SlideShare a Scribd company logo
1 of 17
www.Vormetric.com
Security Policy
and Key Management
Centrally Manage Encryption Keys -
Oracle TDE, SQL Server TDE and Vormetric.
Tina Stewart, Vice President of Marketing
Presentation Overview
Evolution of encryption
management systems
and integrated key
IT operations and
will then be examined
support challenges
Review of the future
compliance regulations
industry initiatives and
Conclude with brief
Vormetric Key Management
introduction to
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 2
Importance of Enterprise Key Management
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 3
Two Types of
Key Management Systems
Third PartyIntegrated
“
The final encrypted solution has two parts:
the encrypted data itself and the keys that
control the encryption and decryption
processes. Controlling and maintaining the
keys, therefore, is the most important part of
an enterprise encryption strategy.
Forrester Research, Inc., “Killing Data”, January 2012
IT Imperative: Secure Enterprise Data
Direct access to enterprise
data has increased the risk
of misuse.
Attacks on mission critical
data are getting more
sophisticated.
Security breach results in
substantial loss of revenue
and customer trust.
Compliance regulations
(HIPAA, PCI DSS) mandates
improved controls.
1 2
3 4
What is needed is a powerful, integrated solution
that can enable IT to Ensure the
availability, security, and manageability of
encryption keys Across the enterprise.
“
A Data Breach Costs > $7.2M Per Episode
2010 Annual Study: U.S. Cost of a Data Breaches, Ponemon Institute
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 4
Enterprise Key Management 8 Requirements
Enterprise Key
Management
Generation
Storage
Backup
Key State
Management
Security
Auditing
Authentication
Restoration
Slide No: 5 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
Interoperability Standards
PKCS#11 EKM OASIS KMIP
Public Key Cryptographic
Standard used by
Oracle Transparent
Data Encryption (TDE)
Cryptographic APIs used
by Microsoft SQL server
to provide database
encryption and secure
key management
Single comprehensive
protocol defined by
consumers of enterprise
key management systems
! Even though vendors may agree on basic cryptographic
techniques and standards, compatibility between key
management implementation is not guaranteed.
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 6
Complex management: Managing a
plethora of encryption keys in millions
Security Issues: Vulnerability of keys
from outside hackers /malicious insiders
Data Availability: Ensuring data
accessibility for authorized users
Scalability: Supporting multiple
databases, applications and standards
Governance: Defining policy-
driven, access, control and protection
for data
Encryption Key Management Challenges
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 7
Disparate Systems
Different Ways
of Managing
Encryption Keys
Industry Regulatory Standards
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 8
Gramm Leach
Bliley Act (GLBA)
U.S. Health I.T. for
Economic
and Clinical Health
(HITECH) Act
Payment Card
Industry Data
Security Standard
(PCI DSS)
Requires encryption key
management systems with
controls and procedures for
managing key use and
performing decryption
functions.
Requires firms in
USA to publicly
acknowledge a data
breech although it
can damage their
reputation.
Includes a breach
notification clause
for which encryption
provides safe harbor
in the event of a
data breach.
Vormetric Key Management Benefits
Minimize Solution Costs
Stores Keys Securely Provides Audit and Reporting
Manages Heterogeneous Keys / FIPS 140-2 Compliant
VKM provides a robust, standards-based platform for
