Security through Motion: Protecting Data-at-Rest with Dispersive Software Defined Storage



Similar documents
An Introduction to Dispersive Virtualized Networks

For Your Eyes Only: Protecting Data-in-Motion with Dispersive Virtualized Networks

Teradata and Protegrity High-Value Protection for High-Value Data

Internet threats: steps to security for your small business

CoIP (Cloud over IP): The Future of Hybrid Networking

Anti-exploit tools: The next wave of enterprise security

CIOReview. Security First Corp Disruptive Innovation Re-Defining Data Security SDN SPECIAL. In My Opinion

Enterprise Data Protection

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

FEDERAL GOVERNMENT DATA CENTER OPTIMIZATION STARTS WITH FLASH STORAGE

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Why Add Data Masking to Your IBM DB2 Application Environment

Securing Data in the Cloud

Cisco Dynamic Workload Scaling Solution

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V

F5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security

UniFS A True Global File System

2015 CENTRI Data Breach Report:

Virtual Operational Data Store (VODS) A Syncordant White Paper

How To Create An Insight Analysis For Cyber Security

Enterprise Storage Manager. Managing Video As A Strategic Asset November 2009

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide

CDH AND BUSINESS CONTINUITY:

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Firewall Architecture

Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise

Delivering Analytics that Scale

VMware vcloud Networking and Security Overview

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

How Solace Message Routers Reduce the Cost of IT Infrastructure

Are You Ready for the Holiday Rush?

IP-VPN Architecture and Implementation O. Satty Joshua 13 December Abstract

IBM Tivoli Netcool network management solutions for SMB

Chapter 1: Introduction

Optimize Application Delivery Across Your Globally Distributed Data Centers

Enabling Cloud Architecture for Globally Distributed Applications

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

HIGH-SPEED BRIDGE TO CLOUD STORAGE

The Evolving Threat Landscape and New Best Practices for SSL

Decrypting Enterprise Storage Security

A Buyer's Guide to Data Loss Protection Solutions

The VoIP Institute, Inc. Presents. CxO 5 Minute VoIP Guru Guide

Windows Embedded Security and Surveillance Solutions

Unparalleled demands on storage shift IT expectations for managed storage services. April 2015 TBR

Central management of virtual resources

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

White Paper. Enhancing Storage Performance and Investment Protection Through RAID Controller Spanning

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Superior Web Application Performance in the Cloud

PrivyLink Cryptographic Key Server *

ipad in Business Security

With Great Power comes Great Responsibility: Managing Privileged Users

Inter-Tel 5000 Network Communications Solutions

SafeNet DataSecure vs. Native Oracle Encryption

S ven. Tips to Keep Financial Apps Safe & Secure

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

Microsoft SQL Server 2014 Fast Track

Whitepaper : Cloud Based Backup for Mobile Users and Remote Sites

Protecting Information in a Smarter Data Center with the Performance of Flash

Amazon Web Services and Maginatics Solution Brief

Windows Server 2008 R2 Hyper-V Server and Windows Server 8 Beta Hyper-V

Middleware- Driven Mobile Applications

ICTN Enterprise Database Security Issues and Solutions

Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data

2013 Cloud Storage Expectations

The Advanced Cyber Attack Landscape

The Evolution of the Central Office

Agent vs. Agent-less auditing

convergence: preparing the enterprise network

Executive summary. Introduction Trade off between user experience and TCO payoff

Securing Office 365 with MobileIron

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

Infor10 Corporate Performance Management (PM10)

EMC PowerPath Family

Data Center Network Evolution: Increase the Value of IT in Your Organization

Using In-Memory Computing to Simplify Big Data Analytics

It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration

Deploying iphone and ipad Security Overview

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

For instance, consider a customer order process. Documents such as orders can originate from paper

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

Choosing Encryption for Microsoft SQL Server

Data Center Performance Insurance

Is it Safe? The business impact of data protection. Bruce Master IBM LTO Program

RETHINK SECURITY FOR UNKNOWN ATTACKS

NASCIO 2015 State IT Recognition Awards

VERITAS Business Solutions. for DB2

White Paper. Data Security. The Top Threat Facing Enterprises Today

Ensuring the security of your mobile business intelligence

W.A.R.N. Passive Biometric ID Card Solution

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications

Software-Defined Networks Powered by VellOS

EMC BACKUP-AS-A-SERVICE

Radware s Behavioral Server Cracking Protection

REDEFINE SIMPLICITY TOP REASONS: EMC VSPEX BLUE FOR VIRTUALIZED ENVIRONMENTS

Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets

Transcription:

Security through Motion: Protecting Data-at-Rest with Dispersive Software Defined Storage

Divide and conquer. It s more than a military strategy. It s how Dispersive Technologies strengthens networks. Our software-defined solutions virtualize routing and data storage for IPbased networks. These solutions increase routing speeds, bolster security and improve reliability. They uniquely protect data-in-motion and data-at-rest in ways that help organizations reduce costs, streamline and secure operations, and perform more efficiently. Delivering real solutions to real problems. That s Dispersive Technologies. 2 3

