Data Center. Security A comprehensive approach to preventing, detecting and mitigating data security risks
|
|
|
- Whitney Wilcox
- 9 years ago
- Views:
Transcription
1 Data Center Connect Security A comprehensive approach to preventing, detecting and mitigating data security risks Strategic White Paper Facing increased security threats and new regulations, enterprises must develop a comprehensive IT security program to address real-time data transfers between data centers. Essential requirements include physical-layer encryption of in-flight 1 data which can encrypt local area network (LAN), storage area network (SAN) and High Performance Computing (HPC) application data traffic as well as encryption key management for the security of mission-critical data. The Alcatel-Lucent 1830 Photonic Service Switch (PSS), a best-of-breed wavelength division multiplexing (WDM) platform, along with the Alcatel-Lucent 1830 Key Management Tool (KMT), delivers these requirements to demanding enterprises today. This compelling solution for data center interconnection is capable of encrypting application data in less than 1 µsec, a latency equivalent to only 200 meters of fiber. It also provides today s most comprehensive key management solution to support the automated rotation of encryption keys with end-user control. 1 In-flight data refers to data traversing a network.
2 Table of contents 1 Challenges to multi-site data center security / 1 2 Customer requirements / Secure Layer 1 traffic encryption / Managing encryption keys / 3 3 Securing DCC with the Alcatel-Lucent 1830 Photonic Service Switch / Preventing security attacks / Detection of security breaches / Reducing the risks associated with stolen data / 5 4 Managing DWDM encryption with the Alcatel-Lucent 1830 Key Management Tool / Role-based, compliant authentication and authorization / 6 5 Conclusion / 6 6 Acronyms / 7 7 References / 8
3 1 Challenges to multi-site data center security In a world filled with electronic security threats, data centers are at continuous risk. Traditionally, these threats have arisen from malware or hobbyist hackers, but increasingly, criminal organizations are also directly targeting the enterprise. In most cases, the motivation is profit from selling intellectual property or financial information or even extortion. The Symantec Norton Cybercrime Report 2011 states: The global cost of cybercrime is greater than the combined effect on the global economy of trafficking in marijuana, heroin and cocaine. 2 Many security threats to data centers are internal and perpetrated by legitimate users, usually employees behaving inappropriately. The insider threat is not limited to breaking into network devices. For less than $1,000, a knowledgeable intruder can easily purchase the hardware necessary to eavesdrop on an optical fiber, a capability that was once thought to be impossible. The tap works by bending the optical fiber until it leaks light. The light pulses leaking from the cable can then be detected by an optical photo detector clipped around the optical fiber, without interfering with passing network traffic. This kind of attack is very challenging to discover and can be performed by anyone with physical access to corporate premises. Recently, virtualization technologies for computing and storage have allowed data center administrators to share resources across multiple data centers. This approach delivers IT services much more efficiently and has the potential to dramatically increase the volume of data traversing an inter-data center network. With this rapid growth in data center connect (DCC) traffic, enterprises must find effective ways to secure the transport of this critical data. 2 Customer requirements Multi-site data center security must go beyond technical countermeasures, such as antivirus and firewalls, used inside the data center. A more systematic and holistic approach is needed, including a comprehensive and coordinated counterattack. To enable security across the inter-data center network, the following three approaches to dealing with the threat of information theft can be blended: Prevention Detection Mitigation 2 Source: Symantec Corp., maker of Norton antivirus software. 1
