SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
BLOOMBASE TURNKEY DATA-AT-REST
SECURITY COMPLIANCE SOLUTION
FOR EMC VNX/VNXe
ESSENTIALS


Bloombase StoreSafe is an industryproven solution for immediate security
compliance of various standards including HIPAA, PCI DSS, SB 1386, SOX,
and more



Bundled Bloombase KeyCastle enables
automated initial migration of EMC
VNX contents, rekey, and full lifecycle
management of cryptographic keys



Web-based management console,
command line interface console, and
SNMP offer total, simplified management



Unlike proprietary hardware with high
entry price, Bloombase StoreSafe offers a pay-as-you-go licensing model
to help reduce your initial investment



To maximize ROI, Bloombase
StoreSafe:



Enables multiple storage hosts and
applications to produce and consume
secured data at-rest





EMC VNX/VNXe WITH BLOOMBASE STORESAFE
Electronic business data represents an invaluable core asset of today’s enterprises and organizations. Enterprise customers are concerned about being able to manage and use sensitive information to optimize day-to-day business operations, while protecting it and fulfilling information
privacy compliance needs—with the expense of drastic infrastructure change and performance
degradation.
Bloombase StoreSafe data at-rest security solution offers advanced security capabilities for a
reliable, application-transparent, cipher-text data storage infrastructure. Its tamper-proof hardware encryption key security module ensures confidentiality and integrity throughout its whole
lifecycle. Bloombase Cryptographic Module is NIST FIPS 140-2 certified providing FIPS-approved
RSA and AES cryptographic algorithms, along with non-FIPS ciphers including Camellia, SEED,
ARIA, Twofish, Blowfish, etc.
Sensitive persistent data is stored as cipher-text securely stored in EMC VNX. The encryption and
un-encryption processes are automated by re-routing storage paths via Bloombase StoreSafe
software appliance delivering virtual plain contents to authorized hosts and applications.
EMC VNX storage targets are accessed by FCP, iSCSI, CIFS and/or NFS storage protocols via
Bloombase StoreSafe. Ciphered sensitive information is stored in EMC VNX storage system for
centralized management. Only authorized access of virtual-plain information, by trusted applications and systems, per access rules and security profiles secured by Bloombase StoreSafe is

Bloombase KeyCastle
operator smart-token
Active cluster

Bloombase KeyCastle
Key Management
Server Cluster

Supports multiple EMC VNX LUNs, file
service resources, and shares

Microsoft SQL Server on
Microsoft Windows Server 2003
On i386 appliance
Primary site
Bloombase StoreSafe
Security Server Cluster

Supports both file– and block-based
protection for CIFS, NFS, iSCSI, FCP
EMC VNX storage resources

Microsoft Exchange on
Microsoft Windows Server 2003
On i386 appliance

Switch (active)

Standby cluster

Microsoft SQL Server on
Microsoft Windows Server 2003
On i386 appliance

Microsoft Exchange on
Microsoft Windows Server 2003
On i386 appliance

X&*^2
3#$(+

EMC VNX storing
Microsoft SQLServer database and
application data files

Switch (standby)

X&*^2
3#$(+

VTL

Secondary site
VPN
Microsoft SQL Server on
Microsoft Windows Server 2003
On i386 appliance
X&*^2
3#$(+

Microsoft Exchange on
Microsoft Windows Server 2003
On i386 appliance

EMC VNX storing
Microsoft SQLServer database and
application data files
Bloombase KeyCastle
operator smart-token
Bloombase StoreSafe
Security Server Cluster
Ethernet Network
Storage Network
Bloombase KeyCastle
Key Management
Server Cluster

SOLUTION OVERVIEW
permitted. Application data files, shares, and storage volumes are
protected by strong encryption offered by Bloombase StoreSafe virtual storages, enabling application servers to achieve various information privacy compliance standards immediately and costeffectively.

SOLUTION ARCHITECTURE
Bloombase StoreSafe data at-rest encryption solution offers wirespeed, on-the-fly encryption and un-encryption of storage data in EMC
VNX network-attached storage (NAS) system. It requires minimum
change in application tier by dropping-in Bloombase StoreSafe software appliances in the storage paths.
Bloombase High Availability brings together multiple nodes of Bloombase software appliances as a cluster so when master node fails,
slave nodes pick up and maintain non-stop, mission-critical service at
complete storage host transparency, requiring minimal operator attention. Extending to disaster recovery infrastructure, storage ciphertexts at the primary site are replicated in their natural encryption form
over private network to backup storage system at secondary site, and
secured by a replica of Bloombase StoreSafe and KeyCastle clusters.
As storage contents reside on EMC VNX in their native ciphered form,
data backup done over physical storage resources is inherently encrypted, satisfying secure archival needs immediately.
The easy-to-manage Bloombase StoreSafe storage encryption solution helps organizational customers enforce data confidentiality for
storage, which improves overall system security, enables fast key
rotation, reduces user workflows, segregates data ownership from
administration and operation, and enhances efficiency and internal
controls.

