Brochure Achieving security with cloud data protection. Autonomy LiveVault

Similar documents
UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

Enable unified data protection

Understanding Sage CRM Cloud

Brochure. ECM without borders. HP Enterprise Content Management (ECM)

Injazat s Managed Services Portfolio

Integrated Data Protection for VMware infrastructure

Business white paper Top 10 reasons to choose Cloud-based Archiving

Why cloud backup? Top 10 reasons

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Gain control over all enterprise content

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

HealthcareBookings.com Security Set Up

Famly ApS: Overview of Security Processes

HP StoreEasy and Cloud-Based Data Protection

Sharpen your document and data security HP Security solutions for imaging and printing

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Hosted Testing and Grading

PCI DSS COMPLIANCE DATA

HP Device Manager 4.7

The EVault Portfolio

Retention & Destruction

Global Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway)

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Intelligent document management for the legal industry

Business white paper. environments. The top 5 challenges and solutions for backup and recovery

Top 5 reasons to choose HP Information Archiving

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

Security Overview Enterprise-Class Secure Mobile File Sharing

Transform records management

HP Device Manager 4.7

Security Whitepaper: ivvy Products

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations

ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators.

White Paper. BD Assurity Linc Software Security. Overview

IBM Security Privileged Identity Manager helps prevent insider threats

Brochure. Data Protector 9: Nine reasons to upgrade

Supplier IT Security Guide

VMware vcloud Air HIPAA Matrix

Online Backup Solution Features

HP StorageWorks Reference Information Storage System Designed to Assist Financial Services Organizations Comply with Retention Requirements

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

Data Management Policies. Sage ERP Online

Autodesk PLM 360 Security Whitepaper

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Projectplace: A Secure Project Collaboration Solution

Agio Managed Backup FLEXIBILITY RELIABILITY TRANSPARENCY SECURITY. CONTACT SALES (877) agio.com

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

A complete platform for proactive data management

DiamondStream Data Security Policy Summary

Remote Data Backups Systrust Certified Data Security Solution

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

ProjectManager.com Security White Paper

Security Policy JUNE 1, SalesNOW. Security Policy v v

Security & Infra-Structure Overview

HIPAA Security Matrix

ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

IBX Business Network Platform Information Security Controls Document Classification [Public]

Intel Enhanced Data Security Assessment Form

HP Device Manager 4.6

HP Service Manager Architecture and Security HP Software-as-a-Service

HP Data Protection. Business challenge: Resulting pain points: HP technology solutions:

Privacy + Security + Integrity

Security and Data Protection for Online Document Management Software

Security and Managed Services

QuickSpecs. Models. HP ProLiant Lights-Out 100c Remote Management Cards Overview

Healthcare Compliance Solutions

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013

Payment Card Industry Data Security Standard

FormFire Application and IT Security. White Paper

Table of contents

Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between

Accellion Security FAQ

How To Secure Your Data Center From Hackers

HP ProLiant Lights-Out 100c Remote Management Cards Overview

Transcription:

Achieving security with cloud data protection Autonomy LiveVault

Can cloud backup be secure? Today, more and more companies recognize the value and convenience of using cloud backup to protect their server data. But enterprises considering cloud storage for protecting their vital data face these security concerns: Could an unauthorized individual gain access to backed-up data? Could backed-up data be altered? Will necessary data be available whenever it s needed? Is data safe from fire, floods, and human error? HP Autonomy offers hosted data storage that enables you to reduce the costs, risks, and complexity of storing and protecting your business information. With a heightened focus on security, privacy, and cost savings, HP Autonomy goes beyond simple cloud storage to enterprise cloud security. Data Security Web Ui Security Physical Security Outbound-only connections Encrypted Mirrored facilities for Public key encryption for communication redundancy mutual authentication Privacy protection 7x24 security guards 256-bit Advanced Encryption Strict password rules Clean Agent Fire Extinguishing Standard (AES) Defined user rights and System and onsite firefighting Customers control encryption key passwords Digital signatures (Secure Sockets Layer) privileges apparatus and personnel Internal and external 24x7 environmental monitoring alarms PCI DSS and ISO 27001 certified Protect your information with Autonomy LiveVault HP Autonomy s LiveVault service the most trusted way to migrate your critical business information to the cloud and protect and manage it long-term addresses all these concerns with the most secure solution available. The LiveVault agent encrypts all data before transferring it from your servers. All data remains encrypted at our secure, offsite, underground data centers and on the optional TurboRestore appliance. Only you control the data encryption passwords. To ensure the physical security and availability of stored data, the LiveVault service mirrors all data to a second, geographically dispersed data center for full failover redundancy. HP Autonomy also offers the LiveVault licensed product to hosted partners, which enables you to operate your own servers. Client-side security for the licensed product is similar to security for the service. However, the security of stored data for the licensed product depends on your facilities, personnel, and policies. 2

