CIOReview. Security First Corp Disruptive Innovation Re-Defining Data Security SDN SPECIAL. In My Opinion



Similar documents
Securing Data in the Cloud

NWN CRAFTING A FLEXIBLE AND SEAMLESS TRANSITION TO THE CLOUD CLOUD SPECIAL IN MY OPINION CIO INSIGHTS. Company of the Month

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

UniFS A True Global File System

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Analytics In the Cloud

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

How to ensure control and security when moving to SaaS/cloud applications

Things You Need to Know About Cloud Backup

Media Shuttle s Defense-in- Depth Security Strategy

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.

The cloud - ULTIMATE GAME CHANGER ===========================================

Security Architecture Whitepaper

Automated file management with IBM Active Cloud Engine

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Business Continuity and Disaster Recovery Solutions in Government

Password Management Evaluation Guide for Businesses

Whitepaper : Cloud Based Backup for Mobile Users and Remote Sites

Encryption Key Management for Microsoft SQL Server 2008/2014

Diagram 1: Islands of storage across a digital broadcast workflow

Software defined networking. Your path to an agile hybrid cloud network

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security

How a Hybrid Cloud Strategy Can Empower Your IT Department

High Security Online Backup. A Cyphertite White Paper February, Cloud-Based Backup Storage Threat Models

Provably Secure Data Protection in the Cloud. ICDES (IBM Cloud Data Encryption Services)

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

Big data management with IBM General Parallel File System

SureDrop Secure collaboration. Without compromise.

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

Five Best Practices for Improving the Cloud Experience by Cloud Innovators. By Hitachi Data Systems

How To Decide If You Should Move To The Cloud

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Security through Motion: Protecting Data-at-Rest with Dispersive Software Defined Storage

How To Protect Your Mobile Devices From Security Threats

Cloud Failover Appliance

Preparing your network for the mobile onslaught

Four Ways High-Speed Data Transfer Can Transform Oil and Gas WHITE PAPER

Self-Encrypting Hard Disk Drives in the Data Center

Cloud-Era File Sharing and Collaboration

Service Overview CloudCare Online Backup

Choosing an MDM Platform

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

WhitePaper. Private Cloud Computing Essentials

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

Network Security Landscape

Sync Security and Privacy Brief

HGST Object Storage for a New Generation of IT

Encryption, Key Management, and Consolidation in Today s Data Center

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION

How To Protect Video From Being Lost In A Fault Fault On A Network With A Shadow Archive

security in the cloud White Paper Series

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

High speed Ethernet WAN: Is encryption compromising your network?

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Moving to the Cloud: What Every CIO Should Know

The case for cloud-based disaster recovery

Global Network. Whitepaper. September Page 1 of 9

data Centres solutions-paper

Designing a Cloud Storage System

The Importance of a Resilient DNS and DHCP Infrastructure

Session 11 : (additional) Cloud Computing Advantages and Disadvantages

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Azure Media Service Cloud Video Delivery KILROY HUGHES MICROSOFT AZURE MEDIA

How the emergence of OpenFlow and SDN will change the networking landscape

The benefits of migrating to Exchange 2010

Leverages of Symantec and Enterprise Vault

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

GlobalSCAPE Wide Area File Services

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Technical Brief: Global File Locking

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY

Preemptive security solutions for healthcare

Executive Brief on Enterprise Next-Generation Firewalls

HP StoreEasy and Cloud-Based Data Protection

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

IBM Global Technology Services September NAS systems scale out to meet growing storage demand.

4 Critical Risks Facing Microsoft Office 365 Implementation

Software-Defined Networks Powered by VellOS

Leveraging Cloud Object Storage for Cost Savings, Scale and Reliability. Avere Systems Adds Cloud Storage as a NAS Tier

The Rising Cost of Customer Service:

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility

The New IP Networks: Time to Move From PoC to Revenue

SiteCelerate white paper

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration

The CIO s Dream: A Cloud Platform With Lower Cost, More Agility and Better Performance. A publication by:

Everything You Need To Know About Cloud Computing

SteelFusion with AWS Hybrid Cloud Storage

Agio Managed Backup FLEXIBILITY RELIABILITY TRANSPARENCY SECURITY. CONTACT SALES (877) agio.com

The digital future for energy and utilities.

Why cloud backup? Top 10 reasons

Are You A Sitting Duck?

Differentiating Your Healthcare Institution While Improving Profitability // White Paper

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Transcription:

SDN SPECIAL AUGUST-14-2015 CIOREVIEW.COM In My Opinion Andre Fuetsch, SVP, Architecture & Design, AT&T Security First Corp Disruptive Innovation Re-Defining Data Security Mark O Hare, Founder, President & CEO 1 1

Cover Story Security First Corp. Disruptive Innovation Re-Defining Data Security By Judy Christin M 210 August JULY 2014 2015 ark O Hare first realized the need to completely overhaul how organizations handled sensitive data during his successful career in the US Navy, where he served as the Program Executive Officer of the US Navy Aircraft Carrier program. When he entered the private sector, O Hare immediately began to explore the idea of securely accessing data anytime and anywhere. He founded Security First Corp. (SFC) in 2002, and as President/CEO started the development of a ground-breaking security technology that centered on the data itself. It was like working in a skunk works environment, says O Hare, we took the science and built the technology around it, focusing on data-centric security.

