SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Amazon Web Services (AWS) delivers reliable and scalable compute and storage
services in the cloud; it is one of the largest public cloud infrastructures operating on
a global scale, providing high availability, agility and elasticity for mission-critical
business software applications and data services.
Off-premise cloud computing infrastructures are often regarded being potentially
more exposed to cyber-attacks and breaches than on-premise data centers. As
application workloads and sensitive data are migrated to the cloud, there is a need
for higher level of security to meet data privacy regulatory compliance requirements,
while retaining system scalability and availability.
Data-at-rest encryption is technically the last line of defense to mitigate the risks of
data outbound threats, despite the desperation of legacy encryption silos, non-
scalable, and difficulties of managing the new generation cloud computing
architecture.
Bloombase Next Generation Data Security solution delivers a unique and
transformative encryption approach: powering storage data security from traditional
data center, virtualization, hyperscale computing to big data and cloud. Bloombase
StoreSafe data security software appliance is the missing piece for data-at-rest
protection in the cloud. It delivers bump-in-the-wire, application-transparent and non-
disruptive cryptography which fits seamlessly into the cloud, enabling customers to
Bloombase data-at-rest security solution
provides turnkey, agentless, non-
disruptive, application-transparent
encryption of cloud application workloads
and storage services powered by Amazon
Web Services (AWS). The solution can
help:
 Secure your Amazon Elastic Compute
Cloud (EC2) compute instances and
Amazon cloud storage services
 Provide multi-tenancy encryption
protection of data-at-rest on AWS
 Protect your business-sensitive data
managed in Amazon cloud storage
services including Amazon Simple
Storage Service (S3), Amazon Elastic
Block Store (EBS) and Amazon Elastic
File System (EFS)
 Mitigate data outbound threats and data
leakage at low total cost of ownership
(TCO)
 Retrieve your ciphertext quickly and
securely by trusted AWS applications as
if they are in plaintext
 Meet stringent data confidentiality and
secrecy regulatory compliance
requirements immediately
 Maximize your return on investment
(ROI) with easy-to-implement and
scalable AWS cloud platform for multi-
tenancy, mixed operating systems, and
heterogeneous cloud storage
environments
 Manage security rules and policies
easily to align your data encryption
requirements
 Support AWS Key Management Service
(KMS) and CloudHSM for centralized life-
cycle key management
S o l u t i o n B r i e f
Bloombase StoreSafe Intelligent Storage
Firewall for Amazon Web Services (AWS)
EC2 Instance
Applications on
Amazon Elastic
Compute Cloud
Read and Unencrypt
Write and Encrypt
EBS
Volume
S3 Object
Amazon Elastic
Block Storage (EBS)
EFS File
Amazon Elastic
File System (EFS)
Amazon Simple
Storage Service (S3)
CloudHSM
KMS
Bloombase
StoreSafe on
EC2
^$8Yn
+=@~
^$8Yn
+=@~
^$8Yn
+=@~
.
Clear
text
Trusted User
Header
Trailer
Cleartext
Header
^$8Yn+=@
~
Trailer
Bad Guys
?!
Bloombase - The Intelligent Storage Firewall Company email info@bloombase.com web https://www.bloombase.com
Copyright 2019 Bloombase, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase
products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase in United States and/or other jurisdictions. All other product and service names
mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the
express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial
errors or omissions contained herein. Item No. BLBS-SB-Bloombase-StoreSafe-Intelligent-Storage-Firewall-for-Amazon-Web-Services-AWS-USLET-EN-R9.10
meet stringent data privacy requirements easily and cost
effectively. The Bloombase cryptographic module is NIST FIPS
140-2 certified, supporting standards-based cipher algorithms,
open storage security protocols (e.g. IEEE 1619), AWS Key
Management Service (KMS) and CloudHSM, and other industry-
leading key management standards (e.g. PKCS#11 and OASIS
KMIP).
Bloombase StoreSafe empowers turnkey encryption of Amazon
storage services: Amazon Simple Storage Service (S3), Amazon
Elastic Block Store (EBS) and Amazon Elastic File System (EFS) as
-a-service, enabling software applications on Amazon Elastic
Compute Cloud (EC2) to secure their data transparently with
minimal application change.
Bloombase’s agentless encryption software appliance allows
flexible deployment as Amazon EC2 instances on AWS or on
other third-party cloud platforms. It works as a storage proxy,
providing high bandwidth ciphering and deciphering of Amazon
S3 objects, Amazon EBS volumes, and Amazon EFS files, by
preserving the respective network storage protocols.
Trusted AWS hosts and applications, leverage virtual storage
resources provided by Bloombase for encryption of data-at-rest
managed at Amazon storage services. When plaintext data is
written to storage via the Bloombase StoreSafe, this data is
converted into ciphertext on-the-fly and stored in Amazon
storage objects. Conversely, when data is read from Amazon
storage service, the Bloombase StoreSafe deciphers the
ciphertext data and presents it to trusted host applications as
virtual plaintext. Business data in Amazon storage services is
permanently encrypted as Amazon S3 objects, Amazon EBS
volumes or Amazon EFS files. Data owners access encrypted
business data as if in the clear, whereas platform administrators
and operators see this same data in ciphertext.
Based on open technologies, Bloombase’s transparent data
security solution is sustainable, scalable and agile through
heterogeneous infrastructure environments and the evolving IT:
Bloombase secures Amazon storage services, traditional storage
systems, and other next-generation cloud platform, while
maximizing cost-efficiency and manageability. Bloombase’s rich
security features fulfill security requirements of the full range of
industry verticals and geographies. Growing data protection
needs are satisfied dynamically and efficiently, as Bloombase
scales flexibly in sync with the allocation of computing
resources. Designed for fault tolerance and high availability,
Bloombase provides protection for mission-critical data services.
Consequently, organizations can leverage the Bloombase Next
Generation Data Security technology to run their business-
critical applications and data services on AWS, securely and
privately, as if on their own premises.
What is Amazon Web Services (AWS)
Amazon Web Services (AWS) delivers a set of services that
together form a reliable, scalable, and inexpensive computing
platform “in the cloud”. The most central and well-known of
these services are Amazon EC2 and Amazon S3. One of the key
benefits of cloud computing is the opportunity to replace
up-front capital infrastructure expenses with low variable costs
that scale with your business. With the Cloud, businesses no
longer need to procure servers and other IT infrastructures
weeks or months in advance. Instead, they can instantly spin up
hundreds or thousands of servers in minutes and deliver results
faster. Amazon Web Services provides a highly reliable,
scalable, low-cost infrastructure platform in the cloud that
powers hundreds of thousands of businesses in 190 countries
around the world. With data center locations in the U.S., Europe,
Brazil, Singapore, Japan, and Australia, customers across all
industries are taking advantages of the following benefits: low
cost, agility and instant elasticity, open and flexible, last but not
least, data security.
What is AWS Partner Network (APN)
The AWS Partner Network is made up of a strong and growing
community of companies that offer a wide range of products and
services on AWS platform. AWS Technology Partners include
independent software vendors (ISVs), SaaS, PaaS, developer
tools, management and security vendors. For more information
about AWS Partner Network, visit https://aws.amazon.com/
partners.
Bloombase is an APN Technology Partner.
Learn More
To learn more about Bloombase StoreSafe Intelligent Storage
Firewall for AWS, visit
https://aws.amazon.com/marketplace/pp/B07FNS7P4Q
and
https://aws.amazon.com/marketplace/seller-profile?
id=277af30e-567f-4076-a7c2-8bb6ec439138.
For more information, contact your Bloombase sales
representative, or visit https://www.bloombase.com.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (14)

Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Cloud Reference Architecture - Part 1 Foundation
Cloud Reference Architecture - Part 1 FoundationCloud Reference Architecture - Part 1 Foundation
Cloud Reference Architecture - Part 1 Foundation
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
AWS Intro & History
AWS Intro & HistoryAWS Intro & History
AWS Intro & History
 
Introduction to Cloud Computing and AWS
Introduction to Cloud Computing and AWSIntroduction to Cloud Computing and AWS
Introduction to Cloud Computing and AWS
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
Amazon s3
Amazon s3Amazon s3
Amazon s3
 
Amazon web services
Amazon web servicesAmazon web services
Amazon web services
 
Secure hybrid workload with azure
Secure hybrid workload with azureSecure hybrid workload with azure
Secure hybrid workload with azure
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices
 
Journey Through the AWS Cloud; Building Powerful Web Applications
Journey Through the AWS Cloud; Building Powerful Web ApplicationsJourney Through the AWS Cloud; Building Powerful Web Applications
Journey Through the AWS Cloud; Building Powerful Web Applications
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
Security
SecuritySecurity
Security
 

Similar a Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-services-aws-uslet-en-r9.10

Similar a Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-services-aws-uslet-en-r9.10 (20)

Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
 
Best AWS Services List 2022
Best AWS Services List 2022Best AWS Services List 2022
Best AWS Services List 2022
 
Amazon Web Service.pdf
Amazon Web Service.pdfAmazon Web Service.pdf
Amazon Web Service.pdf
 