Security for data in transit The LiveVault service assures that the connection between application servers and our secure off-site data centers is secure. It employs the best security methods available, including: Automatic, outbound-only connections: There are no inbound connections to the customer s environment. The LiveVault agent on a customer s server communicates only with the LiveVault backend infrastructure. The LiveVault agent initiates all connections from the customer s server (outbound connections) over two ports reserved for the LiveVault service, or over port 443 (the SSL port) if those ports are not available. Normally, there is no need to alter the firewall security perimeter. This makes installation particularly simple and secure at remote sites. Public key encryption for mutual authentication: The LiveVault infrastructure and the agent software independently validate certificates each time a connection is made. This authenticates the agent to the electronic vault, and the vault to the agent. 256-bit Advanced Encryption Standard (AES): Your data is encrypted during transmission and remains encrypted at all times while stored at an HP Autonomy facility. 256-bit Advanced Encryption Standard is the level of encryption that banks and government agencies employ. Customers control encryption key passwords: Customers may keep their encryption passwords private, so there is no possibility of any HP Autonomy employee accessing customer data. We also offer a free, optional escrow service for encryption passwords, which enables customers to recover data even if the encryption passwords are not available. Customers can change encryption passwords: If there is a potential security breach, such as when a trusted individual leaves a customer s company, the customer can simply change the data encryption passwords, which is similar to changing the door locks. Older backed-up data can still be restored, but only with the new password. Digital signatures: All communication between the LiveVault agent and vault uses industry-standard SSL (Secure Sockets L ayer). This prevents any accidental or malicious modification, and protects the integrity and confidentiality of all data. Security for the LiveVault Web user interface The LiveVault Web user interface is convenient for customers to use because only a Web browser is needed for access from anywhere in the world. Security features of the Web user interface include: Encrypted communication: Secure Sockets Layer (SSL) encryption protects the LiveVault Web user interface. Data protection: The contents of backed-up files are not accessible. Privacy protection: Because data encryption passwords are not set or accessed with the Web user interface, even if someone steals a user s login and password, they cannot restore any data, except to the specific computer where it originated. Strict password rules are available: A company can set password specifications for their account, such as minimum password length, reuse policy, expiration period, and requirement for nonalphabetic characters. Limits on insider attacks: Customers can grant users only the rights and privileges necessary for their specific job duties. For example, a help desk person might have the ability to initiate restores, but not to set or change backup policies or add other users. Similarly, an IT administrator might have some (or limited) responsibilities for servers and users where they work, but not be able to see or manipulate servers or user accounts at other locations. 3

