SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Enterprise Persistent Data at Risk
The advances in Internet, network infrastructure and technologies in
the past decade opens up a new arena in network computing. What
used to exist only in large enterprises' IT environment including dis-
tributed computing, network storage and electronic data exchange
now become common practice in even smallest enterprises. Business
data quickly develop from non-confidential historical data mainly for
analysis and archival, to real-time operational data and instructions
that are required to be kept secret and once presented, should never
be altered. Computing infrastructure management also changed from
in-house professionals to outsourced services which are broadly ac-
cepted lack of control and potentially unsafe.
This technology trend brings computing vulnerabilities in recent years
from intrusion by hackers, worms and viruses, to unauthorized data
alterations and data thefts, no matter physical or electronic. Data theft
and unauthorized tampering greatly lower customers’ confidence to a
business and in most cases introduce immediate financial loss and
tremendous remedial work.
The Technical Solution and the Downside
Perimeter security control measures including firewall and content
filters are created to address intrusions from outsiders, however, sta-
tistics have shown that there is a paradigm shift of attacks from out-
siders to insiders. To combat insiders' attack, enterprises can seek for
data encryption so that in worst case scenario when data really get
stolen, no one can obtain the true information from the ciphered con-
tents.
Despite the risk of enterprise data leakage due to data theft, organiza-
tions are slow to implement data encryption.
Data encryption carried out by traditional silo-based tools are of poor
performance, require complex application integration and worst of all,
are difficult to scale for the most demanding business use and be
extended to virtual data centers, big data and cloud applications.
Revolutionary Approach
Bloombase StoreSafe delivers ground-breaking non-disruptive, appli-
cation-transparent data cryptographic processing and secured central-
ized key management as a complete solution for enterprise-scale stor-
age systems on both on-premises and off-premises infrastructure.
Bloombase StoreSafe is a powerful, versatile, and unified storage
security software appliance to protect enterprise data without requir-
ing drastic platform, application and user workflow change.
How It Works
Digital assets including financial reports, legal documents, private
human resources information, confidential contracts and sensitive
user data are invaluable properties of an organization. A business
cannot risk losing these information, both confidentiality and non-
repudiation have to be enforced.
However, information created by applications are persisted in enter-
prise storage in plain-text. Administrators and operators can easily get
direct access to the core storage system which poses potential risk of
sensitive data disclosure due to data theft or attack at the storage
infrastructure. Poor management of physical computing assets or
offsite backup also opens up chances getting secret data exposed.
A typical storage architecture that are seen in majority of enterprises and
organizations where data are persisted at storage in clear-text. Direct attack
at the core readily obtains the most confidential and invaluable business and
customer data.
Bloombase StoreSafe is a high performance at-rest data cryptographic
server operating as a proxy to the protected storage. Bloombase
StoreSafe is deployed along the path running between hosts and stor-
ages. By writing data through StoreSafe to the storage network, the
encryption engine transforms plain text data into ciphered data and
locks down on storage.
Trusted applications retrieving data from storage through StoreSafe
gets unencrypted automatically. Bloombase StoreSafe operates as
man-in-the-middle presenting the backend encrypted storage as if
plain-text to host applications.
Bloombase StoreSafe operates as software appliance providing access paths
for authorized hosts and applications to retrieve virtual-plain contents of
protected data persisted in enterprise storage network.
BROCHURE
Bloombase StoreSafe
Enterprise Storage At-Rest Data Security Software Appliance
Read
Write
Host
Clear
text
FCP,
FCoE,
iSCSI,
NFS,
CIFS,
WebDAV,
REST, etc
Storage (SAN, NAS, DAS,
tape library, VTL, CAS,
object store, datastore,
big data, cloud, etc)
Clear
text
!
Host
Clear
text
Bloombase
StoreSafe
Encrypt and Write
Read and Unencrypt
Storage (SAN, NAS, DAS,
tape library, VTL, CAS,
object store, datastore,
big data, cloud, etc)
^$8Yn
+=@~
Highly Secure and Manageable
Bloombase StoreSafe possesses a highly extensible cryptographic en-
gine to cipher and decipher at-rest data on-the-fly. Bloombase StoreSafe
offers rich choices of cryptographic ciphers including AES, Camellia,
ARIA, 3DES, DES, CAST*, RC*, etc for data encryption.
Bloombase StoreSafe offers access control capabilities to enterprise
storage systems enabling access of data in configurable volume, directo-
