ADVANCING SECURITY IN STORAGE AREA NETWORKS

Size: px
Start display at page:

Download "ADVANCING SECURITY IN STORAGE AREA NETWORKS"

Transcription

1 WHITE PAPER ADVANCING SECURITY IN STORAGE AREA NETWORKS Brocade Secure Fabric OS provides a reliable framework for enhancing security in mission-critical SAN environments

2 As organizations continue to broaden their reach to business partners and customers around the globe, they expose their IT systems to a wider range of potential security threats. Today, data theft, eavesdropping, fraud, and hacker attempts increasingly threaten secure electronic information exchange within the enterprise and across public networks, such as the Internet. Because an organization s IT systems are only as secure as the weakest link in the network, Brocade has developed a comprehensive security framework that helps ensure safe, reliable data processing throughout a Storage Area Network (SAN). An integrated solution that addresses a wide variety of potential security threats, Brocade Secure Fabric OS provides a new level of SAN security enabling a robust, mission-critical SAN infrastructure. Today, organizations can implement Secure Fabric OS in all their SAN environments to safeguard data and alleviate a wide variety of security risks. 1

3 The Growing Security Concern The recent explosion in e-business activity and Internet commerce has provided organizations with unlimited opportunities for developing new information delivery channels. At a minimum, online expansion opens up a whole new world of possibilities such as increased efficiency, reduced costs, improved enterprise-wide communications, shorter time-to-market, and wider market reach. Although the benefits of e-business can be far-reaching, today s organizations must be careful to balance their need to expand with their ability to protect enterprise data. WHITE PAPER As the popularity of distributed client/server networks steadily rose throughout the 1990s, organizations found it much more difficult to effectively secure their critical business networks, applications, and data.the emergence and growth of public networks such as the Internet has only increased the potential frequency and severity of computer security incidents.as a result, information security is perhaps the greatest concern for organizations participating in the e-business arena. As new information delivery channels transcend traditional borders, locked doors are no longer sufficient to protect vital information. More than ever, organizations need to leverage advanced security solutions that minimize risk while enabling flexibility and growth to provide the proper balance for the corporate security strategy and policy. Today, Brocade is helping to safeguard one of the most strategic parts of many IT infrastructures: the SAN. Brocade has recently developed Secure Fabric OS, a flexible and scalable solution that meets a wide variety of SAN security requirements. Secure Fabric OS is the first product in the industry to provide such comprehensive security controls for networked storage environments. 2

4 Brocade Security Framework When designing high security for today s SANs, organizations must be aware of all the potential points where a security breach might occur. Identifying the points of vulnerability and implementing a reliable security solution are the keys to securing a SAN fabric infrastructure (see Figure 1).To help organizations identify and address their security exposures, the comprehensive Brocade SAN security framework provides the kind of security tools and controls commonly used in most other types of data networks. Figure 1. A typical SAN fabric infrastructure with potential points of vulnerability Hosts Storage Switches JBOD WAN (or Internet) Network Manager Potential Security Control Points 3

5 This security framework is based on Secure Fabric OS, which manages the Brocade SilkWorm family of Fibre Channel fabric devices in both new and existing SAN islands and heterogeneous SAN fabrics. Based on open industry standards, Secure Fabric OS is highly scalable, manageable, and extremely resilient.as a result, this integrated solution helps eliminate a variety of potential SAN security risks (see Table 1). SAN Security Risk Unauthorized and/or unauthenticated SAN access Secure Fabric OS Solution Multilevel password controls to prevent unauthorized and unauthenticated SAN access Table 1. SAN security risks and solutions at a glance WHITE PAPER Insecure management access World Wide Name (WWN) spoofing Management controls allowed from different access points Management Access Control Lists (ACLs) and encryption of passwords in certain interfaces Port-level ACLs Enhanced configuration architecture with trusted switches and secure management, as well as Public Key Infrastructure (PKI)-based authentication and security (digital certificates) Secure Fabric OS is especially useful for shared storage environments where security is critical. Secure Fabric OS is accessible through an open API that enables members of the Brocade Fabric Threads program to develop applications that optimize the wide variety of security features. In addition, organizations can develop their own internal security applications based on this API. Security Domains While identifying the potential points of vulnerability in their networks, organizations should fully define their security requirements for a SAN fabric by establishing a set of security domains.these domains typically define different categories of communications that must be protected by the fabric security architecture.these domains, described in detail below, include: Host-to-switch domain: between host servers and their Host Bus Adapters (HBAs), and the connected switches Administrator-to-security management domain: between administrators and their management applications Security management-to-fabric domain: between management applications and the switch fabric Switch-to-switch domain: between interconnected switches 4