managing encryption keys. It simplifies management and
administrative challenges around key management to
ensure keys are secure.
“
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 9
Vormetric Key Management Capabilities
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 10
Manage
Vormetric
Encryption
Agents
Manage
3rd Party Keys
Vault
Other Keys
Create/Manage/Revoke
keys of 3rd party
encryption solutions
Provide Network HSM to
encryption solutions via
 PKCS#11 (Oracle 11gR2)
 EKM (MSSQL 2008 R2)
Provide Secure storage of
security material
Key Types:
 Symmetric: AES, 3DES, ARIA
 Asymmetric: RSA 1024, RSA
2048, RSA 4096
 Other: Unvalidated security
materials (passwords, etc.).
Vormetric Key Management Components
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 11
Data Security
Manager (DSM)
Report on
vaulted keys
Key Vault
Provides key management
services for:
 Oracle 11g R2 TDE
(Tablespace Encryption)
 MSSQL 2008 R2 Enterprise
TDE (Tablespace Encryption)
Licensable Option on DSM
Web based or API level
interface for import and
export of keys
Same DSM as used with all
VDS products
FIPS 140-2 Key Manager
with Separation of Duties
Supports Symmetric,
Asymmetric, and Other
Key materials
Reporting on key types
TDE Key Architecture before Vormetric
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 12
Master Encryption keys
are stored on the local
system in a file with the
data by default.
TDE Master
Encryption Key
Local
Wallet or Table
Oracle / Microsoft TDE
TDE Key Architecture after Vormetric
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 13
TDE Master
Encryption Key
Vormetric DSM acts as Network HSM for
securing keys for Oracle and Microsoft TDE
Vormetric Key Agent is installed on the
database server
SSLConnection
Key Agent
Oracle / Microsoft TDE
VKM Architecture-Key Vault
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 14
Asymmetric
Web GUI
Command Line / API
Supported Key Types:
Security Policy and Key Management
Protecting the enterprise’s valuable
digital assets from accidental or
intentional misuse are key goals for
every IT team today
A centralized enterprise key
management solution is critical to
ensuring all sensitive enterprise data is
secure and available.
Vormetric Key Management is the only
solution today that can:
Minimize IT operational and support burdens for
encryption key management,
Protect data without disrupting you business
Secure and control access to data across the
enterprise and into the cloud, and
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 15
Vormetric Key Management is the only
solution today that can:
A centralized enterprise key management
solution is critical to ensuring all sensitive
enterprise data is secure and available.
Protecting the enterprise’s valuable digital
assets from accidental or intentional
misuse are key goals for every IT team
today
Security Policy and Key Management
Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 16
“
The final encrypted solution has two parts:
the encrypted data itself and the keys that
control the encryption and decryption
processes. Controlling and maintaining the
keys, therefore, is the most important part of
an enterprise encryption strategy.
Forrester Research, Inc., “Killing Data”, January 2012
Minimize IT operational and support burdens for
encryption key management,
Secure and control access to data across the
enterprise and into the cloud, and
Protect data without disrupting you business
www.Vormetric.com
Security Policy
and Key Management
Centrally Manage Encryption Keys -
Oracle TDE, SQL Server TDE and Vormetric.
Tina Stewart, Vice President of Marketing
Download Whitepaper
Click - to - tweet