SoftNAS Cloud NAS Architecture on AWS whitepaper
SoftNAS Cloud NAS Architecture on AWS whitepaperSoftNAS Cloud NAS Architecture on AWS whitepaper
SoftNAS Cloud NAS Architecture on AWS whitepaper
 
SoftNAS Architecture on AWS
SoftNAS Architecture on AWSSoftNAS Architecture on AWS
SoftNAS Architecture on AWS
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Jump Start to Amazon Web Services
Jump Start to Amazon Web ServicesJump Start to Amazon Web Services
Jump Start to Amazon Web Services
 
Cloud computing - Compute,Storage,Networking & Security
Cloud computing - Compute,Storage,Networking & SecurityCloud computing - Compute,Storage,Networking & Security
Cloud computing - Compute,Storage,Networking & Security
 
Maximize the Return on Your Storage Investment with AWS Marketplace - MSC305 ...
Maximize the Return on Your Storage Investment with AWS Marketplace - MSC305 ...Maximize the Return on Your Storage Investment with AWS Marketplace - MSC305 ...
Maximize the Return on Your Storage Investment with AWS Marketplace - MSC305 ...
 
Best Practices Of Data Security With AWS - Intelligentia
Best Practices Of Data Security With AWS  - IntelligentiaBest Practices Of Data Security With AWS  - Intelligentia
Best Practices Of Data Security With AWS - Intelligentia
 
Best AWS Cloud Computing Services Provider
Best AWS Cloud Computing Services ProviderBest AWS Cloud Computing Services Provider
Best AWS Cloud Computing Services Provider
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
The Pro Measures Of Amazon Web Services
The Pro Measures Of Amazon Web ServicesThe Pro Measures Of Amazon Web Services
The Pro Measures Of Amazon Web Services
 
Cloud computing seminar
Cloud computing seminarCloud computing seminar
Cloud computing seminar
 
Aws101
Aws101Aws101
Aws101
 
Aws overview
Aws overviewAws overview
Aws overview
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web Services
 
AWS Session.pptx
AWS Session.pptxAWS Session.pptx
AWS Session.pptx
 
Third party cloud services cloud computing
Third party cloud services cloud computingThird party cloud services cloud computing
Third party cloud services cloud computing
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4
 

Más de Bloombase

Más de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 

Último

introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Último (20)

%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 

Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-services-aws-uslet-en-r9.10

