase Spitfire Message Security

More information

Securing an IP SAN. Application Brief

Securing an IP SAN. Application Brief Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.

More information

Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption

Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption Bloombase Interoperability Program P1 2015 Bloombase, Inc. Interoperability of Bloombase StoreSafe and Thales e-security keyauthority for Data At- Rest Encryption April, 2015 Executive Summary Thales e-security

More information

Securing Networked Storage: Decru DataFort Appliance

Securing Networked Storage: Decru DataFort Appliance Securing Networked Storage: Decru DataFort Appliance Contents 1. Executive Summary 2. Trends in Data Security and Privacy 3. Current Approaches 4. Decru DataFort Security Appliance 5. Backup, Mirroring

More information

Sharpen your document and data security HP Security solutions for imaging and printing

Sharpen your document and data security HP Security solutions for imaging and printing Sharpen your document and data security HP Security solutions for imaging and printing Recognize hidden risks You know how valuable data is to your organization. But the more data you acquire and share,

More information

EMC Symmetrix Data at Rest Encryption

EMC Symmetrix Data at Rest Encryption Detailed Review Abstract This white paper provides a detailed description of EMC Symmetrix Data at Rest Encryption features and operations. March 2011 Copyright 2010, 2011 EMC Corporation. All rights reserved.

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...

More information

Why cloud backup? Top 10 reasons

Why cloud backup? Top 10 reasons Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable

More information

Data-at-Rest Encryption Addresses SAN Security Requirements

Data-at-Rest Encryption Addresses SAN Security Requirements Data-at-Rest Encryption Addresses SAN Security Requirements QLogic 2500 Series Fibre Channel Adapters Meet Enterprise Security Needs Key Findings SAN security via encryption is necessary for protecting

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

EMC ENCRYPTION AS A SERVICE

EMC ENCRYPTION AS A SERVICE White Paper EMC ENCRYPTION AS A SERVICE With CloudLink SecureVSA Data security for multitenant clouds Transparent to applications Tenant control of encryption keys EMC Solutions Abstract This White Paper

More information

Securing Enterprise Mobility for Greater Competitive Advantage

Securing Enterprise Mobility for Greater Competitive Advantage SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise

More information

365 Cloud Storage. Security Brief

365 Cloud Storage. Security Brief 365 Cloud Storage Security Brief Overview Surveys reveal time and again that security and data protection concerns are the top barriers to Cloud adoption. At, we take these concerns seriously and have

More information

Securing Data at Rest ViSolve IT Security Team

Securing Data at Rest ViSolve IT Security Team Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1

More information

Secure Backup and Recovery Whitepaper. Securing Data in Backup and Disaster Recovery Sites with Decru DataFort Appliances

Secure Backup and Recovery Whitepaper. Securing Data in Backup and Disaster Recovery Sites with Decru DataFort Appliances Secure Backup and Recovery Whitepaper Securing Data in Backup and Disaster Recovery Sites with Decru DataFort Appliances September 2005 Introduction... 2 Decru DataFort Storage Security Appliances... 2

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication

More information

HP iscsi storage for small and midsize businesses

HP iscsi storage for small and midsize businesses HP iscsi storage for small and midsize businesses IP SAN solution guide With data almost doubling in volume every year, businesses are discovering that they need to take a strategic approach to managing

More information

ABC of Storage Security. M. Granata NetApp System Engineer

ABC of Storage Security. M. Granata NetApp System Engineer ABC of Storage Security M. Granata NetApp System Engineer Encryption Challenges Meet Regulatory Requirements No Performance Impact Ease of Installation Government and industry regulations mandate protection

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

Future Proofing Data Archives with Storage Migration From Legacy to Cloud

Future Proofing Data Archives with Storage Migration From Legacy to Cloud Future Proofing Data Archives with Storage Migration From Legacy to Cloud ABSTRACT This white paper explains how EMC Elastic Cloud Storage (ECS ) Appliance and Seven10 s Storfirst software enable organizations

More information

EMC VMAX3 DATA AT REST ENCRYPTION

EMC VMAX3 DATA AT REST ENCRYPTION EMC VMAX3 DATA AT REST ENCRYPTION ABSTRACT In the interconnected world, data and intellectual property is the highest value currency which can be held by corporations. From recent newsworthy examples,

More information

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information

More information

Using HP StoreOnce Backup systems for Oracle database backups

Using HP StoreOnce Backup systems for Oracle database backups Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

RSA SecurID Software Token 1.0 for Android Administrator s Guide

RSA SecurID Software Token 1.0 for Android Administrator s Guide RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

QLIKVIEW MOBILE SECURITY

QLIKVIEW MOBILE SECURITY QLIKVIEW MOBILE SECURITY QlikView Technical Brief Published: March, 2011 qlikview.com QlikView Mobile Security Mobile devices are convenient, versatile and, for many employees, they are indispensable.