Mark O Hare, Founder, President & CEO 11 3

SFC tackles data security and survivability in today s complex and vulnerable data storage environments, like the cloud, where traditional network defenses are beginning to struggle. Combining the concepts of multi-factor secret sharing, keyed information dispersal and internal key control, O Hare and his team created SecureParser extended (SPx). This technology, which has more than 250 patents, is the core of Security First Corp. and powers every product and solution in their portfolio. SFC also develops and licences their technology for use in third party software, like IBM s ICDES, to provide a variety of software-defined data protection solutions that make data completely secure, highly available and resilient. Significant effort and expense goes into protecting the network through perimeter defense strategy. But the reason for the attacks in the first place is to get to the data. Cyber attackers don t stop at your network, and we believe your protection shouldn t either. It s a statistical certainty that you will be attacked. Data has to be proactively protected and rendered useless to the attacker, and that is exactly what our technology does, affirms O Hare. A major problem with traditional data protection and encryption is that the data cannot be used while it is in an encrypted state. If your data is secured but can t be used, then what good is it! exclaims O Hare. There must be a balance between usability and security. He envisions going beyond standard encryption to include random splitting and resiliency at the very core of data, the binary 1 s and 0 s. We ve reduced the cost of securing data by minimizing the operational cycle time and making it highly available, he remarks, and found that with this new technology, data will not only be more secure, but more cost efficient to store. Today, cyber attack reports reveal over 100 companies are hacked every week, with 2.3 million records stolen every day. Last year alone, five major organizations (Sony, The Home Depot, Anthem, Target and JP Morgan Chase) were victims of significant cyber breaches. In June it was revealed that the U.S. Government s Office of Personnel Management had 4 million records hacked affecting over 21 million people. In July, it was reported that United Airlines was hacked and intruders made off with important data including manifests containing detailed passenger information. All of these organizations were subject to immense security breaches costing millions of dollars and affecting hundreds of millions of people, despite their sophisticated network protection. The Core Process: SPx The patented SPx technology is the core of Security First Corp. s products. This breakthrough technology first encodes the data using AES-256 encryption, then cryptographically splits the encrypted data, randomizes it, and disperses it into a user-defined number of unique physically or geographically separated locations. Key management is almost entirely internal, and protected keys are securely kept by the creator of the data itself. No third party or key escrow systems are needed. "We have built a complete internal key management system where nearly all of the keys are securely managed within the system itself. This significantly reduces the risk and cost of external key storage, says O Hare. The majority of the keys are built into the data in a distinctive way, eliminating exposure. Instead of millions of keys controlling millions of files, only a minimum set of keys need to be managed. With the keys secure, the data is randomly split into its DNA : the 1 s and 0 s that make up the file itself. O Hare explains, By working at the bit level and introducing fault tolerance capability, we can randomly split the data down to the bit level and 4 12

package it into shares for dispersal. In each share, extra bits are added so that if any one share is breached or exposed, the stolen data is completely unreadable. Any lost, damaged or missing data can be recreated from the remaining shares without having to decrypt the data. Additionally, all data is authenticated with a message authentication code (GMAC, HMAC or other) at the 256 or 512 bit level. In newer encryption systems, a data migration strategy must be planned and implemented to bring large data sets to a single place before encryption. We just bring the data in, read it behind the scenes and encrypt and protect it simultaneously. We repeat the process for the newer set of data received, be it a command line or GUI interface. Our intelligent configuration tools configure and manage the software and data to be dealt with for optimal administration and security, says O Hare. SFC s ParsedCloud is a free and secure file transfer application designed for transferring any size and any type of digital file between users, and is already being used by thousands of customers. Unlike other file transfer products, ParsedCloud does all the encryption itself. Once encrypted, the data is split into shares and pushed to four cloud locations across the country. The shares are never together at the same site, eliminating the risk of exposure. The cryptographic splitting of data occurs locally on the machine where the ParsedCloud software resides. When authenticated users submit a request for download, the encrypted data gets downloaded to their machines and is recombined. Hackers trying to execute attacks in the middle gain nothing. The data is seen only by the creator and the intended recipients. At our end, we only see how fast the data is moving, not what the data contains, says O Hare. Both SPx and the key management protocol are certified by the Federal Information and Processing Standards 140-2 (FIPS 140-2). This means that any product or solution based on SPx already meets the standards for many government regulations. The solutions uniquely tackle the omni-present problem of cyber breaches in compliance with HIPAA, HITECH, FISMA, Sarbanes-Oxley, FERPA and PCI DSS. We are the only solution providers in the world who can rebuild encrypted data " Intelligent Game Changers SFC has formulated innovative solutions and products by adding intelligent features to the SPx technology, which enable the cryptographic splitting capability for applications and business processes. By journaling to a cache, any time an individual location becomes unavailable the journal is used to store transactions locally until the share is online again. If the data downtime extends beyond the time protected by journaling, SPx can initiate a complete rebuild of the data in the background. This rebuild does not interfere with any of the other ongoing processes, and it can be done without the need to decrypt any of the protected data. We are the only solution providers in the world who can rebuild encrypted data, says O Hare. SFC s 13 5