ry, mount point and cloud storage service endpoint. Bloombase
StoreSafe works with all generic hardware and operating systems, and
supports a large variety of storage protocols.
Bloombase StoreSafe is built-in with rich auditing out of the box. Admin-
istration and configuration are easily provisioned with web-based man-
agement console or via remote API. Bloombase StoreSafe supports high
availability for mission-critical use and integrates seamlessly with third-
party key management tools for maximum security.
Functions and Features Highlights
 Hardware and operating system independent. All physical, virtual
and cloud platforms conforming to industrial storage communica-
tions protocols are supported
 File-system independent. Bloombase StoreSafe operates on storage
network layer abstracting file-system underneath and above
 User independent and transparent processing. No user training re-
quired. Data stored are encrypted and data read are unencrypted
automatically under the covers requiring no change on user workflow
 Transparent encryption and unencryption. High performance crypto-
graphic engine secures storage data by strong encryption based on
user-predefined rules
 Effortless and riskless deployment and implementation. No applica-
tion change required. No complex system integration. No user work-
flow change. No administration and operation change
 Flexible and secure access control. Fine-grain network, host and user
access control suiting all enterprise needs
 Multi-user support and resource sharing. Users protect their own
digital assets by their own encryption keys. Resource sharing made
possible without sacrificing security
 Seamless integration with Bloombase KeyCastle. Where encryption
keys are required to be stored and managed separately - Bloombase
StoreSafe integrates with KeyCastle seamlessly for maximum encryp-
tion key security
 High availability and clustering. Highly scalable and multiple
StoreSafe instances running in a cluster for mission-critical applica-
tions and load-balancing for throughput storage systems
Business Benefits and Applications
Transparent database encryption
 Protect real-time ERP, financial and customer data in databases by on
-the-fly StoreSafe storage encryption. Applications work with virtual
private data without drastic performance penalty
Virtualization, big data and cloud protection
 Bloombase StoreSafe software appliance fills the missing piece for
virtual datastores, analytics data nodes, and cloud storage in virtual-
ization, big data and cloud computing infrastructure
Digital Intellectual property protection
 Design files, source codes, product prototypes and marketing cam-
paign resources managed in file servers, CMS and DMS should be
protected by strong encryption at backend storage and transparently
accessible by end users and applications
Email repository encryption
 Enterprise messages contain vast amount of business secrets.
Bloombase StoreSafe secures any enterprise messaging systems and
groupware without requiring user workflow change
Bloombase StoreSafe configuration settings are provisioned easily by web-
based management console.
Secure replication and disaster recovery
 Replication of data in their native encrypted form with cipher-text
replicated in disaster recovery infrastructure. Invaluable operational
data are kept privately safe and risk free
Secure data backup and archival
 Protect backup files and archives, backup tapes and disks by strong
encryption to prevent leakage of secret corporate information in
event of media thefts or loss
Technical Specifications Highlights
Cryptographic Security
 NIST FIPS 140-2 validated cryptographic module
 IEEE 1619 Security in Storage standards
 RSA, AES, Camellia, ARIA, 3DES, DES, CAST*, RC* cipher algorithms
 Volume-based, network share-based, file-based and object-based
security
 Digital signature generation and signature verification
Access Control Security
 Fine grain read/write access control
 Host and user-based access control
Storage Networking Protocols
 FCP, FCoE, iSCSI, SCSI, NFS, CIFS, FTP, HTTP, REST
 Network and host-based authentication and authorization
 User-based authentication and authorization
Key Management
 Bloombase KeyCastle key lifecycle management
 PKCS#11 hardware security module and OASIS KMIP-compliant key
manager
Management and Monitoring
 SNMP (v1, v2c, v3), syslog, log rotation and auto-archive
Administration
 SSL-secured web-based and text-mode management console
 Command line interface and API-based remote management
Bloombase - Next Generation Data Security email info@bloombase.com web www.bloombase.com
2009 Bloombase, Inc. All rights reserved. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their
respective logos are trademarks or registered trademarks of Bloombase, Inc. in United States, Hong Kong, China and in several other countries all over the world. All
other product and service names mentioned are the trademarks of their respective companies.
The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty
statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for
technical or editorial errors or omissions contained herein.
BLOOMBASE STORESAFE BROCHURE