Physical security for data stored in electronic vaults HP Autonomy owns or leases off-site facilities that provide high-security, environmentally controlled storage for media. These facilities include data centers with redundant infrastructure. These facilities include the following security measures: Extensive multi-acre underground sites Gated entrances with 7x24 security guards Restricted access requiring photo ID and visitor escort Real-time closed circuit TV monitoring Commercial power feeds with generators for full backup power Clean Agent Fire Extinguishing System (CAFES) and on-site firefighting apparatus and personnel Internal and external 24x7 environmental monitoring alarms for temperature, waterbug leaks, smoke, fire, and motion detection External accreditation by the Uptime Institute according to their Tier Classification and Performance Standard The data centers within the facilities have achieved SysTrust certification, which satisfies the specific Trust Services Principles and Criteria of the American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants (CICA). SysTrust examination assures that a system is reliable when measured against four essential principles: availability, security, integrity, and maintainability. LiveVault vaults LiveVault data is stored in electronic vaults in each data center. When customers sign up for the LiveVault service, their data is mirrored between vaults at each site for high availability. HP constantly monitors the data centers. In the unlikely possibility of a failure, backups are rerouted and continue automatically to the remaining vault. When the failure is repaired, all missing backup data replicates to the repaired or replaced vault. All other elements of the backend infrastructure, such as the Web servers, the backend database, and the command and control systems, are also redundant. Storage security All data stored on LiveVault vaults (and on TurboRestore appliances or Data Shuttles) is encrypted with 256-bit AES encryption. The only time data is decrypted is when a LiveVault software agent on a customer s server receives encrypted data while processing a restore request. Secure, reliable server protection LiveVault provides simple, automatic, continuous, secure, and reliable server and application data protection to the cloud. HP Autonomy is the only cloud data protection vendor that has the scale, expertise, and financial strength to help our customers manage their information in a way that is reliable and secure. We have 60 years of experience in more than 40 countries. Today, more than 22,000 servers worldwide are under the protection of the LiveVault service. Data backed up with the LiveVault service is automatically off-site and safer than it is in the customer s own facility. Customers rely on us to have their data available when they need it, while protecting the privacy and integrity of the data. Protect servers Backup session Microsoft TurboRestore TM Optional Mirrored Linux data 256 Bit AES Encryption TCP/IP centers Remote Service operations admin LiveVault center data shuttle Recovery session 4

The HP Autonomy vision: Get more out of your backup, and transform your backup data into a valuable business asset In most organizations, data backup is the only process that spans across all data types, applications, locations, and organizational departments. Traditionally, this data repository contains the organization s most current information and only gets used in the event that something goes wrong and data needs to be recovered. In an environment where organizations are being forced to quickly make data-driven decisions and comply with an increasing list of compliance and regulatory requirements, it is time to turn this data into an information advantage and not just lock it away. HP Autonomy data protection solutions enable you to turn your backup data repository into an information advantage. By indexing you backup data repository with IDOL, HP Autonomy s Intelligent Data Operating Layer, you can make information more accessible by utilizing the contextual search capabilities of IDOL to help meet regulatory and compliance requirements. Increase the value of your information Once your information is indexed, it can be put to use in many ways. The simplest way can be to enable rapid search and retrieval of single files via Autonomy IDOL s universal search capability which that lets users search for relevant information based on context and meaning. You can also use the same repository to derive insight to help make data-driven decisions. Equally important, you can use HP Autonomy s industry leading ediscovery and legal hold solutions to information should compliance conditions require this action. This capability is particularly useful in endpoint protection when data is often at its highest risk of being lost or intentionally deleted by a user. Autonomy IDOL provides the foundation for a comprehensive portfolio of information management tools including archiving, content management, ediscovery, analytics, and more. By leveraging backup data innovatively through IDOL s meaning-based indexing capabilities, you can fully utilize the backup data repository as a competitive differentiator rather than locking it away for risk management. About HP Autonomy HP Autonomy is a global leader in software that processes human information, or unstructured data, including social media, email, video, audio, text and web pages, etc. Autonomy s powerful management and analytic tools for structured information together with its ability to extract meaning in real time from all forms of information, regardless of format, is a powerful tool for companies seeking to get the most out of their data. Autonomy s product portfolio helps power companies through enterprise search analytics, business process management and OEM operations. Autonomy also offers information governance solutions in areas such as ediscovery, content management and compliance, as well as marketing solutions that help companies grow revenue, such as web content management, online marketing optimization and rich media management. Please visit autonomy.com to find out more. Sign up for updates hp.com/go/getupdated Share with colleagues Copyright 2013 HP Autonomy. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.the information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions. autonomy.com 20130211_PI_HP_AUT_BR_LiveVault_Security