Blaze Vault Online Backup. Whitepaper Data Security



Similar documents
DFW Backup Software. Whitepaper Data Security

Ahsay Online Backup. Whitepaper Data Security

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

Data Superhero Online Backup Whitepaper Data Security

ELPBack Online Backup Whitepaper Data Security Version 5.5.x Jun 2008 Protecting Tomorrow with yesterday ELPBack Offsite Backup Whitepaper Data

NWIMS. Online Backup Security Documentation

1. Secure 128-Bit SSL Communication 2. Backups Are Securely Encrypted 3. We Don t Keep Your Encryption Key VERY IMPORTANT:

eztechdirect Backup Service Features

DRAFT Standard Statement Encryption

Is your data safe out there? -A white Paper on Online Security

Out of Harms Reach -A Whitepaper on Online Backup

Securing Data at Rest ViSolve IT Security Team

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Features Security. File Versioning. Intuitive User Interface. Fast and efficient Backups

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

Sophisticated Password Policy

CRYPTOGRAPHY IN NETWORK SECURITY

MQ Authenticate User Security Exit Overview

SVA Backup Plus Features

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

Blaze Vault Online Backup. Whitepaper Blaze Vault Online Backup Agent

Security Policy Revision Date: 23 April 2009

BeamYourScreen Security

Introduction. Ease-of-Use

Overview Servers and Infrastructure Communication channels Peer-to-Peer connections Data Compression and Encryption...

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

MIKOGO SECURITY DOCUMENT

Privacy + Security + Integrity

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

Online Backup Solution Features

Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue:

Secure Your Source Code and Digital Assets

Analyzing the Security Schemes of Various Cloud Storage Services

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

Securing Ship-to-Shore Data Flow

Online Backup by Mozy. Common Questions

PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.

Sync Security and Privacy Brief

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services

1 Using DATABOKS Online Backup Manager

MovieLabs Specification for Enhanced Content Protection Version 1.0

Fax

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

SSL A discussion of the Secure Socket Layer

M Y S E C U R E B A C K U P S E R V E R E D I T I O N. p r o d u c t o v e r v i e w O N L I N E S E R V E R B A C K U P

Cloud Backup Express

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

How To Understand And Understand The History Of Cryptography

Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

TeamViewer Security Information

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

The Misuse of RC4 in Microsoft Word and Excel

Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Security Architecture Whitepaper

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Virtual Private Networks

CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER

Question How do I access the router s web-based setup page? Answer

Authentication in WLAN

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

HIPAA Security Matrix

HIPAA COMPLIANCE AND

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

EXAM questions for the course TTM Information Security May Part 1

SSL. Secure Sockets Layer. - a short summary - By Christoph Gutmann and Khôi Tran

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.

DigiVault Online Backup Manager. User Guide

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Product Overview. Initial Seeding

How To Encrypt With A 64 Bit Block Cipher

Minimizing Computer Data Loss Risks With Online Backup. Seven Devastating but Common Computer Backup Mistakes

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Properties of Secure Network Communication

Brochure Achieving security with cloud data protection. Autonomy LiveVault

Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

The Nasuni Security Model

techsafe Features Technology Partners th Street - Vero Beach, FL (772) Page 1/

2014 IBM Corporation

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

As enterprises conduct more and more

Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution

Three attacks in SSL protocol and their solutions

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

White Paper. Enhancing Website Security with Algorithm Agility

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

SECURITY IN NETWORKS

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

CHAPTER 1 INTRODUCTION

RemotelyAnywhere. Security Considerations

Transcription:

Blaze Vault Online Backup Version 5.x Jun 2006

Table of Content 1 Introduction... 3 2 Blaze Vault Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 256-bit SSL communication... 4 2.2 Backup data are securely encrypted... 4 2.3 Encrypting key are well protected... 4 2.4 Best encryption algorithm is used... 5 2.5 Require 2.05 x 10 54 years to crack the 256-bit encryption... 5 2.6 Restrict access to data by IP addresses... 5 2.7 Data Centre Security... 5 Page 2 of 5

1 Introduction This document describes the security measures available in Blaze Vault Online Backup software from the user s perspective. It serves as a reference for partners when addressing customers queries on security. Page 3 of 5

2 Blaze Vault Offsite Backup Server Secure, Robust and Reliable 2.1 Secure 256-bit SSL communication All communications between Blaze Vault Backup Server and your computer are transported in a 256-bit SSL (Secure Socket Layer) channel. Although all your backup files travel through a public network (internet), eavesdroppers have no knowledge of what has been exchanged. 2.2 Backup data are securely encrypted All of your files are first compressed and encrypted with your defined encrypting key before they are sent to the Blaze Vault backup server. To all people but you, your files stored on the Blaze Vault backup server are no more than some garbage files with random content. 2.3 Encrypting key are well protected The encrypting key used to encrypt your files resides only on your computer and is known only to you. It is never transmitted anywhere across the network. Thus, even the system administrators will not be able to decrypt and view the content of your files stored on the backup server without your permission. This unfortunately means if the encrypting key is lost, you will never be able to recover your backup files. Technical Details The encrypting key for the different backup sets are stored the config.sys file, which is encoded by a proprietary algorithm: (Windows) (Linux) (Mac OS X) C:\Documents and Settings\administrator\.obm\config\config.sys ~/.obm/config/config.sys ~/.obm/config/config.sys Page 4 of 5

If client software cannot locate the config.sys (due to accidental deletion or logon to a new machine with the same account), it will prompt the user to re-enter the encrypting key for the backup set and then store it in the local config.sys. 2.4 Best encryption algorithm is used Currently, the algorithm that we are using to encrypt your files is 256-bit AES. AES was announced by National Institute of Standards and Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001 after a 5-year standardization process in which fifteen competing designs were presented and evaluated before Rijndael was selected as the most suitable (see Advanced Encryption Standard process for more details). It became effective as a standard May 26, 2002. As of 2009, AES is one of the most popular algorithms used in symmetric key cryptography. It is available in many different encryption packages. AES is the first publicly accessible and open cipher approved by the NSA for top secret information. For more information please visit here. 2.5 Require 2.05 x 10 54 years to crack the 256-bit encryption A 256-bit key size has 1.1 x 10 77 possible combinations. Even if you have the world best super computer, IBM s Roadrunner, manufactured in 2008, it would take 2.05 x 10 54 years to test all combinations. Assuming your have the super computer, Road Runner costing $133 million, which totals a capability of 1.7 PFLOPS (trillions of operations/second), available to you. To use brute force attack (checking all combinations) on this encryption algorithm it would take: 1.1* (10 77 ) (This is the possible number of AES 256-bit keys) 1.7* (10 15 ) (This is how fast Roadrunner can calculate each possible combination) = 64,705,882,352,941,200,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 Seconds or = 2,051,810,069,537,710,000,000,000,000,000,000,000,000,000,000,000,000,000 Years or 2.05 x 10 54 to successfully try all combinations. You can be sure that your data stored on our server is 100% secured. 2.6 Restrict access to data by IP addresses You can also restrict access to your backup files from the set of IP addresses you defined. If someone tries to access your data from an IP address not on your defined list, their access will be denied. This additional security ensures backup files are not open to all locations, even if the username and password are known. 2.7 Data Centre Security Trained security personnel maintain a 24/7/365 on site presence and carry out routine security checks. External Cameras and motion sensors cover the exterior perimeter of the data centre and are monitored by on site staff. Access to the data centre is protected by a sophisticated proximity fob system meaning all access events and movement within the data centre is logged and tracked. In addition security at the rack level can be enhanced by the addition of digital locks to rack doors. Page 5 of 5