6 Host-to-Switch Domain In host-to-switch communications, individual device ports are bound to a set of one or more switch ports using ACLs. Device ports are specified by WWN and typically represent HBAs. Special Secure Fabric OS Device Connection Controls enable binding by WWN (port) and ACL to secure the host-to-switch connection for both normal operations and management functions. Administrator-to-Security Management Domain Because security management impacts the security policy and configuration of the entire SAN fabric, administrator access controls work in conjunction with security management functions. In addition, administrator-level fabric password access provides primary control over security configurations. Security Management-to-Fabric Domain Secure Fabric OS secures certain elements of the management communications such as passwords on some interfaces between the security management function and a switch fabric.the security management function encrypts appropriate data elements (along with a random number) with the switch s public key.the switch then decrypts the data element with its private key. Switch-to-Switch Domain In secure switch-to-switch communications, the switches enforce security policy.the security management function initializes switches by using digital certificates and ACLs. Prior to establishing any communications, switches exchange these credentials during mutual authentication.this practice is designed to allow only authenticated and authorized switches to join as members of the SAN fabric or a specific fabric zone. This authentication process helps prevent an unauthorized switch (for example, a switch in a co-location scenario) from attaching to the fabric through an E_Port. Basic inter-fabric switch-to-switch security includes, but is not limited to: Mutual authentication performed between two switches using public key technology and digital certificates Switch alarms such as Simple Network Management Protocol (SNMP) trap notifications for authorized security management or other system managers 5

7 Secure Fabric OS Components Secure Fabric OS enables organizations to build highly secure SAN infrastructures through a set of powerful yet flexible security components (see Figure 2).This bestin-class solution includes the following security components: Fabric Configuration Servers: One or more switches act as trusted devices in charge of zoning changes and other security-related functions. Management Access Controls: Management policies and ACLs control access to the switch from different management services. WHITE PAPER Secure Management Communications: Secure management communications interface to the fabric by encrypting certain data elements, such as passwords. Switch Connection Controls: ACLs and digital certificates within the switch authenticate new switches and ensure that they can join the fabric. Device Connection Controls: Port-level ACLs lock particular WWNs to specific ports. Switch Connection Controls, Digital Certificates + ACLs Security Policy Flow Fabric Configuration Server (Trusted Switch) Figure 2. Secure Fabric OS components that protect the fabric against a variety of threats Management ACLs Port ACLs WAN (or Internet) Hard/Soft Zoning Zone Network Manager Secure Management Communications 6

8 The switch connection controls utilize the basis of PKI technology to provide the most comprehensive security solution available for SAN environments.table 2 compares PKI capabilities to other types of security solutions. Table 2. PKI compared to other electronic security options Firewalls X X Authentication Confidentiality Integrity Non-repudiation Access control X X Encryption X X Public Key Infrastructure X X X X Fabric Configuration Servers Management access from unsecured and unauthorized sources represents a major threat to fabric security.to address this threat, Fabric Configuration Servers enable sensitive administrative operations to be performed only from specified, trusted switches.these designated switches are responsible for managing the configuration and security parameters of all other switches in the fabric. Any number of switches within a fabric can be designated as Fabric Configuration Servers (as specified by WWN), and the list of designated switches is known fabric-wide. In this way, Fabric Configuration Servers secure the manager-to-fabric connection in-band as well as out-of-band. Within the set of Fabric Configuration Servers is the concept of a primary Fabric Configuration Server. Only the primary Fabric Configuration Server can initiate fabric-wide management changes.this capability helps eliminate unidentified local management requests initiated from untrusted switches. To increase administrator access control, a fabric-wide login name and password database replaces the previous model of switch-specific login names and passwords.this facility applies the same semantics to the SNMP community strings (which constitute a password-type facility to control access to SNMP functions). Organizations can disable this facility through two options, one for SNMP community strings and the other for the standard login name database. Disabling this new security policy results in a reversion to the original policy of unique logins and community strings on each switch. If the fabric-wide password and community string policies are enabled, any change in login name and/or password or SNMP community string is reflected on all switches in the fabric. In addition, when a new switch joins the fabric, its login/password database is changed to reflect the fabric view. 7