RESULTS

 For TPC-C queries, Bloombase StoreSafe-encrypted database server stored in EMC VNX recorded a 9 percent drop in throughput,
compared to 31 percent for host-based and 64 percent for data
column-level
 For TPC-C inserts and updates, Bloombase StoreSafe encrypted
database stored in EMC VNX recorded a 12 percent drop in
throughput, compared to 53 percent for host-based and 59 percent
for column-level

CONCLUSION
 Write-speed encryption performance with least degradation in
storage I/O and throughput

 Turnkey and proven solution for immediate compliance to stringent
information confidentiality regulatory compliance requirements

 No application change or second development needed
 Fast deployment and automated migration versus alternatives’
manual script-based migration approach

 FCP/iSCSI block-based and NFS/CIFS file-based encryption in a
single solution

 Highly secure NIST FIPS 140-2 and IEEE 1619 standard
 High availability and fault-tolerant
 Low total cost of ownership (TCO)

ABOUT BLOOMBASE
Bloombase is a worldwide provider and leading innovator in Next
Generation Data Security from Physical/Virtual Datacenter, through
Big Data and to the Cloud. Bloombase provides turnkey, nondisruptive, defense in-depth data protection against dynamic cyber
threats while simplifying the IT security infrastructure. Bloombase is
the trusted standard for Global 500-scale organizations that have
zero tolerance policy for security breaches. For more information, visit
www.bloombase.com.

ABOUT EMC
 A TPC-C-based database benchmark test is carried out on a sample
database stored in an EMC VNX secured by Bloombase StoreSafe
storage encryption software appliance
 TPC-C-like queries (with EMC VNX read, Bloombase StoreSafe unencryption) and updates (with VNX write, Bloombase StoreSafe
encryption) are generated and applied to simulate workload on
EMC VNX/Bloombase StoreSafe setup

EMC Corporation is the world’s leading developer and provider of
information infrastructure technology and solutions that enable organizations of all sizes to transform the way they compete and create
value from their information. Information about EMC’s products and
services can be found at www.EMC.com.

EMC, VNX, the EMC logo, and where information lives are registered trademarks or trademakrs of EMC Corporation in the United States and other countries. All other trademarks used herein are the
property of their respective owners. Copyright 2011 EMC Corporation. All rights reserved. Published in the USA. 01/11 Solution Overview H8568

EMC Corporation
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.EMC.com

Más contenido relacionado

La actualidad más candente

TECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackup
TECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackupTECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackup
TECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackup
Symantec
 
EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...
EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...
EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...
Principled Technologies
 
M. Rafaat_EMC_Presentation
M. Rafaat_EMC_PresentationM. Rafaat_EMC_Presentation
M. Rafaat_EMC_Presentation
Mohamed Raafat
 

La actualidad más candente (20)

A Comparison of IBM’s New Flex System Environment to Traditional Blade Archit...
A Comparison of IBM’s New Flex System Environment to Traditional Blade Archit...A Comparison of IBM’s New Flex System Environment to Traditional Blade Archit...
A Comparison of IBM’s New Flex System Environment to Traditional Blade Archit...
 
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
 
TECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackup
TECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackupTECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackup
TECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackup
 
Vnx mr presentation kenny pool
Vnx mr presentation kenny poolVnx mr presentation kenny pool
Vnx mr presentation kenny pool
 
Alluxio: Unify Data at Memory Speed
Alluxio: Unify Data at Memory SpeedAlluxio: Unify Data at Memory Speed
Alluxio: Unify Data at Memory Speed
 
vProtect - enterprise-grade Nutanix backup & recovery
vProtect - enterprise-grade Nutanix backup & recoveryvProtect - enterprise-grade Nutanix backup & recovery
vProtect - enterprise-grade Nutanix backup & recovery
 
Emc storag
Emc storagEmc storag
Emc storag
 
Sklm webinar
Sklm webinarSklm webinar
Sklm webinar
 
Interview operating system solaris
Interview operating system solarisInterview operating system solaris
Interview operating system solaris
 
EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...
EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...
EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...
 