More Related Content

Recently uploaded

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Security Policy and Key Management: Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric

  • 1. www.Vormetric.com Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President of Marketing
  • 2. Presentation Overview Evolution of encryption management systems and integrated key IT operations and will then be examined support challenges Review of the future compliance regulations industry initiatives and Conclude with brief Vormetric Key Management introduction to Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 2
  • 3. Importance of Enterprise Key Management Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 3 Two Types of Key Management Systems Third PartyIntegrated “ The final encrypted solution has two parts: the encrypted data itself and the keys that control the encryption and decryption processes. Controlling and maintaining the keys, therefore, is the most important part of an enterprise encryption strategy. Forrester Research, Inc., “Killing Data”, January 2012
  • 4. IT Imperative: Secure Enterprise Data Direct access to enterprise data has increased the risk of misuse. Attacks on mission critical data are getting more sophisticated. Security breach results in substantial loss of revenue and customer trust. Compliance regulations (HIPAA, PCI DSS) mandates improved controls. 1 2 3 4 What is needed is a powerful, integrated solution that can enable IT to Ensure the availability, security, and manageability of encryption keys Across the enterprise. “ A Data Breach Costs > $7.2M Per Episode 2010 Annual Study: U.S. Cost of a Data Breaches, Ponemon Institute Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 4
  • 5. Enterprise Key Management 8 Requirements Enterprise Key Management Generation Storage Backup Key State Management Security Auditing Authentication Restoration Slide No: 5 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
  • 6. Interoperability Standards PKCS#11 EKM OASIS KMIP Public Key Cryptographic Standard used by Oracle Transparent Data Encryption (TDE) Cryptographic APIs used by Microsoft SQL server to provide database encryption and secure key management Single comprehensive protocol defined by consumers of enterprise key management systems ! Even though vendors may agree on basic cryptographic techniques and standards, compatibility between key management implementation is not guaranteed. Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 6
  • 7. Complex management: Managing a plethora of encryption keys in millions Security Issues: Vulnerability of keys from outside hackers /malicious insiders Data Availability: Ensuring data accessibility for authorized users Scalability: Supporting multiple databases, applications and standards Governance: Defining policy- driven, access, control and protection for data Encryption Key Management Challenges Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 7 Disparate Systems Different Ways of Managing Encryption Keys
  • 8. Industry Regulatory Standards Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 8 Gramm Leach Bliley Act (GLBA) U.S. Health I.T. for Economic and Clinical Health (HITECH) Act Payment Card Industry Data Security Standard (PCI DSS) Requires encryption key management systems with controls and procedures for managing key use and performing decryption functions. Requires firms in USA to publicly acknowledge a data breech although it can damage their reputation. Includes a breach notification clause for which encryption provides safe harbor in the event of a data breach.
  • 9. Vormetric Key Management Benefits Minimize Solution Costs Stores Keys Securely Provides Audit and Reporting Manages Heterogeneous Keys / FIPS 140-2 Compliant VKM provides a robust, standards-based platform for managing encryption keys. It simplifies management and administrative challenges around key management to ensure keys are secure. “ Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 9
  • 10. Vormetric Key Management Capabilities Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 10 Manage Vormetric Encryption Agents Manage 3rd Party Keys Vault Other Keys Create/Manage/Revoke keys of 3rd party encryption solutions Provide Network HSM to encryption solutions via  PKCS#11 (Oracle 11gR2)  EKM (MSSQL 2008 R2) Provide Secure storage of security material Key Types:  Symmetric: AES, 3DES, ARIA  Asymmetric: RSA 1024, RSA 2048, RSA 4096  Other: Unvalidated security materials (passwords, etc.).
  • 11. Vormetric Key Management Components Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 11 Data Security Manager (DSM) Report on vaulted keys Key Vault Provides key management services for:  Oracle 11g R2 TDE (Tablespace Encryption)  MSSQL 2008 R2 Enterprise TDE (Tablespace Encryption) Licensable Option on DSM Web based or API level interface for import and export of keys Same DSM as used with all VDS products FIPS 140-2 Key Manager with Separation of Duties Supports Symmetric, Asymmetric, and Other Key materials Reporting on key types
  • 12. TDE Key Architecture before Vormetric Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 12 Master Encryption keys are stored on the local system in a file with the data by default. TDE Master Encryption Key Local Wallet or Table Oracle / Microsoft TDE
  • 13. TDE Key Architecture after Vormetric Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 13 TDE Master Encryption Key Vormetric DSM acts as Network HSM for securing keys for Oracle and Microsoft TDE Vormetric Key Agent is installed on the database server SSLConnection Key Agent Oracle / Microsoft TDE
  • 14. VKM Architecture-Key Vault Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 14 Asymmetric Web GUI Command Line / API Supported Key Types:
  • 15. Security Policy and Key Management Protecting the enterprise’s valuable digital assets from accidental or intentional misuse are key goals for every IT team today A centralized enterprise key management solution is critical to ensuring all sensitive enterprise data is secure and available. Vormetric Key Management is the only solution today that can: Minimize IT operational and support burdens for encryption key management, Protect data without disrupting you business Secure and control access to data across the enterprise and into the cloud, and Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 15
  • 16. Vormetric Key Management is the only solution today that can: A centralized enterprise key management solution is critical to ensuring all sensitive enterprise data is secure and available. Protecting the enterprise’s valuable digital assets from accidental or intentional misuse are key goals for every IT team today Security Policy and Key Management Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Slide No: 16 “ The final encrypted solution has two parts: the encrypted data itself and the keys that control the encryption and decryption processes. Controlling and maintaining the keys, therefore, is the most important part of an enterprise encryption strategy. Forrester Research, Inc., “Killing Data”, January 2012 Minimize IT operational and support burdens for encryption key management, Secure and control access to data across the enterprise and into the cloud, and Protect data without disrupting you business
  • 17. www.Vormetric.com Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President of Marketing Download Whitepaper Click - to - tweet

Editor's Notes

  1. Protecting the enterprise’s valuable digital assets from accidental or intentional misuse are key goals for every IT team todayA centralized enterprise key management solution is critical to ensuring all sensitive enterprise data is secure and available.Vormetric Key Management is the only solution today that canMinimize IT operational and support burdens for encryption key management,Secure and control access to data across the enterprise and into the cloud, and Protect data without disrupting you business