9 Secure Management Communications Brocade switches enable standard IP-based management communications between a switch and a manager. Certain elements of the manager-to-switch communications process such as passwords are encrypted to increase security. Management Access Controls Because certain management services such as SNMP, SES, API, and Telnet represent a potential threat of unauthorized access, Management Access Controls restrict their access to the fabric based on policy. If enabled, these policies control access by either IP addresses or WWNs, and the policies are known fabric-wide. WHITE PAPER Management Access Controls secure the in-band manager-to-fabric connection by controlling the HBA-to-fabric connections as well.these HBA-to-fabric controls apply to in-band access only.they can also turn off serial ports either individually or fabric-wide to limit access to trusted access points within the fabric. Organizations can use these controls to selectively disable management access and restrict facility access to a specified set of end points. For example, an end point might be a specific IP address for SNMP,Telnet, or API access or a specific port WWN for an HBA in a management service used for in-band methods such as SES or Management Server. In this way, Management Access Controls provide additional control beyond the secure management channels by restricting access to trusted access points within the network.these restrictions and any ACLs are known fabric-wide and are automatically installed in new switches that join the fabric.this capability helps prevent unauthorized users from manually changing fabric settings. 8

10 Device Connection Controls Because access control methods deployed in today s SANs use a requestor s WWN to verify access rights,wwn spoofing is a potential threat to SAN security. Secure Fabric OS addresses this vulnerability with port-level ACL controls known as Device Connection Controls.These controls secure the server (HBA)-to-fabric connection for both normal operations and management functions. Device Connection Controls enable organizations to bind a particular WWN to a specific switch port or set of ports preventing ports in another physical location from assuming the identity of an actual WWN.This capability enables better control over shared switch environments by allowing only a set of predefined WWNs to access particular ports in the fabric. Switch Connection Controls Switch Connection Controls enable organizations to restrict fabric connections to a designated set of switches, as identified by WWN.When a new switch is connected to a switch that is already part of the fabric, the new switch must be authenticated before it can join the fabric. Each switch has a digital certificate and a unique private key to enable secure switch-to-switch authentication. Switch Connection Controls address this security need by authenticating switches and providing specifications for an authorized switch list.the digital certificate authentication process ensures that an entity professing to be a switch is, in fact, a switch and that its WWN is correct. Each E_port connection between switches invokes a mutual authentication process by using digital certificates and private keys to enable a cryptographically secure multiphase authentication protocol. If the authentication process fails, the E_port is set to the segmented state, logically disconnecting the two switches.this authentication process validates that a specific E_port connects two legitimate switches, so it must be used on all E_ports even if many of them connect to the same pair of switches. 9

11 The authorized switch list (as specified by switch WWN) is used during fabric initialization and when a new switch attempts to join a fabric. New switches are configured with certificates and private keys at the time of manufacture. However, organizations with existing switches will need to upgrade them with certificate and key information at the installed location. Switch-to-switch operations are managed in-band, so no IP communications are required.this practice prevents users from arbitrarily adding switches to a fabric. WHITE PAPER A Strategic Framework for a More Secure SAN Environment Because a SAN fabric is only as secure as its weakest link, either the entire fabric is secure or none of the fabric is secure. As a result, all switches in the fabric must support Secure Fabric OS in order to achieve the highest level of security fabric-wide. Secure Fabric OS is the initial component of a comprehensive Brocade security framework designed to help ensure a secure fabric-wide enterprise without requiring redundant dual fabrics.this approach supports the need to centralize management tasks while helping to accelerate SAN growth and reduce the total cost of ownership. By implementing Brocade Secure Fabric OS throughout their SAN fabric infrastructures, organizations can achieve the high levels of data and system security that today s mission-critical business applications require. For more information about the advantages of Brocade SAN fabrics, visit 10