Trio nas qsan storage
Trio nas qsan storageTrio nas qsan storage
Trio nas qsan storage
 
SME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for ScalitySME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for Scality
 
EMC FAST VP for Unified Storage Systems
EMC FAST VP for Unified Storage Systems EMC FAST VP for Unified Storage Systems
EMC FAST VP for Unified Storage Systems
 
Barracuda Backup Service - English Presentation
Barracuda Backup Service - English PresentationBarracuda Backup Service - English Presentation
Barracuda Backup Service - English Presentation
 
Red Hat Storage combined with Commvault Simpana
Red Hat Storage combined with Commvault SimpanaRed Hat Storage combined with Commvault Simpana
Red Hat Storage combined with Commvault Simpana
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0
 
Deploying Applications in Today’s Network Infrastructure
Deploying Applications in Today’s Network InfrastructureDeploying Applications in Today’s Network Infrastructure
Deploying Applications in Today’s Network Infrastructure
 
Introduction to the EMC XtremIO All-Flash Array
Introduction to the EMC XtremIO All-Flash ArrayIntroduction to the EMC XtremIO All-Flash Array
Introduction to the EMC XtremIO All-Flash Array
 
Emc
EmcEmc
Emc
 
M. Rafaat_EMC_Presentation
M. Rafaat_EMC_PresentationM. Rafaat_EMC_Presentation
M. Rafaat_EMC_Presentation
 

Destacado

Preimplantation genetic screening (pgs) current ppt2
Preimplantation genetic screening (pgs)  current     ppt2Preimplantation genetic screening (pgs)  current     ppt2
Preimplantation genetic screening (pgs) current ppt2
鋒博 蔡
 
Fun Activities to Improve English Pronunciation
Fun Activities to Improve English PronunciationFun Activities to Improve English Pronunciation
Fun Activities to Improve English Pronunciation
Sylvia Rivera
 
Magic of Values AIESEC Y2B 2012 - Phil Clothier
Magic of Values AIESEC Y2B 2012 - Phil ClothierMagic of Values AIESEC Y2B 2012 - Phil Clothier
Magic of Values AIESEC Y2B 2012 - Phil Clothier
Phil Clothier
 
WebliografíA08 09
WebliografíA08 09WebliografíA08 09
WebliografíA08 09
jmaq1997
 
Pgr insurance idcard
Pgr insurance idcardPgr insurance idcard
Pgr insurance idcard
Greg in SD
 
Building self discipline in our students
Building self discipline in our studentsBuilding self discipline in our students
Building self discipline in our students
kkgmom03
 
Cetuximab treatment in a patient with metastatic colorectal
Cetuximab treatment in a patient with metastatic colorectalCetuximab treatment in a patient with metastatic colorectal
Cetuximab treatment in a patient with metastatic colorectal
eman youssif
 
13.상관과 회귀
13.상관과 회귀13.상관과 회귀
13.상관과 회귀
Yoonwhan Lee
 

Destacado (20)

Naver vs daum - 정구승
Naver vs daum - 정구승Naver vs daum - 정구승
Naver vs daum - 정구승
 
Bladder disorders(neurogenic)
 Bladder disorders(neurogenic) Bladder disorders(neurogenic)
Bladder disorders(neurogenic)
 
Hard water and the consumer: The Hidden Costs of Hard Water
Hard water and the consumer: The Hidden Costs of Hard WaterHard water and the consumer: The Hidden Costs of Hard Water
Hard water and the consumer: The Hidden Costs of Hard Water
 
Preimplantation genetic screening (pgs) current ppt2
Preimplantation genetic screening (pgs)  current     ppt2Preimplantation genetic screening (pgs)  current     ppt2
Preimplantation genetic screening (pgs) current ppt2
 
Fun Activities to Improve English Pronunciation
Fun Activities to Improve English PronunciationFun Activities to Improve English Pronunciation
Fun Activities to Improve English Pronunciation
 
B13 Investigating oracle by Julian Dyke
B13 Investigating oracle by Julian DykeB13 Investigating oracle by Julian Dyke
B13 Investigating oracle by Julian Dyke
 
Input Output Management In C Programming
Input Output Management In C ProgrammingInput Output Management In C Programming
Input Output Management In C Programming
 
Magic of Values AIESEC Y2B 2012 - Phil Clothier
Magic of Values AIESEC Y2B 2012 - Phil ClothierMagic of Values AIESEC Y2B 2012 - Phil Clothier
Magic of Values AIESEC Y2B 2012 - Phil Clothier
 
Measuring schools and further education and skills providers on learners’ emp...
Measuring schools and further education and skills providers on learners’ emp...Measuring schools and further education and skills providers on learners’ emp...
Measuring schools and further education and skills providers on learners’ emp...
 