4 Prevention Infrastructure system security, managed user access and privileged-user access controls are required to prevent misuse of information by legitimate data center users, as well as external hackers. Data center administrators must deploy network equipment from vendors that facilitate the implementation and management of such security practices. Detection Embedded security monitoring technology must be deployed in network devices to expose intrusions even when traffic traversing the DCC network is undisturbed. Optical intrusion detection (OID) mechanisms are effective for detecting intrusion on fiber-optic cables and immediately alerting the security administrator of potential security breaches. Mitigation Encryption of data is the most effective method of mitigating security breaches. This algorithmic process transforms data into unreadable cryptographic text, so stolen data is rendered useless to an intruder. Encryption is no longer an exotic mechanism whose use is limited to secret organizations: it is now a common tool used for security in normal business workflows. For example, the Payment Card Industry Data Security Standard 3 (PCI DSS), the essential process for protecting credit card payments, uses encryption for data storage and transfer. Many companies encrypt data at rest 4 and then move the encrypted data between data centers. This manual process may include tape backups and tedious transport of backups using armored vehicles. Often used for disaster recovery, this process has proven to be very difficult to manage and delivers higher-than-expected costs. In addition, data-at-rest encryption does not support the multi-protocol, real-time communications between data centers that enterprises now need to provide business continuity and protect dynamic mission-critical data. 2.1 Secure Layer 1 traffic encryption Physical-layer encryption is the most effective method for securing in-flight data transmitted between a local and a remote enterprise data center. It provides encryption with transparent connectivity to support all upper-layer Open Systems Interconnection (OSI) protocols and applications, including data mirroring, Virtual Machine (VM) mobility and storage virtualization all with ultra-low latency and high bandwidth to meet today s enterprise requirements. Layer 1 (L1) encryption also lowers the total cost of ownership (TCO) for data center interconnection by allowing the convergence of LAN, SAN and HPC traffic onto a single L1 physical medium and by significantly simplifying management of the secure network infrastructure. With increasing demand for data center interconnection worldwide, enterprises can build secure, scalable, high-performance private cloud interconnects, based on L1 encrypted links over fiber using DWDM technology. The fiber can be owned (private builds) or leased from service providers. While encryption in the higher layers of the OSI network stack can be effective in certain situations, it is complex and costly resulting in high CPU utilization and increased latency and overhead in the underlying data and application flow. It can also suffer from problems with compatibility between OSI network layers. 3 Source: Payment Card Industry Data Security Standards Council, PCI DSS v2.0, October Data at rest refers to data stored in computers. 2
5 2.2 Managing encryption keys Mismanagement of encryption keys, required to enable encrypted data transport, can deny system access to authorized clients or even cause inter-data center traffic interruption, which could affect critical enterprise business applications. Often, complex key management is implemented using manual processes which introduce enterprise security vulnerabilities and risk. Ultimately, data center administrators require a secure, encrypted DCC solution with comprehensive management of associated encryption keys over their entire life cycle. 3 Securing DCC with the Alcatel-Lucent 1830 Photonic Service Switch As shown in Figure 1, the Alcatel-Lucent 1830 Photonic Service Switch (PSS) provides the prevention, detection and mitigation capabilities enterprises need to establish and deploy effective data center security practices. Figure 1. Secure L1 data center connect IT OPERATIONS SECURITY OPERATIONS Enterprise IT admin. Network management Key management Cyber security admin. Servers Servers HPC 1830 PSS Secure L1 connection 1830 PSS HPC ENTERPRISE DATACENTER Storage ENTERPRISE DATACENTER Storage 3.1 Preventing security attacks To reduce the attack surface and, therefore, the security risk, the Alcatel-Lucent 1830 PSS can function in secure mode, which provides a hardened device configuration with the following configuration settings: Only the essential logical and physical ports needed to manage the system are open. Software debug functions are disabled. Services of the embedded OS are disabled, as well as any interactive OS access. Only secure network element management protocols, such as Secure Sockets Layer (SSL) and SNMPv3, are supported. 3