12 Corporate Headquarters 1745 Technology Drive San Jose, CA T: (408) F: (408) European Headquarters 29, route de l Aéroport Case Postale 105 Geneva 15, Switzerland 1215 T: F: [email protected] Asia Pacific Headquarters The Imperial Tower 15th Fl Uchisaiwaicho, Chiyoda-ku,Tokyo Japan T: F: [email protected] 2002 Brocade Communications Systems, Inc.All Rights Reserved. 03/02 GA-WP Brocade, the Brocade B weave logo, and SilkWorm are registered trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. All other brands, products, or service names are or may be trademarks or service marks of, and are used to identify, products or services of their respective owners. Notice:This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use.this informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government.

COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE

COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE Complementary technologies provide unique advantages over traditional storage architectures Often seen as competing technologies, Storage Area

More information

THE ESSENTIAL ELEMENTS OF A STORAGE NETWORKING ARCHITECTURE. The Brocade Intelligent Fabric. Services Architecture provides. a flexible framework for

THE ESSENTIAL ELEMENTS OF A STORAGE NETWORKING ARCHITECTURE. The Brocade Intelligent Fabric. Services Architecture provides. a flexible framework for THE ESSENTIAL ELEMENTS OF A STORAGE NETWORKING ARCHITECTURE The Brocade Intelligent Fabric Services Architecture provides a flexible framework for continued SAN growth As organizations increasingly need

More information

Facilitating a Holistic Virtualization Solution for the Data Center

Facilitating a Holistic Virtualization Solution for the Data Center WHITE PAPER DATA CENTER Facilitating a Holistic Virtualization Solution for the Data Center Brocade solutions provide a scalable, reliable, and highperformance foundation that enables IT organizations

More information

Data-at-Rest Encryption Addresses SAN Security Requirements

Data-at-Rest Encryption Addresses SAN Security Requirements Data-at-Rest Encryption Addresses SAN Security Requirements QLogic 2500 Series Fibre Channel Adapters Meet Enterprise Security Needs Key Findings SAN security via encryption is necessary for protecting

More information

How To Secure A Storage Area Network (San) Network Security

How To Secure A Storage Area Network (San) Network Security SAN WHITE PAPER STORAGE AREA NETWORK The Growing Need for Security in Storage Area Networks New features in Brocade Fabric OS 5.2 help increase SAN security in enterprise environments to better protect

More information

NETWORK FUNCTIONS VIRTUALIZATION. The Top Five Virtualization Mistakes

NETWORK FUNCTIONS VIRTUALIZATION. The Top Five Virtualization Mistakes WHITE PAPER www.brocade.com NETWORK FUNCTIONS VIRTUALIZATION The Top Five Virtualization Mistakes Virtualization is taking the IT world by storm. After years of IT build-out, virtualization suddenly fixes

More information

How To Use The Cisco Mds F Bladecenter Switch For Ibi Bladecenter (Ibi) For Aaa2 (Ibib) With A 4G) And 4G (Ibb) Network (Ibm) For Anaa

How To Use The Cisco Mds F Bladecenter Switch For Ibi Bladecenter (Ibi) For Aaa2 (Ibib) With A 4G) And 4G (Ibb) Network (Ibm) For Anaa Cisco MDS FC Bladeswitch for IBM BladeCenter Technical Overview Extending Cisco MDS 9000 Family Intelligent Storage Area Network Services to the Server Edge Cisco MDS FC Bladeswitch for IBM BladeCenter

More information

Ten Ways to Optimize Your Microsoft Hyper-V Environment with Brocade

Ten Ways to Optimize Your Microsoft Hyper-V Environment with Brocade WHITE PAPER Server Connectivity Ten Ways to Optimize Your Microsoft Hyper-V Environment with Brocade To maximize the benefits of network connectivity in a virtualized server environment, Brocade works

More information

HBA Virtualization Technologies for Windows OS Environments

HBA Virtualization Technologies for Windows OS Environments HBA Virtualization Technologies for Windows OS Environments FC HBA Virtualization Keeping Pace with Virtualized Data Centers Executive Summary Today, Microsoft offers Virtual Server 2005 R2, a software