final 26 september named
final 26 september namedfinal 26 september named
final 26 september named
 
Is it in Us - Chemical Contamination in Our Bodies
Is it in Us - Chemical Contamination in Our Bodies Is it in Us - Chemical Contamination in Our Bodies
Is it in Us - Chemical Contamination in Our Bodies
 
WebliografíA08 09
WebliografíA08 09WebliografíA08 09
WebliografíA08 09
 
Pgr insurance idcard
Pgr insurance idcardPgr insurance idcard
Pgr insurance idcard
 
A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013
A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013
A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013
 
BSL Research Report
BSL Research ReportBSL Research Report
BSL Research Report
 
Building self discipline in our students
Building self discipline in our studentsBuilding self discipline in our students
Building self discipline in our students
 
Cornish Pasty
Cornish PastyCornish Pasty
Cornish Pasty
 
Cetuximab treatment in a patient with metastatic colorectal
Cetuximab treatment in a patient with metastatic colorectalCetuximab treatment in a patient with metastatic colorectal
Cetuximab treatment in a patient with metastatic colorectal
 
Hong Kong in the 1950's
Hong Kong in the 1950'sHong Kong in the 1950's
Hong Kong in the 1950's
 
13.상관과 회귀
13.상관과 회귀13.상관과 회귀
13.상관과 회귀
 

Similar a Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-vnx-vn xe-uslet-en-r2

Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Bloombase
 

Similar a Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-vnx-vn xe-uslet-en-r2 (20)

H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
SMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution BriefSMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution Brief
 
Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
emc world keynote gelsinger
emc world keynote gelsinger emc world keynote gelsinger
emc world keynote gelsinger
 
Bloombase sb pc_11.18_s_bedits_sd - final r6
Bloombase sb pc_11.18_s_bedits_sd - final r6Bloombase sb pc_11.18_s_bedits_sd - final r6
Bloombase sb pc_11.18_s_bedits_sd - final r6
 
EMC VNX
EMC VNXEMC VNX
EMC VNX
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4
 

Más de Bloombase

Más de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbooklet
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-edition
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyer
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-vnx-vn xe-uslet-en-r2