More information

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002 INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before

More information

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions. Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory

More information

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION

More information

Securing Sensitive Data

Securing Sensitive Data Securing Sensitive Data A Comprehensive Guide to Encryption Technology Approaches Vormetric, Inc. 888.267.3732 408.433.6000 sales@vormetric.com www.vormetric.com Page 1 Executive Summary Enterprises can

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

Protecting Data at Rest with Vormetric Data Security Expert

Protecting Data at Rest with Vormetric Data Security Expert V O R M E T R I C W H I T E P A P E R Protecting Data at Rest with Vormetric Data Security Expert Deploying Encryption and Access Control to Protect Stored Data Across the Enterprise Enterprise Information

More information

iphone in Business Security Overview

iphone in Business Security Overview iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

EMC DATA DOMAIN ENCRYPTION A Detailed Review

EMC DATA DOMAIN ENCRYPTION A Detailed Review White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

HP Storage Data Migration Service

HP Storage Data Migration Service HP Storage Data Migration Service HP Data Center Services Technical data The HP Storage Data Migration Service transfers your designated information to target storage device technologies across a data

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Choosing the best architecture for data protection in your Storage Area Network

Choosing the best architecture for data protection in your Storage Area Network Choosing the best architecture for data protection in your Storage Area Network Introduction... 2 SAN solution reliability... 2 A controller-based architecture for tape libraries... 3 Advanced features...

More information

HP StorageWorks MPX200 Simplified Cost-Effective Virtualization Deployment

HP StorageWorks MPX200 Simplified Cost-Effective Virtualization Deployment HP StorageWorks MPX200 Simplified Cost-Effective Virtualization Deployment Executive Summary... 2 HP StorageWorks MPX200 Architecture... 2 Server Virtualization and SAN based Storage... 3 VMware Architecture...

More information

Secured email Enterprise eprivacy Suite

Secured email Enterprise eprivacy Suite EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

Best practices for protecting network data

Best practices for protecting network data Best practices for protecting network data A company s value at risk The biggest risk to network security is underestimating the threat to network security. Recent security breaches have proven that much

More information

capacity management for StorageWorks NAS servers

capacity management for StorageWorks NAS servers application notes hp OpenView capacity management for StorageWorks NAS servers First Edition (February 2004) Part Number: AA-RV1BA-TE This document describes how to use HP OpenView Storage Area Manager

More information

Cisco AON Secure File Transfer Extension Module

Cisco AON Secure File Transfer Extension Module Cisco AON Secure File Transfer Extension Module Product Overview Cisco Application-Oriented Networking (AON) products look simple a small hardware blade on a Catalyst switch, or a router, or a standalone

More information

Key & Data Storage on Mobile Devices

Key & Data Storage on Mobile Devices Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

Whitepaper. NexentaConnect for VMware Virtual SAN. Full Featured File services for Virtual SAN

Whitepaper. NexentaConnect for VMware Virtual SAN. Full Featured File services for Virtual SAN Whitepaper NexentaConnect for VMware Virtual SAN Full Featured File services for Virtual SAN Table of Contents Introduction... 1 Next Generation Storage and Compute... 1 VMware Virtual SAN... 2 Highlights

More information

ENABLING GLOBAL HADOOP WITH EMC ELASTIC CLOUD STORAGE

ENABLING GLOBAL HADOOP WITH EMC ELASTIC CLOUD STORAGE ENABLING GLOBAL HADOOP WITH EMC ELASTIC CLOUD STORAGE Hadoop Storage-as-a-Service ABSTRACT This White Paper illustrates how EMC Elastic Cloud Storage (ECS ) can be used to streamline the Hadoop data analytics

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Cloud and Big Data initiatives. Mark O Connell, EMC

Cloud and Big Data initiatives. Mark O Connell, EMC Object storage PRESENTATION systems: TITLE GOES the underpinning HERE of Cloud and Big Data initiatives Mark O Connell, EMC SNIA Legal Notice The material contained in this tutorial is copyrighted by the

More information

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

USB Portable Storage Device: Security Problem Definition Summary

USB Portable Storage Device: Security Problem Definition Summary USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

Learn the essentials of virtualization security

Learn the essentials of virtualization security Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage

More information

2007 Microsoft Office System Document Encryption

2007 Microsoft Office System Document Encryption 2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft

More information

Provisioning Server High Availability Considerations

Provisioning Server High Availability Considerations Citrix Provisioning Server Design Considerations Citrix Consulting Provisioning Server High Availability Considerations Overview The purpose of this document is to give the target audience an overview

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

SAP database backup and restore solutions for HP StorageWorks Enterprise Virtual Array using HP Data Protector 6.1 software

SAP database backup and restore solutions for HP StorageWorks Enterprise Virtual Array using HP Data Protector 6.1 software SAP database backup and restore solutions for HP StorageWorks Enterprise Virtual Array using HP Data Protector 6.1 software Table of contents Executive summary... 2 Solution overview... 2 Objectives...