upcoming product, SPx Gateway, will also feature adjustable dynamic cache and dynamic storage volumes. The cache can be set dynamically for the amount of data needed. The Gateway can be used to take high cost on-premise storage, to scalable low cost off-premise storage, in another data site or in the cloud. Storage can start small and grow with the user in object storage containers to exabytes per volume. The use of local caching of frequently used data eliminates the latency inherent in remote storage. The ability to dynamically provision storage and cache is a significant advantage. Updates to the cloud data are done asynchronously in the background and are transparent to the user. This type of solution will allow users to take advantage of lower cost object storage, manage it, and never have to worry about data loss or compromise. Additionally, this solution can last with the user for a lifetime because there is virtually no limit to how much data can be stored and managed by the Gateway. The cost performance curve on this is really quite remarkable, O Hare says. In late 2015, SFC will intoduce solutions that will tackle new spaces like Big Data and the Cloud. Partnering with IBM Softlayer, SFC will bring enterprise gateway capabilities to the cloud. Enterprise cloud data will be securely pushed to different locations around the globe, like Asia, North America or Europe. Only two of those protected cloud shares are required to keep your data accessible. SFC has also built a security application pattern that provides data-at-rest encryption on IBM s PureApplication System. The data is seen only by the creator and the "intended recipients It is also possible to spread the data across cloud vendors and across geographies, so no single vendor can control a user s data. This empowers the user to retain control. Our focus is to build scalable solutions that support our client s growth, O Hare states. SFC offers their own solution for servers as well, called SPxSHARC. It protects databases, files, folders or directories on any server to offer secure, highly available and resilient data management. SPxSHARC has three tiers of service. The entry level product, SPxSHARCSecure, offers keyed encryption and randomization of data. With SPxSHARC s Advanced Secure, the user acquires M of N fault tolerance, delivering high availability for local sites. SPxSHARC Advanced Multi-Site provides complete data survivability, splitting protected data across multiple remote locations for disaster recovery and business continuity. The storage configuration (whether it is local, remote, cloud or hybrid) is highly scalable and transparently layers into the file system of the operating system. The Quest for Change With over seven zetabytes of data currently stored globally, O Hare knows that the future will continue to bring challenges to data storage. 25,000 petabytes of data are generated every day, O Hare says, and it grows at 40 percent a year. The reality is that all this new data has to be secured in a cost-effective way. SFC is developing a new product for secure file sync and share, which can synchronize data across all user s devices and share files across the globe. The firm s SPxConnect is a complete data-in-motion security product for data protection in the communication network. Once enabled, users can browse the web securely with no discernible data ever crossing the connection, eliminating any risk of data loss. SFC s game changing technology is set to revolutionize and secure POS devices, handheld devices, servers, gateways, ATMs, switches, and operating systems. I want to make customers data secure in a cost-effective way, reaffirms O Hare. 6 14

The Navigator for Enterprise Solutions SDN SPECIAL AUGUST-14-2015 CIOREVIEW.COM 20 Most Promising SDN Solution Providers 2015 The deluge of data from social media, mobile and cloud computing is straining the traditional networks within enterprises. This is leading organizations today to largely embrace software defined networking a centralized network management for an easy flow of information such as images, videos, and documents across the IT networks. This shift in network management has provided an added advantage of centralized network provisioning, holistic enterprise management, low operating costs and reduced capital expenditures for businesses. SDN makes networks work in a much smarter way and directs information within an organization to its destination as fast as possible, without any delays. The functionalities of SDN enable centralized and programmable networks, and revolutionize the legacy data centers for a virtualized version of compute and storage. This helps network operators to easily address their changing needs with agility and flexibility, provide an insight of network bandwidth and general computing resources, and increase their network responsiveness. There is an array of solution providers who help enterprises embrace SDN for these added benefits. In the last few months we have looked at scores of SDN solution providers and have shortlisted the ones that are at the forefront of tackling networking challenges in the enterprise landscape. A distinguished panel comprising of CEOs, CIOs, VCs, Analysts and the editorial board of CIO Review selected the final 20. The companies featured in this special edition offer innovative solutions that enable enterprises to build new applications, services, and business models for new revenue streams and value from the networks. We present to you CIO Review s of 20 Most Promising SDN Solution Providers 2015. Security First Corp recognized by magazine as An annual listing of 20 companies that are in the forefront of providing SDN solutions and impacting the marketplace Pradeep Shankar Editor-in-Chief Company: Security First Corp Key Person: Mark O Hare, Founder, President & CEO Website: www.securityfirstcorp.com Description: Provider of information assurance including data security, privacy, integrity, and high availability 7