6 General security risks can also be related to inadequate security policies or human factors. To reduce these risks, enterprises must adopt systematic approaches to risk management, such as ISO/IEC (for ISMS), or auditing frameworks such as Statement of Auditing Standards No. 70 (SAS 70). 6 Enterprise security processes can rely on well-designed security controls that properly ensure the confidentiality, integrity and availability required of products used in the data center. To promote these crucial principles, the Alcatel-Lucent coordinated approach to data center security is based on the requirements of security best practices and security frameworks widely used in data center environments. 3.2 Detection of security breaches The Alcatel-Lucent 1830 PSS provides several security mechanisms to ensure the integrity of data communication services across the DCC network and of the DWDM equipment itself. Comprehensive security logs allow an administrator to detect non-authorized changes to the device configuration, complemented by real-time alarms to detect optical intrusion. The optical intrusion detection (OID) capability constantly checks the status of each optical fiber by monitoring for changes in optical loss. First, a threshold value is set up, ranging from 1.0 db to 3.0 db, with steps of 0.5 db. Then, if the optical loss changes beyond the configured level, an alarm identifies a possible optical intrusion, as shown in Figure 2. Figure 2. Optical Intrusion Detection (OID) OPTICAL INTRUSION DETECTION ATTENUATION (db) t1 Baseline Threshold MAJOR OPTICAL INTRUSION ALARM RAISED t2 t3 t4 t5 t6 t7 t8 Span loss measurement 3 consecutive measurements POLLING PERIOD Paused due to LOS or CR1 alarm MAJOR OPTICAL INTRUSION ALARM CLEARED t9 t10 t11 t12 t13 t14 t15 t16 t17 5 ISO/IEC, ISO/IEC 27001: Information technology Security techniques Information security management systems Requirements. 6 Auditing Standards Board of the American Institute of Certified Public Accountants, SAS 70: Service Organizations, April,
7 3.3 Reducing the risks associated with stolen data To perform symmetric Layer 1 encryption, the Alcatel-Lucent 1830 PSS implements the National Institute of Standards and Technology (NIST) Advanced Encryption Standard (AES)7 block encryption/decryption algorithm (cipher). This cipher encrypts rapidly and is extremely difficult to break when large encryption key sizes are implemented. It s called symmetric because the same pre-shared keys are used for encryption and decryption of the blocks at each end of the circuit. The Alcatel-Lucent 1830 PSS uses integrated hardware and large, robust 256-bit AES keys to encrypt data flows and transport information securely. Working at a 10-Gb/s line rate, its L1 encryption hardware introduces less than 1µsec latency (equivalent to approximately 200 meters of fiber) into the end-to-end data stream. The Alcatel-Lucent 1830 PSS encryption module was designed and tested using FIPS 1402 standards8, including detailed requirements for strong cryptographic algorithms and physical device protection from NIST. 4 Managing DWDM encryption with the Alcatel-Lucent 1830 Key Management Tool The Alcatel-Lucent 1830 Key Management Tool (KMT) is a secure, scalable solution for managing keys across both simple and complex encryption deployments for inter-data center connections. It helps manage the cryptographic life cycle of each encrypted wavelength service the keys generated to perform the encryption as well as encryption key expiration, rotation and destruction. These operations are all essential to encrypted inter-data center communication. Figure 3 shows a secure enterprise L1 inter-data center configuration, using the 1830 KMT to manage the shared symmetric encryption keys. Figure 3. Alcatel-Lucent 1830 Key Management Tool for encrypted L1 encrypted L1 DCC IT OPERATIONS WAN admin Crypto admin Security Operator (Department A) Security Operator (Department B) Each enterprise department manages its own set of keys KMT portal 5620 SAM KMT server Intranet Internet Remote copy synchronous SITE A 1830 PSS Remote copy asynchronous PRIVATE BUILT DWDM NETWORK 1830 PSS SITE B 1830 PSS SITE C 5
8 With the Alcatel-Lucent 1830 KMT, an enterprise IT organization can offer managed infrastructure services to its internal customers and stakeholders, while allowing them to keep full ownership and control of their own cryptographic keys and encryption parameters. This tool also provides critical support when unique encryption keys must be used between each sender-and-receiver pair within the enterprise, and these keys are rotated frequently as part of encryption security best practices. 4.1 Role-based, compliant authentication and authorization Role-based Access Control (RBAC) authorization mechanisms grant permissions to perform certain operations in a computer system, based on the user s role in the organization. The Alcatel-Lucent 1830 KMT supports a Federal Information Processing Standard (FIPS)-compliant RBAC authorization mechanism that provides separation of IT security duties for device management, as well as the underlying encryption services offered by the device, as shown in Figure 4. Figure 4. Alcatel-Lucent 1830 KMT FIPS-compliant RBAC authorization mechanism SYSTEM 1350 OMS/ 5620 SAM 1830 KMT DWDM network 1830 PSS 1830 PSS A Wavelength service Encrypted service Z USER EMS/NMS operator (service provider) Crypto operator (end user) To provide centralized authentication and authorization profiles for an enterprise, the Alcatel-Lucent 1830 PSS uses a standard Remote Authentication Dial-In User Service (RADIUS) interface, which supports third-party integration of corporate identity management systems (IDMS) and multifactor authentication systems. FIPS Level 2 compliance requires standalone software tool for cryptographic functions KMT fits service provider/ enterprise model that requires separate network and security management/monitoring modules. Separate groups are responsible for security ( crypto officer) and network devices (network administrator). Alcatel-Lucent 1350 Optical Management System (OMS) or 5620 Service Aware Manager (SAM) manages wavelength service KMT manages crypto aspects of wavelength service. 