Introduction Stored data is where the money is. It s where hackers find credit card and Social Security numbers, sensitive medical and financial information, intellectual property and email addresses. It s where one breach can cost a retailer, insurance company or investment firm billions of dollars in lost revenue and stock value not to mention lost consumer confidence and embarrassment when stolen data is leaked. Recent data breaches illustrate how encryption fails to adequately secure data-at-rest. These violations will certainly increase in frequency as hackers become more sophisticated and parallel processing capabilities continue to advance. Dispersive Software Defined Storage (Dispersive SDS) is a platform designed to overcome the current limitations on protecting stored data. Dispersive SDS virtualizes data storage for IP-based networks and then protects the stored data by shuffling it across storage devices. This paper describes this solution and the benefits it provides. Solution Overview and Component Definition Dispersive SDS comprises a number of components that collaborate to forward, store and shuffle data in ways that provide security, reliability and improved network performance. This platform utilizes: Standards-based IP connections Off-the-shelf data storage devices that leverage network block devices Computing devices that support the interface to a network drive, and A Dispersive Shuffling Server, server-based software which divides and forwards data across a virtualized storage pool of network block devices. In managing data storage and retrieval across these components, Dispersive software performs several key functions that combine to increase network speed, improve data security, and enhanced stored data reliability. Dispersive SDS software: 1. Divides data into blocks as small as one kilobyte 2. Sends each block to a different device selected from a virtualized pool of storage devices in different geographical locations 3. Shuffles the locations of these blocks dynamically based on: a. Access frequency b. Bandwidth availability c. I/O performance d. Time stored on a device e. Other factors important to the customer 4. Reassembles the data at the Dispersive Shuffling Server when queried or recalled by the client Dispersive Technologies' approach to data storage differs fundamentally from the way data is stored on traditional networks, where encrypted data at-rest typically stays at-rest until it is recalled or queried. Shuffle your data. Stack the deck against cybercrime. Delivering Real Advantages By dividing data blocks across multiple storage locations, and shuffling these blocks, Dispersive Technologies conquers traditional problems with securing data-at-rest. Specifically, Dispersive SDS provides: Tighter security: Data blocks shuffle across multiple drives which can be in different geographical locations. Consequently, the technology thwarts hackers more effectively than mere encryption. Capturing usable information becomes a costly, timeconsuming guessing game for a hacker, with little 4 5

chance of success. Discouraged, the hacker moves to easier targets. Greater reliability: Dispersive SDS deploys data across various physical devices located in geographically disparate areas. This built-in resiliency leads to greater reliability. Higher speeds: The Dispersive storage solution monitors network performance for bandwidth availability, I/O performance and myriad other factors. It then shuffles data blocks to locations where access is optimized. This dramatically speeds access to information and allows interactive access to big data without having to upgrade or alter routers. pool of network block devices presents as a network interface drive to edge client devices. With the client communicating directly with the Shuffling Server and the Shuffling Server communicating directly with the storage devices, network components collaborate to store and shuffle data in ways that meet established criteria. These criteria include bandwidth availability, I/O performance, time stored on device and others important to the customer. Packets flow through the driver in response to requests and commands from user-facing applications (e.g., Microsoft Office, mobile device apps, etc.) without any perceptible latency. The Shuffling Server takes pre-defined byte-sized chunks (as small as one kilobyte) and stores them across the available storage Conclusion Dispersive SDS virtualizes data storage for IPbased networks in a way that conquers weaknesses with at-rest data protection. Its innovative approach simultaneously renders existing hacking tools obsolete. Dispersive SDS improves the ways organizations guard their most important secrets and protects employees, customers and shareholders all while enhancing network performance and reducing costs. Dispersive Technologies: Transforming the Internet and the way organizations use it. We ve seen time and time again that merely encrypting stored data inadequately protects it against hacking. Our approach to securing at-rest data introduces a whole new complexity axis to the hacker s collection problem, one that means even if a hacker breaches your first level of defense, the compromised data is only a piece of the puzzle. Without the other pieces, the data More flexibility: Dispersive SDS moves stored data automatically to underutilized areas of the network. devices using a Dispersive concatenating algorithm. This means all available storage space can be used, is useless. This prevents overburdening any one resource at with the size of the store determined by dividing the any time. And since any pooled storage device can be employed, e.g., flash drives, flash memory, hard disk drives, etc., a multi-vendor, heterogeneous data amount of data to be stored by the size of the chunk. Shuffling data in this way secures it, and also makes the overall network more efficient. Data is pushed to Robert W. Twitchell, Jr., President and CEO, Dispersive Technologies storage strategy can be implemented. the fastest and least congested areas of the network. Reduced costs: Dispersive SDS customers typically Software semaphores, a hysteresis of persistence slash data costs by reducing or eliminating the need and an independent pass insure data integrity. for data duplication and the requirement to over- The Shuffling Server also orchestrates shuffling provision fast drives. of stored data to continuously improve network communications and create a security through Dispersive Software Defined motion paradigm. Storage transforms data security. Not only does it make it more difficult for hackers to steal complete data records, it also enables integrity checking a new tool to identify the presence of a stealthy hacker. Within a Dispersive SDS platform, software resides only on the Shuffling Server; the virtualized storage 6 7

Dispersive Technologies 2555 Westside Parkway, Suite 500 Alpharetta, GA 30004 1-844-403-5850 info@dispersivegroup.com 2015 Dispersive Technologies. All Rights Reserved. The information contained herein is subject to change without notice. (0415)