  • 1. BLOOMBASE TURNKEY DATA-AT-REST SECURITY COMPLIANCE SOLUTION FOR EMC VNX/VNXe ESSENTIALS  Bloombase StoreSafe is an industryproven solution for immediate security compliance of various standards including HIPAA, PCI DSS, SB 1386, SOX, and more  Bundled Bloombase KeyCastle enables automated initial migration of EMC VNX contents, rekey, and full lifecycle management of cryptographic keys  Web-based management console, command line interface console, and SNMP offer total, simplified management  Unlike proprietary hardware with high entry price, Bloombase StoreSafe offers a pay-as-you-go licensing model to help reduce your initial investment  To maximize ROI, Bloombase StoreSafe:  Enables multiple storage hosts and applications to produce and consume secured data at-rest   EMC VNX/VNXe WITH BLOOMBASE STORESAFE Electronic business data represents an invaluable core asset of today’s enterprises and organizations. Enterprise customers are concerned about being able to manage and use sensitive information to optimize day-to-day business operations, while protecting it and fulfilling information privacy compliance needs—with the expense of drastic infrastructure change and performance degradation. Bloombase StoreSafe data at-rest security solution offers advanced security capabilities for a reliable, application-transparent, cipher-text data storage infrastructure. Its tamper-proof hardware encryption key security module ensures confidentiality and integrity throughout its whole lifecycle. Bloombase Cryptographic Module is NIST FIPS 140-2 certified providing FIPS-approved RSA and AES cryptographic algorithms, along with non-FIPS ciphers including Camellia, SEED, ARIA, Twofish, Blowfish, etc. Sensitive persistent data is stored as cipher-text securely stored in EMC VNX. The encryption and un-encryption processes are automated by re-routing storage paths via Bloombase StoreSafe software appliance delivering virtual plain contents to authorized hosts and applications. EMC VNX storage targets are accessed by FCP, iSCSI, CIFS and/or NFS storage protocols via Bloombase StoreSafe. Ciphered sensitive information is stored in EMC VNX storage system for centralized management. Only authorized access of virtual-plain information, by trusted applications and systems, per access rules and security profiles secured by Bloombase StoreSafe is Bloombase KeyCastle operator smart-token Active cluster Bloombase KeyCastle Key Management Server Cluster Supports multiple EMC VNX LUNs, file service resources, and shares Microsoft SQL Server on Microsoft Windows Server 2003 On i386 appliance Primary site Bloombase StoreSafe Security Server Cluster Supports both file– and block-based protection for CIFS, NFS, iSCSI, FCP EMC VNX storage resources Microsoft Exchange on Microsoft Windows Server 2003 On i386 appliance Switch (active) Standby cluster Microsoft SQL Server on Microsoft Windows Server 2003 On i386 appliance Microsoft Exchange on Microsoft Windows Server 2003 On i386 appliance X&*^2 3#$(+ EMC VNX storing Microsoft SQLServer database and application data files Switch (standby) X&*^2 3#$(+ VTL Secondary site VPN Microsoft SQL Server on Microsoft Windows Server 2003 On i386 appliance X&*^2 3#$(+ Microsoft Exchange on Microsoft Windows Server 2003 On i386 appliance EMC VNX storing Microsoft SQLServer database and application data files Bloombase KeyCastle operator smart-token Bloombase StoreSafe Security Server Cluster Ethernet Network Storage Network Bloombase KeyCastle Key Management Server Cluster SOLUTION OVERVIEW
  • 2. permitted. Application data files, shares, and storage volumes are protected by strong encryption offered by Bloombase StoreSafe virtual storages, enabling application servers to achieve various information privacy compliance standards immediately and costeffectively. SOLUTION ARCHITECTURE Bloombase StoreSafe data at-rest encryption solution offers wirespeed, on-the-fly encryption and un-encryption of storage data in EMC VNX network-attached storage (NAS) system. It requires minimum change in application tier by dropping-in Bloombase StoreSafe software appliances in the storage paths. Bloombase High Availability brings together multiple nodes of Bloombase software appliances as a cluster so when master node fails, slave nodes pick up and maintain non-stop, mission-critical service at complete storage host transparency, requiring minimal operator attention. Extending to disaster recovery infrastructure, storage ciphertexts at the primary site are replicated in their natural encryption form over private network to backup storage system at secondary site, and secured by a replica of Bloombase StoreSafe and KeyCastle clusters. As storage contents reside on EMC VNX in their native ciphered form, data backup done over physical storage resources is inherently encrypted, satisfying secure archival needs immediately. The easy-to-manage Bloombase StoreSafe storage encryption solution helps organizational customers enforce data confidentiality for storage, which improves overall system security, enables fast key rotation, reduces user workflows, segregates data ownership from administration and operation, and enhances efficiency and internal controls. RESULTS  For TPC-C queries, Bloombase StoreSafe-encrypted database server stored in EMC VNX recorded a 9 percent drop in throughput, compared to 31 percent for host-based and 64 percent for data column-level  For TPC-C inserts and updates, Bloombase StoreSafe encrypted database stored in EMC VNX recorded a 12 percent drop in throughput, compared to 53 percent for host-based and 59 percent for column-level CONCLUSION  Write-speed encryption performance with least degradation in storage I/O and throughput  Turnkey and proven solution for immediate compliance to stringent information confidentiality regulatory compliance requirements  No application change or second development needed  Fast deployment and automated migration versus alternatives’ manual script-based migration approach  FCP/iSCSI block-based and NFS/CIFS file-based encryption in a single solution  Highly secure NIST FIPS 140-2 and IEEE 1619 standard  High availability and fault-tolerant  Low total cost of ownership (TCO) ABOUT BLOOMBASE Bloombase is a worldwide provider and leading innovator in Next Generation Data Security from Physical/Virtual Datacenter, through Big Data and to the Cloud. Bloombase provides turnkey, nondisruptive, defense in-depth data protection against dynamic cyber threats while simplifying the IT security infrastructure. Bloombase is the trusted standard for Global 500-scale organizations that have zero tolerance policy for security breaches. For more information, visit www.bloombase.com. ABOUT EMC  A TPC-C-based database benchmark test is carried out on a sample database stored in an EMC VNX secured by Bloombase StoreSafe storage encryption software appliance  TPC-C-like queries (with EMC VNX read, Bloombase StoreSafe unencryption) and updates (with VNX write, Bloombase StoreSafe encryption) are generated and applied to simulate workload on EMC VNX/Bloombase StoreSafe setup EMC Corporation is the world’s leading developer and provider of information infrastructure technology and solutions that enable organizations of all sizes to transform the way they compete and create value from their information. Information about EMC’s products and services can be found at www.EMC.com. EMC, VNX, the EMC logo, and where information lives are registered trademarks or trademakrs of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. Copyright 2011 EMC Corporation. All rights reserved. Published in the USA. 01/11 Solution Overview H8568 EMC Corporation Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.EMC.com