5 Conclusion As enterprises consolidate their data center assets and invest in next-generation private and public cloud infrastructure, a comprehensive IT security program is required. The ideal approach to data center interconnection meets strict requirements for latency and security, as well as operations, administration and maintenance (OA&M). It also combines prevention, detection and mitigation methods to create a comprehensive response to security threats and to regulation. Physical layer encryption offers security for all in-flight data types, including LAN, SAN and HPC applications between remote data center locations. 6
9 The Alcatel-Lucent Optical Data Center Connect solution delivers the scalability, versatility, and security required for next-generation private and public cloud transport, across metro and long-haul distances. It supports high-speed optical WDM connectivity between data centers and, unlike other alternatives, it enables enterprises to deploy highbandwidth and low-latency encrypted wavelength services with end-user key control. This FIPS-compliant solution satisfies enterprise DCC security requirements without compromising the low, predictable latency required by most mission-critical applications. With operations in more than 130 countries and one of the most experienced global services and support organizations in the industry, Alcatel-Lucent is a local partner with global reach. Visit the Alcatel-Lucent web site at 6 Acronyms 1350 OMS Alcatel-Lucent 1350 Optical Management System 1830 PSS Alcatel-Lucent 1830 Photonic Service Switch 1830 KMT Alcatel-Lucent 1830 Key Management Tool 5620 SAM Alcatel-Lucent 5620 Service Aware Manager AES Advanced Encryption Standard BCP Business continuity plan CPU Central processing unit DCC Data Center Connect dss data Security Standard DWDM Dense Wavelength Division Multiplexing E-SNCP Extended Sub-Network Connection Protection FC Fibre Channel FIPS Federal Information Processing Standard GMPLS Generalized MPLS HPC High Performance Computing ISMS Information security management system it information technology KMT Alcatel-Lucent Key Management Tool L1 Layer 1 LAN Local area network MPLS Multi-Protocol Label Switching NAS Network-attached storage ne network element NIST National Institute of Standards and Technology OA&M Operations, administration and maintenance oid optical intrusion detection OLP Optical Line Protection OMSP Optical Multiplex Section Protection os operating system osi open Systems Interconnection pci payment Card Industry QoE Quality of Experience QoS Quality of Service RADIUS Remote Authentication Dial-In User Service 7
10 RBAC Role-Based Access Control SAN Storage area network SAS 70 Statement of Auditing Standards No. 70 SLA service Level Agreement SNMPv3 Simple Network Management Protocol version 3 SSL secure Sockets Layer T-ROADM Tunable and Reconfigurable Optical Add-Drop Multiplexer TCO Total cost of ownership vm virtual Machine WAN Wide area network WUI Web user interface 7 References 1. Alcatel-Lucent 1830 PSS: 2. Alcatel-Lucent 100G: 3. Auditing Standards Board of the American Institute of Certified Public Accountants. SAS 70: Service Organizations. April InfiniBand Trade Association. The InfiniBand Architecture ISO/IEC. ISO/IEC 27001: Information technology Security techniques Information security management systems Requirements National Institute of Standards and Technology. FIPS Publication 140-2: Security Requirements for Cryptographic Modules. May 25, National Institute of Standards and Technology. FIPS Publication 197: Announcing the Advanced Encryption Standard (AES) Payment Card Industry Data Security Standards Council. PCI DSS v2.0. October php?document=pci_dss_v2-0#pci_dss_v Symantec Norton. Norton Cybercrime Report
11 Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright 2012 Alcatel-Lucent. All rights reserved. M (June)
Optimal. Data Center Connect (DCC) STRATEGIC WHITE PAPER
Optimal Solutions for Data Center Connect (DCC) STRATEGIC WHITE PAPER Table of contents / 1 Data center evolution / 2 Why DWDM transport for DCC? / 4 The Alcatel-Lucent 1830 PSS: The leading DWDM solution
DATA CENTER INTERCONNECT SICHERER UND FLEXIBLER DATENAUSTAUSCH ZWISCHEN RECHENZENTREN COPYRIGHT 2014 ALCATEL-LUCENT. ALL RIGHTS RESERVED.