More information

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Introduction Patient privacy continues to be a chief topic of concern as technology continues to evolve. Now that the majority

More information

Brochure Achieving security with cloud data protection. Autonomy LiveVault

Brochure Achieving security with cloud data protection. Autonomy LiveVault Achieving security with cloud data protection Autonomy LiveVault Can cloud backup be secure? Today, more and more companies recognize the value and convenience of using cloud backup to protect their server

More information

Enterprise-Wide Storage Security with. Decru DataFort Appliances

Enterprise-Wide Storage Security with. Decru DataFort Appliances Enterprise-Wide Storage Security with Decru DataFort Appliances SECURING NETWORKED STORAGE CONTENTS 1. Executive Summary 2. Trends in Data Security and Privacy 3. Solution Overview: Decru DataFort Storage

More information

Security in Storage Networks A Current Perspective

Security in Storage Networks A Current Perspective Security in Storage Networks A Current Perspective Christian Cachin ZISC Colloquium www.zurich.ibm.com Overview Networked storage systems NAS, SAN, OBS Design options for security

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

Securing Cloud Computing by GED-i

Securing Cloud Computing by GED-i Securing Cloud Computing by GED-i General Most IT professionals estimate that the cloud computing environment will dominate the deployment and usage of the IT and storage environment in the near future.

More information

DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE. By Libby McTeer

DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE. By Libby McTeer DELL POWERVAULT LIBRARY-MANAGED ENCRYPTION FOR TAPE By Libby McTeer CONTENTS ABSTRACT 3 WHAT IS ENCRYPTION? 3 WHY SHOULD I USE ENCRYPTION? 3 ENCRYPTION METHOD OVERVIEW 4 LTO4 ENCRYPTION BASICS 5 ENCRYPTION

More information

We look beyond IT. Cloud Offerings

We look beyond IT. Cloud Offerings Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking

More information

CipherShare Features and Benefits

CipherShare Features and Benefits CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Saving Private Data An Introduction to Storage Security Richard Austin, MS, CISSP, MCSE

Saving Private Data An Introduction to Storage Security Richard Austin, MS, CISSP, MCSE Saving Private Data An Introduction to Storage Security Richard Austin, MS, CISSP, MCSE SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

How To Get To A Cloud Storage And Byod System

How To Get To A Cloud Storage And Byod System Maginatics Security Architecture What is the Maginatics Cloud Storage Platform? Enterprise IT organizations are constantly looking for ways to reduce costs and increase operational efficiency. Although

More information

Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst

Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst ESG Lab Review Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst Abstract: Organizations are challenged in today

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

How To Secure An Rsa Authentication Agent

How To Secure An Rsa Authentication Agent RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

How To Protect Data Storage From Security Threats

How To Protect Data Storage From Security Threats W H I T E P A P E R DATA STORAGE PROTECTION RISKS & RETURNS v October 2002. Copyright All Rights Reserved. INTRODUCTION Data Storage Protection Risks & Rewards IDC and other research firms maintain that

More information

Common Remote Service Platform (crsp) Security Concept

Common Remote Service Platform (crsp) Security Concept Siemens Remote Support Services Common Remote Service Platform (crsp) Security Concept White Paper April 2013 1 Contents Siemens AG, Sector Industry, Industry Automation, Automation Systems This entry

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Chapter 10. Network Security

Chapter 10. Network Security Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

More information

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows

More information

ABCs of Data Encryption for Storage. Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems

ABCs of Data Encryption for Storage. Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems ABCs of Data Encryption for Storage Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

The Evolving Threat Landscape and New Best Practices for SSL

The Evolving Threat Landscape and New Best Practices for SSL The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...

More information

Customer Education Services Course Overview

Customer Education Services Course Overview Customer Education Services Course Overview Accelerated SAN Essentials (UC434S) This five-day course provides a comprehensive and accelerated understanding of SAN technologies and concepts. Students will

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Compliance and Security Challenges with Remote Administration

Compliance and Security Challenges with Remote Administration Sponsored by Netop Compliance and Security Challenges with Remote Administration A SANS Whitepaper January 2011 Written by Dave Shackleford Compliance Control Points Encryption Access Roles and Privileges

More information

How To Encrypt Data With Encryption

How To Encrypt Data With Encryption USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security

More information

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This

More information