More information

Scalable Approaches for Multitenant Cloud Data Centers

Scalable Approaches for Multitenant Cloud Data Centers WHITE PAPER www.brocade.com DATA CENTER Scalable Approaches for Multitenant Cloud Data Centers Brocade VCS Fabric technology is the ideal Ethernet infrastructure for cloud computing. It is manageable,

More information

Storage Security. Presenter: Himanshu Dwivedi. BlackHat 2003

Storage Security. Presenter: Himanshu Dwivedi. BlackHat 2003 Storage Security Presenter: Himanshu Dwivedi BlackHat 2003 Agenda Introduction Fibre Channel Overview Attacks on Fibre Channel SANs Conclusion Introduction Overview What are SANs? What is Storage Security?

More information

8Gb Delivers Enhanced Storage Area Network (SAN) Data Security

8Gb Delivers Enhanced Storage Area Network (SAN) Data Security W H I T E P a pe r Third party information brought to you courtesy of Dell. 8Gb Delivers Enhanced Storage Area Network (SAN) Data Security QLogic s Better 8Gb is Security Optimized Expanded Access Control

More information

Brocade Fabric Vision Technology Frequently Asked Questions

Brocade Fabric Vision Technology Frequently Asked Questions Brocade Fabric Vision Technology Frequently Asked Questions Introduction This document answers frequently asked questions about Brocade Fabric Vision technology. For more information about Fabric Vision

More information

Brocade and McAfee Change the Secure Networking Landscape with High Performance at Lowest TCO

Brocade and McAfee Change the Secure Networking Landscape with High Performance at Lowest TCO WHITE PAPER www.brocade.com IP NETWORK SECURITY Brocade and McAfee Change the Secure Networking Landscape with High Performance at Lowest TCO The Non-Stop Secure Network, a Brocade and McAfee joint solution,

More information

IBM TotalStorage SAN Switch F16

IBM TotalStorage SAN Switch F16 Intelligent fabric switch with enterprise performance for midrange and large storage networks IBM TotalStorage SAN Switch F16 High port density packaging helps save rack space Highlights Can be used as

More information

Data Center Evolution without Revolution

Data Center Evolution without Revolution WHITE PAPER www.brocade.com DATA CENTER Data Center Evolution without Revolution Brocade networking solutions help organizations transition smoothly to a world where information and applications can reside

More information

Fibre Channel over Ethernet: Enabling Server I/O Consolidation

Fibre Channel over Ethernet: Enabling Server I/O Consolidation WHITE PAPER Fibre Channel over Ethernet: Enabling Server I/O Consolidation Brocade is delivering industry-leading oe solutions for the data center with CNAs, top-of-rack switches, and end-of-row oe blades

More information

Brocade Monitoring Services Security White Paper

Brocade Monitoring Services Security White Paper WHITE PAPER Monitoring Services Security White Paper In today s globally connected world, the enterprise network is a strategic platform, a platform that demands deep and instantaneous integration between

More information

IBM BladeCenter H with Cisco VFrame Software A Comparison with HP Virtual Connect

IBM BladeCenter H with Cisco VFrame Software A Comparison with HP Virtual Connect IBM BladeCenter H with Cisco VFrame Software A Comparison with HP Connect Executive Overview This white paper describes how Cisco VFrame Server Fabric ization Software works with IBM BladeCenter H to provide

More information

CLE202 Introduction to ServerIron ADX Application Switching and Load Balancing

CLE202 Introduction to ServerIron ADX Application Switching and Load Balancing Introduction to ServerIron ADX Application Switching and Load Balancing Student Guide Revision : Introduction to ServerIron ADX Application Switching and Load Balancing Corporate Headquarters - San

More information

WHITE PAPER. Enhancing Application Delivery and Load Balancing on Amazon Web Services with Brocade Virtual Traffic Manager

WHITE PAPER. Enhancing Application Delivery and Load Balancing on Amazon Web Services with Brocade Virtual Traffic Manager WHITE PAPER Enhancing Application Delivery and Load Balancing on Amazon Web Services with Brocade Virtual Traffic Manager ALREADY USING AMAZON ELASTIC LOAD BALANCER? As an abstracted service, Amazon ELB