DATA CENTER INTERCONNECT SICHERER UND FLEXIBLER DATENAUSTAUSCH ZWISCHEN RECHENZENTREN AGENDA 1. Key Feature learning's from ancient Greece? 2. User challenges to be addressed for IT, Data Centre and Cloud
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Switching Solution Creating the foundation for the next-generation data center
Alcatel-Lucent Enterprise Data Center Switching Solution Creating the foundation for the next-generation data center a new network paradigm What do the following trends have in common? Virtualization Real-time
DATA CENTER INTERCONNECT SOLUTIONS FOR LARGE ENTERPRISES MEETING CURRENT AND FUTURE NEEDS FOR ENTERPRISE DATA CENTER INTERCONNECT
DATA CENTER INTERCONNECT SOLUTIONS FOR LARGE ENTERPRISES MEETING CURRENT AND FUTURE NEEDS FOR ENTERPRISE DATA CENTER INTERCONNECT STRATEGIC WHITE PAPER The rapid gains in data center efficiency, the emergence
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
DATA CENTER INTERCONNECT MARKET TRENDS AND REQUIREMENTS THE IMPACT OF MARKET TRENDS ON DATA CENTER INTERCONNECT FOR LARGE ENTERPRISES
DATA CENTER INTERCONNECT MARKET TRENDS AND REQUIREMENTS THE IMPACT OF MARKET TRENDS ON DATA CENTER INTERCONNECT FOR LARGE ENTERPRISES STRATEGIC WHITE PAPER The enterprise data center interconnect (DCI)
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
Overcoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
High speed Ethernet WAN: Is encryption compromising your network?
High speed Ethernet WAN: Is encryption compromising your network? Trademark: 2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
Cisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
How To Encrypt Data On A Network With Cisco Storage Media Encryption (Sme) For Disk And Tape (Smine)
Data Sheet Cisco Storage Media Encryption for Disk and Tape Product Overview Cisco Storage Media Encryption (SME) protects data at rest on heterogeneous tape drives, virtual tape libraries (VTLs), and
Solutions for Encrypting Data on Tape: Considerations and Best Practices
Solutions for Encrypting Data on Tape: Considerations and Best Practices NOTICE This white paper may contain proprietary information protected by copyright. Information in this white paper is subject to
ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center
ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center A NEW NETWORK PARADIGM What do the following trends have in common? Virtualization Real-time applications
STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
Effective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
Network Access Control ProCurve and Microsoft NAP Integration
HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
Alcatel-Lucent 1850 TSS Product Family. Seamlessly migrate from SDH/SONET to packet
Alcatel-Lucent 1850 TSS Product Family Seamlessly migrate from SDH/SONET to packet The Alcatel-Lucent 1850 Transport Service Switch (TSS) products are a family of Packet-Optical Transport switches that
Optical Networks for Next Generation Disaster Recovery Networking Solutions with WDM Systems Cloud Computing and Security
Optical Networks for Next Generation Disaster Recovery Networking Solutions with WDM Systems Cloud Computing and Security By Andrew MacKay, Chief Technology Officer, Superna www.superna.net Legacy Data
Data Center Interconnect: Small Vendors Innovate, but Large Ones Are Catching Up
Rick Talbot Current Analysis Senior Analyst, Advisory Report Vendors Innovate, December 30, 2011 Issue As service providers turn to content delivery networks and cloud computing to deliver their value-add
Alcatel-Lucent Services
SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or
Secure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
Cloud Management. Overview. Cloud Managed Networks
Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Odyssey Access Client FIPS Edition
Odyssey Access Client FIPS Edition Data Sheet Published Date July 2015 Product Overview The need today is greater than ever to ensure that systems are securely configured. Government agencies and secure
Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking
ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Todays Agenda Fibre is safe
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
How To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5
Cisco MDS 9000 Family Solution for Cloud Storage All enterprises are experiencing data growth. IDC reports that enterprise data stores will grow an average of 40 to 60 percent annually over the next 5
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Converged Private Networks. Supporting voice and business-critical applications across multiple sites
Converged Private Networks Supporting voice and business-critical applications across multiple sites Harness converged voice and high-speed data connectivity MPLS-based WAN solution that supports voice
ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS
ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ALCATEL-LUCENT OPENTOUCH SESSION BORDER CONTROLLER A SECURE SOLUTION FOR BORDERLESS CONVERSATIONS APPLICATION
alcatel-lucent vitalqip Appliance manager End-to-end, feature-rich, appliance-based DNS/DHCP and IP address management