Más contenido relacionado

La actualidad más candente

Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
stefanjung
 
Iaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloud
Iaetsd Iaetsd
 

La actualidad más candente (20)

Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss prevention
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
Irm11g overview
Irm11g overviewIrm11g overview
Irm11g overview
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
 
Iaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloud
 
Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption Strategy
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Securing Data in MongoDB with Gazzang and Chef
Securing Data in MongoDB with Gazzang and ChefSecuring Data in MongoDB with Gazzang and Chef
Securing Data in MongoDB with Gazzang and Chef
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights Management
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights Management
 
Data leakage prevention EN Final
Data leakage prevention EN FinalData leakage prevention EN Final
Data leakage prevention EN Final
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
 

Destacado (7)

H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15
 
Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sb
 
Hitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeHitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafe
 
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
 

Similar a Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3

A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 

Similar a Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3 (20)

4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Bloombase store safe mf solution brief 2018 r0.91
Bloombase store safe   mf solution brief 2018 r0.91Bloombase store safe   mf solution brief 2018 r0.91
Bloombase store safe mf solution brief 2018 r0.91
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
Dstca
DstcaDstca
Dstca
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
Data Fabrics.pptx
Data Fabrics.pptxData Fabrics.pptx
Data Fabrics.pptx
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
8549 bloombase ss_usl_v1
8549 bloombase ss_usl_v18549 bloombase ss_usl_v1
8549 bloombase ss_usl_v1
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 

Más de Bloombase

Más de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbooklet
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-edition
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyer
 

Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3

  • 1. Enterprise Persistent Data at Risk The advances in Internet, network infrastructure and technologies in the past decade opens up a new arena in network computing. What used to exist only in large enterprises' IT environment including dis- tributed computing, network storage and electronic data exchange now become common practice in even smallest enterprises. Business data quickly develop from non-confidential historical data mainly for analysis and archival, to real-time operational data and instructions that are required to be kept secret and once presented, should never be altered. Computing infrastructure management also changed from in-house professionals to outsourced services which are broadly ac- cepted lack of control and potentially unsafe. This technology trend brings computing vulnerabilities in recent years from intrusion by hackers, worms and viruses, to unauthorized data alterations and data thefts, no matter physical or electronic. Data theft and unauthorized tampering greatly lower customers’ confidence to a business and in most cases introduce immediate financial loss and tremendous remedial work. The Technical Solution and the Downside Perimeter security control measures including firewall and content filters are created to address intrusions from outsiders, however, sta- tistics have shown that there is a paradigm shift of attacks from out- siders to insiders. To combat insiders' attack, enterprises can seek for data encryption so that in worst case scenario when data really get stolen, no one can obtain the true information from the ciphered con- tents. Despite the risk of enterprise data leakage due to data theft, organiza- tions are slow to implement data encryption. Data encryption carried out by traditional silo-based tools are of poor performance, require complex application integration and worst of all, are difficult to scale for the most demanding business use and be extended to virtual data centers, big data and cloud applications. Revolutionary Approach Bloombase StoreSafe delivers ground-breaking non-disruptive, appli- cation-transparent data cryptographic processing and secured central- ized key management as a complete solution for enterprise-scale stor- age systems on both on-premises and off-premises infrastructure. Bloombase StoreSafe is a powerful, versatile, and unified storage security software appliance to protect enterprise data without requir- ing drastic platform, application and user workflow change. How It Works Digital assets including financial reports, legal documents, private human resources information, confidential contracts and sensitive user data are invaluable properties of an organization. A business cannot risk losing these information, both confidentiality and non- repudiation have to be enforced. However, information created by applications are persisted in enter- prise storage in plain-text. Administrators and operators can easily get direct access to the core storage system which poses potential risk of sensitive data disclosure due to data theft or attack at the storage infrastructure. Poor management of physical computing assets or offsite backup also opens up chances getting secret data exposed. A typical storage architecture that are seen in majority of enterprises and organizations where data are persisted at storage in clear-text. Direct attack at the core readily obtains the most confidential and invaluable business and customer data. Bloombase StoreSafe is a high performance at-rest data cryptographic server operating as a proxy to the protected storage. Bloombase StoreSafe is deployed along the path running between hosts and stor- ages. By writing data through StoreSafe to the storage network, the encryption engine transforms plain text data into ciphered data and locks down on storage. Trusted applications retrieving data from storage through StoreSafe gets unencrypted automatically. Bloombase StoreSafe operates as man-in-the-middle presenting the backend encrypted storage as if plain-text to host applications. Bloombase StoreSafe operates as software appliance providing access paths for authorized hosts and applications to retrieve virtual-plain contents of protected data persisted in enterprise storage network. BROCHURE Bloombase StoreSafe Enterprise Storage At-Rest Data Security Software Appliance Read Write Host Clear text FCP, FCoE, iSCSI, NFS, CIFS, WebDAV, REST, etc Storage (SAN, NAS, DAS, tape library, VTL, CAS, object store, datastore, big data, cloud, etc) Clear text ! Host Clear text Bloombase StoreSafe Encrypt and Write Read and Unencrypt Storage (SAN, NAS, DAS, tape library, VTL, CAS, object store, datastore, big data, cloud, etc) ^$8Yn +=@~
  • 2. Highly Secure and Manageable Bloombase StoreSafe possesses a highly extensible cryptographic en- gine to cipher and decipher at-rest data on-the-fly. Bloombase StoreSafe offers rich choices of cryptographic ciphers including AES, Camellia, ARIA, 3DES, DES, CAST*, RC*, etc for data encryption. Bloombase StoreSafe offers access control capabilities to enterprise storage systems enabling access of data in configurable volume, directo- ry, mount point and cloud storage service endpoint. Bloombase StoreSafe works with all generic hardware and operating systems, and supports a large variety of storage protocols. Bloombase StoreSafe is built-in with rich auditing out of the box. Admin- istration and configuration are easily provisioned with web-based man- agement console or via remote API. Bloombase StoreSafe supports high availability for mission-critical use and integrates seamlessly with third- party key management tools for maximum security. Functions and Features Highlights  Hardware and operating system independent. All physical, virtual and cloud platforms conforming to industrial storage communica- tions protocols are supported  File-system independent. Bloombase StoreSafe operates on storage network layer abstracting file-system underneath and above  User independent and transparent processing. No user training re- quired. Data stored are encrypted and data read are unencrypted automatically under the covers requiring no change on user workflow  Transparent encryption and unencryption. High performance crypto- graphic engine secures storage data by strong encryption based on user-predefined rules  Effortless and riskless deployment and implementation. No applica- tion change required. No complex system integration. No user work- flow change. No administration and operation change  Flexible and secure access control. Fine-grain network, host and user access control suiting all enterprise needs  Multi-user support and resource sharing. Users protect their own digital assets by their own encryption keys. Resource sharing made possible without sacrificing security  Seamless integration with Bloombase KeyCastle. Where encryption keys are required to be stored and managed separately - Bloombase StoreSafe integrates with KeyCastle seamlessly for maximum encryp- tion key security  High availability and clustering. Highly scalable and multiple StoreSafe instances running in a cluster for mission-critical applica- tions and load-balancing for throughput storage systems Business Benefits and Applications Transparent database encryption  Protect real-time ERP, financial and customer data in databases by on -the-fly StoreSafe storage encryption. Applications work with virtual private data without drastic performance penalty Virtualization, big data and cloud protection  Bloombase StoreSafe software appliance fills the missing piece for virtual datastores, analytics data nodes, and cloud storage in virtual- ization, big data and cloud computing infrastructure Digital Intellectual property protection  Design files, source codes, product prototypes and marketing cam- paign resources managed in file servers, CMS and DMS should be protected by strong encryption at backend storage and transparently accessible by end users and applications Email repository encryption  Enterprise messages contain vast amount of business secrets. Bloombase StoreSafe secures any enterprise messaging systems and groupware without requiring user workflow change Bloombase StoreSafe configuration settings are provisioned easily by web- based management console. Secure replication and disaster recovery  Replication of data in their native encrypted form with cipher-text replicated in disaster recovery infrastructure. Invaluable operational data are kept privately safe and risk free Secure data backup and archival  Protect backup files and archives, backup tapes and disks by strong encryption to prevent leakage of secret corporate information in event of media thefts or loss Technical Specifications Highlights Cryptographic Security  NIST FIPS 140-2 validated cryptographic module  IEEE 1619 Security in Storage standards  RSA, AES, Camellia, ARIA, 3DES, DES, CAST*, RC* cipher algorithms  Volume-based, network share-based, file-based and object-based security  Digital signature generation and signature verification Access Control Security  Fine grain read/write access control  Host and user-based access control Storage Networking Protocols  FCP, FCoE, iSCSI, SCSI, NFS, CIFS, FTP, HTTP, REST  Network and host-based authentication and authorization  User-based authentication and authorization Key Management  Bloombase KeyCastle key lifecycle management  PKCS#11 hardware security module and OASIS KMIP-compliant key manager Management and Monitoring  SNMP (v1, v2c, v3), syslog, log rotation and auto-archive Administration  SSL-secured web-based and text-mode management console  Command line interface and API-based remote management Bloombase - Next Generation Data Security email info@bloombase.com web www.bloombase.com 2009 Bloombase, Inc. All rights reserved. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase, Inc. in United States, Hong Kong, China and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. BLOOMBASE STORESAFE BROCHURE