More information

Cloud Optimized Performance: I/O-Intensive Workloads Using Flash-Based Storage

Cloud Optimized Performance: I/O-Intensive Workloads Using Flash-Based Storage WHITE PAPER Cloud Optimized Performance: I/O-Intensive Workloads Using Flash-Based Storage Brocade continues to innovate by delivering the industry s first 16 Gbps switches for low latency and high transaction

More information

Brocade SAN Scalability Guidelines: Brocade Fabric OS v7.x

Brocade SAN Scalability Guidelines: Brocade Fabric OS v7.x Brocade SAN Scalability Guidelines: Brocade Fabric OS v7.x Version 7.2, update 1 Dated: February 5, 2014 This document provides scalability guidelines that can be used to design and deploy extremely stable

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

Key Management Best Practices

Key Management Best Practices White Paper Key Management Best Practices Data encryption is a fundamental component of strategies to address security threats and satisfy regulatory mandates. While encryption is not in itself difficult

More information

WHITE PAPER. Cloud Networking: Scaling Data Centers and Connecting Users

WHITE PAPER. Cloud Networking: Scaling Data Centers and Connecting Users WHITE PAPER Cloud Networking: Scaling Data Centers and Connecting Users While the business promise of cloud computing is broad, there are a few basic enabling themes underlying an effective cloud design:

More information

N_Port ID Virtualization

N_Port ID Virtualization A Detailed Review Abstract This white paper provides a consolidated study on the (NPIV) feature and usage in different platforms and on NPIV integration with the EMC PowerPath on AIX platform. February

More information

Avaya G700 Media Gateway Security - Issue 1.0

Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise

More information

The Brocade SDN Controller in Modern Service Provider Networks

The Brocade SDN Controller in Modern Service Provider Networks WHITE PAPER The Controller in Modern Service Provider Networks The OpenDaylight-based Controller combines innovations with modular software engineering and model-driven network management for a cost-effective,

More information

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD NATIONAL SECURITY AGENCY Ft. George G. Meade, MD 18 October 2007 Systems and Network Analysis Center Best Practices for Storage Networks This document contains 30 sheets. Table of Contents 1. Executive

More information

The Road to SDN: Software-Based Networking and Security from Brocade

The Road to SDN: Software-Based Networking and Security from Brocade WHITE PAPER www.brocade.com SOFTWARE NETWORKING The Road to SDN: Software-Based Networking and Security from Brocade Software-Defined Networking (SDN) presents a new approach to rapidly introducing network

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency

Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency WHITE PAPER SERVICES Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency Brocade monitoring service delivers business intelligence to help IT organizations meet SLAs,

More information

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION

More information

Overcoming Security Challenges to Virtualize Internet-facing Applications

Overcoming Security Challenges to Virtualize Internet-facing Applications Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing

More information

Securing an IP SAN. Application Brief

Securing an IP SAN. Application Brief Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.

More information

The Business Case for Software-Defined Networking

The Business Case for Software-Defined Networking WHITE PAPER The Business Case for Software-Defined Networking Brocade enables customers a means of reducing costs of service delivery through Software-Defined Networking (SDN) technologies. In addition,

More information

BASCS in a Nutshell Study Guide for Exam 160-020 Brocade University Revision 03-2012

BASCS in a Nutshell Study Guide for Exam 160-020 Brocade University Revision 03-2012 BASCS in a Nutshell Study Guide for Exam 160-020 Brocade University Revision 03-2012 2013 Brocade Communications Corporate Headquarters - San Jose, CA USA T: (408) 333-8000 [email protected] European Headquarters

More information

Ethernet Fabrics: An Architecture for Cloud Networking

Ethernet Fabrics: An Architecture for Cloud Networking WHITE PAPER www.brocade.com Data Center Ethernet Fabrics: An Architecture for Cloud Networking As data centers evolve to a world where information and applications can move anywhere in the cloud, classic

More information

Windows Web Based VPN Connectivity Details & Instructions

Windows Web Based VPN Connectivity Details & Instructions VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft

More information

Potential Targets - Field Devices

Potential Targets - Field Devices Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to