alcatel-lucent vitalqip Appliance manager End-to-end, feature-rich, appliance-based DNS/DHCP and IP address management streamline management and cut administrative costs with the alcatel-lucent VitalQIP
HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE
HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE CRITICAL NATIONAL INFRASTRUCTURE The UKs national infrastructure is defined by Government as those facilities, systems, sites
Security Considerations for DirectAccess Deployments. Whitepaper
Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift
A Strategic Approach to Enterprise Key Management
Ingrian - Enterprise Key Management. A Strategic Approach to Enterprise Key Management Executive Summary: In response to security threats and regulatory mandates, enterprises have adopted a range of encryption
INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats
Symantec Enterprise Security WHITE PAPER Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats INSIDE Executive Summary Challenges to securing NAS An effective
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c
OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman
OmniCube SimpliVity OmniCube and Multi Federation ROBO Reference Architecture White Paper Authors: Bob Gropman Date: April 13, 2015 SimpliVity and OmniCube are trademarks of SimpliVity Corporation. All
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
Cisco Virtual SAN Advantages and Use Cases
Cisco Virtual SAN Advantages and Use Cases The Challenge Application data is accumulating at an increasingly fast pace, and to control costs, IT departments are looking at the benefits of economies of
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
Data Security using Encryption in SwiftStack
Data Security using Encryption in SwiftStack May 2015 Copyright 2015 SwiftStack, Inc. swiftstack.com Page 1 of 11 Table of Contents Introduction... 3 Defining Three Threat Models... 3 Encrypted Data and
SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork
SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3
How To Build A Network For Storage Area Network (San)
White Paper Data Storage across the MAN by deploying a SAN over Dark Fiber by Pieter Panis, EuroFiber 1/7 1 Introduction The purpose of this document is to illustrate how a storage area network (SAN) can
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
Our Key Security Features Are:
September 2014 Version v1.8" Thank you for your interest in PasswordBox. On the following pages, you ll find a technical overview of the comprehensive security measures PasswordBox uses to protect your
Next-Generation Federal Data Center Architecture
Next-Generation Federal Data Center Architecture Introduction The United States government s E-Gov initiative established the Federal Enterprise Architecture (FEA) program to build a business-driven information
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Cloud Contact Center. Security White Paper
Cloud Contact Center Security White Paper Introduction Customers communicate with organizations in a variety of forms from phone conversations to email, web chat and social media. As each interaction may
MRV EMPOWERS THE OPTICAL EDGE.
Pro-Vision Service Delivery Software MRV EMPOWERS THE OPTICAL EDGE. WE DELIVER PACKET AND OPTICAL SOLUTIONS ORCHESTRATED WITH INTELLIGENT SOFTWARE TO MAKE SERVICE PROVIDER NETWORKS SMARTER. www.mrv.com
Becoming PCI Compliant
Becoming PCI Compliant Jason Brown - [email protected] Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History
Top Ten Reasons for Deploying Oracle Virtual Networking in Your Data Center
Top Ten Reasons for Deploying Oracle Virtual Networking in Your Data Center Expect enhancements in performance, simplicity, and agility when deploying Oracle Virtual Networking in the data center. ORACLE
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
VMware vcloud Air Security TECHNICAL WHITE PAPER
TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects
Self-Encrypting Hard Disk Drives in the Data Center
Technology Paper Self-Encrypting Hard Disk Introduction At least 35 U.S. states now have data privacy laws that state if you encrypt data-at-rest, you don t have to report breaches of that data. U.S. Congressional
Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review
Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review Prepared for: Coalfire Systems, Inc. March 2, 2012 Table of Contents EXECUTIVE SUMMARY... 3 DETAILED PROJECT OVERVIEW...
Cisco Intercloud Fabric Security Features: Technical Overview
White Paper Cisco Intercloud Fabric Security Features: Technical Overview White Paper May 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management
GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and
BANKING SECURITY and COMPLIANCE
BANKING SECURITY and COMPLIANCE Cashing In On Banking Security and Compliance With awareness of data breaches at an all-time high, banking institutions are working hard to implement policies and solutions
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data
White Paper Storage Extension Network Solutions Between Data Centers Simplified, Low Cost, Networks for Storage Replication, Business Continuity and Disaster Recovery TODAY S OPERATING CLIMATE DEMANDS
Brocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings
Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