  • 1. Amazon Web Services (AWS) delivers reliable and scalable compute and storage services in the cloud; it is one of the largest public cloud infrastructures operating on a global scale, providing high availability, agility and elasticity for mission-critical business software applications and data services. Off-premise cloud computing infrastructures are often regarded being potentially more exposed to cyber-attacks and breaches than on-premise data centers. As application workloads and sensitive data are migrated to the cloud, there is a need for higher level of security to meet data privacy regulatory compliance requirements, while retaining system scalability and availability. Data-at-rest encryption is technically the last line of defense to mitigate the risks of data outbound threats, despite the desperation of legacy encryption silos, non- scalable, and difficulties of managing the new generation cloud computing architecture. Bloombase Next Generation Data Security solution delivers a unique and transformative encryption approach: powering storage data security from traditional data center, virtualization, hyperscale computing to big data and cloud. Bloombase StoreSafe data security software appliance is the missing piece for data-at-rest protection in the cloud. It delivers bump-in-the-wire, application-transparent and non- disruptive cryptography which fits seamlessly into the cloud, enabling customers to Bloombase data-at-rest security solution provides turnkey, agentless, non- disruptive, application-transparent encryption of cloud application workloads and storage services powered by Amazon Web Services (AWS). The solution can help:  Secure your Amazon Elastic Compute Cloud (EC2) compute instances and Amazon cloud storage services  Provide multi-tenancy encryption protection of data-at-rest on AWS  Protect your business-sensitive data managed in Amazon cloud storage services including Amazon Simple Storage Service (S3), Amazon Elastic Block Store (EBS) and Amazon Elastic File System (EFS)  Mitigate data outbound threats and data leakage at low total cost of ownership (TCO)  Retrieve your ciphertext quickly and securely by trusted AWS applications as if they are in plaintext  Meet stringent data confidentiality and secrecy regulatory compliance requirements immediately  Maximize your return on investment (ROI) with easy-to-implement and scalable AWS cloud platform for multi- tenancy, mixed operating systems, and heterogeneous cloud storage environments  Manage security rules and policies easily to align your data encryption requirements  Support AWS Key Management Service (KMS) and CloudHSM for centralized life- cycle key management S o l u t i o n B r i e f Bloombase StoreSafe Intelligent Storage Firewall for Amazon Web Services (AWS) EC2 Instance Applications on Amazon Elastic Compute Cloud Read and Unencrypt Write and Encrypt EBS Volume S3 Object Amazon Elastic Block Storage (EBS) EFS File Amazon Elastic File System (EFS) Amazon Simple Storage Service (S3) CloudHSM KMS Bloombase StoreSafe on EC2 ^$8Yn +=@~ ^$8Yn +=@~ ^$8Yn +=@~ . Clear text Trusted User Header Trailer Cleartext Header ^$8Yn+=@ ~ Trailer Bad Guys ?!
  • 2. Bloombase - The Intelligent Storage Firewall Company email info@bloombase.com web https://www.bloombase.com Copyright 2019 Bloombase, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase in United States and/or other jurisdictions. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. Item No. BLBS-SB-Bloombase-StoreSafe-Intelligent-Storage-Firewall-for-Amazon-Web-Services-AWS-USLET-EN-R9.10 meet stringent data privacy requirements easily and cost effectively. The Bloombase cryptographic module is NIST FIPS 140-2 certified, supporting standards-based cipher algorithms, open storage security protocols (e.g. IEEE 1619), AWS Key Management Service (KMS) and CloudHSM, and other industry- leading key management standards (e.g. PKCS#11 and OASIS KMIP). Bloombase StoreSafe empowers turnkey encryption of Amazon storage services: Amazon Simple Storage Service (S3), Amazon Elastic Block Store (EBS) and Amazon Elastic File System (EFS) as -a-service, enabling software applications on Amazon Elastic Compute Cloud (EC2) to secure their data transparently with minimal application change. Bloombase’s agentless encryption software appliance allows flexible deployment as Amazon EC2 instances on AWS or on other third-party cloud platforms. It works as a storage proxy, providing high bandwidth ciphering and deciphering of Amazon S3 objects, Amazon EBS volumes, and Amazon EFS files, by preserving the respective network storage protocols. Trusted AWS hosts and applications, leverage virtual storage resources provided by Bloombase for encryption of data-at-rest managed at Amazon storage services. When plaintext data is written to storage via the Bloombase StoreSafe, this data is converted into ciphertext on-the-fly and stored in Amazon storage objects. Conversely, when data is read from Amazon storage service, the Bloombase StoreSafe deciphers the ciphertext data and presents it to trusted host applications as virtual plaintext. Business data in Amazon storage services is permanently encrypted as Amazon S3 objects, Amazon EBS volumes or Amazon EFS files. Data owners access encrypted business data as if in the clear, whereas platform administrators and operators see this same data in ciphertext. Based on open technologies, Bloombase’s transparent data security solution is sustainable, scalable and agile through heterogeneous infrastructure environments and the evolving IT: Bloombase secures Amazon storage services, traditional storage systems, and other next-generation cloud platform, while maximizing cost-efficiency and manageability. Bloombase’s rich security features fulfill security requirements of the full range of industry verticals and geographies. Growing data protection needs are satisfied dynamically and efficiently, as Bloombase scales flexibly in sync with the allocation of computing resources. Designed for fault tolerance and high availability, Bloombase provides protection for mission-critical data services. Consequently, organizations can leverage the Bloombase Next Generation Data Security technology to run their business- critical applications and data services on AWS, securely and privately, as if on their own premises. What is Amazon Web Services (AWS) Amazon Web Services (AWS) delivers a set of services that together form a reliable, scalable, and inexpensive computing platform “in the cloud”. The most central and well-known of these services are Amazon EC2 and Amazon S3. One of the key benefits of cloud computing is the opportunity to replace up-front capital infrastructure expenses with low variable costs that scale with your business. With the Cloud, businesses no longer need to procure servers and other IT infrastructures weeks or months in advance. Instead, they can instantly spin up hundreds or thousands of servers in minutes and deliver results faster. Amazon Web Services provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world. With data center locations in the U.S., Europe, Brazil, Singapore, Japan, and Australia, customers across all industries are taking advantages of the following benefits: low cost, agility and instant elasticity, open and flexible, last but not least, data security. What is AWS Partner Network (APN) The AWS Partner Network is made up of a strong and growing community of companies that offer a wide range of products and services on AWS platform. AWS Technology Partners include independent software vendors (ISVs), SaaS, PaaS, developer tools, management and security vendors. For more information about AWS Partner Network, visit https://aws.amazon.com/ partners. Bloombase is an APN Technology Partner. Learn More To learn more about Bloombase StoreSafe Intelligent Storage Firewall for AWS, visit https://aws.amazon.com/marketplace/pp/B07FNS7P4Q and https://aws.amazon.com/marketplace/seller-profile? id=277af30e-567f-4076-a7c2-8bb6ec439138. For more information, contact your Bloombase sales representative, or visit https://www.bloombase.com.