More information

Diagnostics and Troubleshooting Using Event Policies and Actions

Diagnostics and Troubleshooting Using Event Policies and Actions Diagnostics and Troubleshooting Using Event Policies and Actions Brocade Network Advisor logs events and alerts generated by managed devices and the management server and presents them through the master

More information

How To Protect Your Network From Attack

How To Protect Your Network From Attack Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: [email protected]

More information

BROCADE PERFORMANCE MANAGEMENT SOLUTIONS

BROCADE PERFORMANCE MANAGEMENT SOLUTIONS Data Sheet BROCADE PERFORMANCE MANAGEMENT SOLUTIONS SOLUTIONS Managing and Optimizing the Performance of Mainframe Storage Environments HIGHLIGHTs Manage and optimize mainframe storage performance, while

More information

Multitenancy Options in Brocade VCS Fabrics

Multitenancy Options in Brocade VCS Fabrics WHITE PAPER DATA CENTER Multitenancy Options in Brocade VCS Fabrics As cloud environments reach mainstream adoption, achieving scalable network segmentation takes on new urgency to support multitenancy.

More information

Introducing Brocade VCS Technology

Introducing Brocade VCS Technology WHITE PAPER www.brocade.com Data Center Introducing Brocade VCS Technology Brocade VCS technology is designed to revolutionize the way data center networks are architected and how they function. Not that

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010 S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...

More information

Choosing the Best Open Standards Network Strategy

Choosing the Best Open Standards Network Strategy WHITE PAPER IP network Choosing the Best Open Standards Network Strategy In order to truly align the enterprise infrastructure strategy with business requirements, organizations must be free to choose

More information

SECURING A STORAGE AREA NETWORKS

SECURING A STORAGE AREA NETWORKS RESEARCH ARTICLE OPEN ACCESS SECURING A STORAGE AREA NETWORKS R.Sumangali *1, Dr.B.Srinivasan #2 Assistant Professor, Department of Information Technology Gobi Arts & Science College, Gobichettipalayam,

More information

EPICenter Network Management Software

EPICenter Network Management Software EPICenter Network Management Software EPICenter management suite is a scalable full-featured network management tool that simplifies configuring, troubleshooting and status monitoring of IP-based networks.

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463

More information

Chapter 10. Cloud Security Mechanisms

Chapter 10. Cloud Security Mechanisms Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6)

Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6) WHITE PAPER www.brocade.com APPLICATION DELIVERY Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6) As IPv4 addresses dwindle, companies face the reality of a dual-protocol world The transition

More information

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

CyberSource Payment Security. with PCI DSS Tokenization Guidelines CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance

More information

How To Connect Virtual Fibre Channel To A Virtual Box On A Hyperv Virtual Machine

How To Connect Virtual Fibre Channel To A Virtual Box On A Hyperv Virtual Machine Virtual Fibre Channel for Hyper-V Virtual Fibre Channel for Hyper-V, a new technology available in Microsoft Windows Server 2012, allows direct access to Fibre Channel (FC) shared storage by multiple guest

More information

How To Secure An Rsa Authentication Agent

How To Secure An Rsa Authentication Agent RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

PrivyLink Cryptographic Key Server *

PrivyLink Cryptographic Key Server * WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology

More information

THE PATH TO A GREEN DATA CENTER. Hitachi Data Systems and Brocade. Joint Solution Brief

THE PATH TO A GREEN DATA CENTER. Hitachi Data Systems and Brocade. Joint Solution Brief THE PATH TO A GREEN DATA CENTER Hitachi Data Systems and Brocade Joint Solution Brief Hitachi Data Systems The Growing Need for Green Data Center Solutions 50 percent of data centers worldwide will have

More information

Brocade Premier and Premier-Plus Support

Brocade Premier and Premier-Plus Support DATA SHEET Brocade Premier and Premier-Plus Support HIGHLIGHTS Streamlines communication and accelerates problem resolution with a single point of contact into Brocade Technical Support Provides priority

More information

MAC Web Based VPN Connectivity Details and Instructions

MAC Web Based VPN Connectivity Details and Instructions MAC Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users

More information

Dionseq Uatummy Odolorem Vel Layered Security Approach

Dionseq Uatummy Odolorem Vel Layered Security Approach A P P L I C A T I O N B R I E F Aciduisismodo Hitachi Content Dolore Platform Eolore Dionseq Uatummy Odolorem Vel Layered Security Approach Highly Scalable, Cloud-enabled Platform Ensures Data Safety with

More information

A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications

A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications Polycom Recommended Best Security Practices for Unified Communications March 2012 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective,

More information

EMC ViPR Controller. User Interface Virtual Data Center Configuration Guide. Version 2.4 302-002-416 REV 01

EMC ViPR Controller. User Interface Virtual Data Center Configuration Guide. Version 2.4 302-002-416 REV 01 EMC ViPR Controller Version 2.4 User Interface Virtual Data Center Configuration Guide 302-002-416 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published November,

More information

Thales e-security Key Isolation for Enterprises and Managed Service Providers

Thales e-security Key Isolation for Enterprises and Managed Service Providers Thales e-security Key Isolation for Enterprises and Managed Service Providers Technical White Paper May 2015 Contents 1. Introduction 1. Introduction... 2 2. Business Models.... 3 3. Security World...

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions. Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

Brocade VCS Fabrics: The Foundation for Software-Defined Networks

Brocade VCS Fabrics: The Foundation for Software-Defined Networks WHITE PAPER DATA CENTER Brocade VCS Fabrics: The Foundation for Software-Defined Networks Software-Defined Networking (SDN) offers significant new opportunities to centralize management and implement network

More information

Brocade Telemetry Solutions

Brocade Telemetry Solutions WHITE PAPER www.brocade.com Service provider Brocade Telemetry Solutions telemetry applications such as Monitoring and Lawful Intercept are important to Service Providers and impose unique requirements

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Multi-Chassis Trunking for Resilient and High-Performance Network Architectures

Multi-Chassis Trunking for Resilient and High-Performance Network Architectures WHITE PAPER www.brocade.com IP Network Multi-Chassis Trunking for Resilient and High-Performance Network Architectures Multi-Chassis Trunking is a key Brocade technology in the Brocade One architecture

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has

More information

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What

More information

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract

More information

White Paper. BD Assurity Linc Software Security. Overview

White Paper. BD Assurity Linc Software Security. Overview Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about

More information

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

NETWORK FUNCTIONS VIRTUALIZATION. Segmenting Virtual Network with Virtual Routers

NETWORK FUNCTIONS VIRTUALIZATION. Segmenting Virtual Network with Virtual Routers WHITE PAPER www.brocade.com NETWORK FUNCTIONS VIRTUALIZATION Segmenting Virtual Network with Virtual Routers INTRODUCTION For the past 20 years, network architects have used segmentation strategies to

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Learn the essentials of virtualization security

Learn the essentials of virtualization security Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

In-Band Security Solution // Solutions Overview

In-Band Security Solution // Solutions Overview Introduction The strategy and architecture to establish and maintain infrastructure and network security is in a rapid state of change new tools, greater intelligence and managed services are being used

More information

Brocade Network Advisor High Availability Using Microsoft Cluster Service

Brocade Network Advisor High Availability Using Microsoft Cluster Service Brocade Network Advisor High Availability Using Microsoft Cluster Service This paper discusses how installing Brocade Network Advisor on a pair of Microsoft Cluster Service nodes provides automatic failover

More information

Licensing VeriSign Certificates

Licensing VeriSign Certificates Licensing VeriSign Certificates Securing Multiple Web Server and Domain Configurations CONTENTS + Introduction 3 + VeriSign Licensing 3 SSL-Certificate Use Restrictions 4 Best Practices for Ensuring Trust

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

A Strategic Approach to Enterprise Key Management

A Strategic Approach to Enterprise Key Management Ingrian - Enterprise Key Management. A Strategic Approach to Enterprise Key Management Executive Summary: In response to security threats and regulatory mandates, enterprises have adopted a range of encryption

More information

Solution Guide: Brocade Server Application Optimization for a Scalable Oracle Environment

Solution Guide: Brocade Server Application Optimization for a Scalable Oracle Environment Solution Guide: Brocade Server lication Optimization for a Scalable Oracle Environment Optimize the performance and scalability of Oracle applications and databases running Oracle Enterprise Linux (OEL)

More information