SlideShare una empresa de Scribd logo
1 de 2
Sun and Bloombase R
                                           SpitfireTM StoreSafe End-to-end Storage
                                           Security Solution




                                                  Data-at-rest and data-in-flight security with full life-cycle key management in a
                                                  single solution. Sensitive departmental information interchange and storage
                                                  data of government security organization are encrypted using Bloombase R
                                                  SpitfireTM Storage Encryption Solution Running on Sun Microsystems x-Series
                                        Servers achieving end-to-end data in-flight and data at-rest security.
                                        About The Customer                                 Implementation Highlights
                                        > Government security control organization         First customer to practice both data-in-flight and
                                        > Employees: More than 10,000                      data-at-rest protection for end-to-end security of
                                        Objective                                          highly available sensitive business data
                                        To protect privacy of sensitive data interchange   interchange and persistence.
                                        information submitted from various trusted data
                                                                                           Features
                                        providers. Secure contents in storage sub-
                                                                                           A municipal security control organization
                                        systems and backup tapes from secret data          dynamically allocates their task forces and
Highlights                              exposure to unauthorized parties caused by         automatically reacts to potential incidents based
> No client user training is required   physical or electronic theft.                      on a self-developed intelligence information
  for third party data providers        Key Challenges-                                    system. Hundreds or even thousands of
                                        > Support heterogeneous host operating             information feeds including weather forecast and
> Application transparency                                                                 reports, local news, foreign news, traffic reports,
                                          systems including Microsoft R Windows R,
> High encryption performance             IBM AIX, etc                                     border and coastal data, calendar events, etc are
                                        > No change to end user, administrator and         collected from hundreds of data sources every
> Highly available and fault-tolerant     operator workflow                                minute. These real-time information, structured
                                        > No coding or second development is required      and/or unstructured, in form of flat files, are
> Tamper proof and tamper resistant                                                        parsed, extracted and aggregated before they are
                                        > Sensitive information are physically stored-
  key protection                          yet-encrypted at all times and no physical       loaded into a centralized data warehouse.
                                          plain originals and copies are allowed           Based on various pre-defined data mining rules,
                                        > Interoperable with IBM WebSphere R               real-time security data are analyzed to generate
                                          Application Server and IBM DB2 Universal         reports, milestones and alerts to proactively
                                          Database (UDB) Server                            monitor potential hazards and risks. With
                                        > Encrypted archives on backup tapes               response to these possible outcomes closely
                                        > High performance encryption and decryption       monitored and tracked by the 24x7 operation
                                        Project Objectives                                 unit, the bureau dynamically reacts and allocates
                                                                                           resources and task forces to combat such
                                        > Protect in-flight data submitted from third
                                                                                           potential incidents, better control the worsening
                                          parties by HTTP form posts
                                                                                           situation, if any, or even suppress outbreak of the
                                        > Safeguard file system objects, relational
                                                                                           incidents.
                                          databases and backup media
                                        > Encrypt dynamic database data stored in          Among these incoming information feeds, data
                                          storage area network (SAN)                       warehouse and reports repository are extremely
                                                                                           sensitive and are under airtight political and
                                        Why Bloombase R Solutions                          security privacy regulatory. In application's
                                        > All-in-one solution to achieve data in-          perspective, security measures limit access to the
                                          flight and at-rest security                      system to authorized personnel only, protecting
                                        > Platform independence
                                                                                           from unauth-orized access.
                                        > NIST FIPS-140-2 level-3 tamper proof and
                                          tamper resistant key protection
                                        > Full lifecycle key management
2 Sun and Bloombase                                                                                                                                                                        www.hk.sun.com

Network communications of these controlled                               An active self-executing component is deployed
information are secured by secure socket layer                           at every data providers' internal network to poll                                Learn More
(SSL) powered by Advanced Encryption Standard                            for latest news and information. These sensitive                                 For more information, visit
(AES) 256-bit strong encryption with industry-                           information feeds are encrypted automatically as                                 www.hk.sun.com
proven secure key exchange, thus, sensitive data                         they are uploaded to the intelligence system by                                  www.bloombase.com
exposure due to eavesdropping is eliminated.                             SpitfireTM StoreSafe Lite Storage Security API with                              or contact your local Sun Sales
Physical access to the computing hardware,                               channel further protected by SSL. The ciphered                                   representative.
whether at primary data center or disaster                               information feed is temporarily stored at a
recovery (DR) site, are securely isolated and                            staging area physically located at IBM
under strict physical access control, blocking                           TotalStorage R DS4100 SAN in form of flat file. A
possible physical tampering and data/hardware
                                                                         job is scheduled to run every other minute at an                                           Sun FireTM X4240
                                                                         IBM WebSphere R Application Server to scan for
theft. With all these security measures in place
                                                                         latest information feeds, access of ciphered
which are generally considered border or
                                                                         incoming files via SpitfireTM StoreSafe Security
perimeter protection, the data system is                                 Server provides a virtual plain view of sensitive
vulnerable to core attacks, unknown attacks and                          contents to be extracted and bulk imported into
outbound threats such as operator/insider                                a data warehouse powered by IBM DB2 UDB.
attacks, spyware attacks and viral outbreaks, etc.
                                                                         Read/write access of DB2 UDB is made via a                                 Sun FireTM X4150 provides the best combination
The Mission Critical Encryption                                          highly available SpitfireTM StoreSafe Server cluster                       of performance, expandability, and power
To cope with these challenges and meet national                          operating on Sun Microsystems x-Series Servers.                            efficiency and is the best 1RU 2-socket server.
data privacy requirements, end customer needs                            Thus, during bulk import of information,                                   The Sun FireTM X4150 server gives you much more
to implement effective data encryption to secure                         sensitive information are first encrypted on-the-                          throughput, growth options, and power savings
information exchange with various data                                   fly by SpitfireTM StoreSafe before they are                                than any other 1RU 2-socket x64 system. It's an
providers, protect data repository storage, data                         persisted onto SAN, vice versa, on execution of                            excellent example of Sun's innovative
warehouse and backup archives at both primary                            data-mining procedures, ciphered data are                                  engineering delivering one of the most
and disaster recovery systems. Implementing                              deciphered at real-time on-demand prior to                                 compelling x64 solutions in the market.
encryption on this mission critical system is full                       actual query reads.
                                                                                                                                                    Dual-Core and Quad-Core Intel R Xeon R processors
of constraints, baseline requirements being data                         Analysis results in form of data records and large                         power the Sun FireTM X4150 server to deliver
in-flight and at-rest are securely encrypted by AES                      binary objects are stored in another DB2 UDB                               world-class 32-bit and 64-bit performance in a
256-bit cryptographic cipher, high availability                          instance which is also protected by SpitfireTM                             rack-mountable 1RU form factor - fully backed by
ready and fault-tolerant, tamper proof and                               StoreSafe Storage Encryption Servers running on                            Sun's rock-solid, enterprise-class capabilities and
tamper resistant key protection and                                      Sun Microsystems x-Series Systems. Again, only                             quality.
management. On the other hand, the encryption                            when these sensitive milestones are accessed
solution has to fit perfectly into end customer's                        and presented to authorized personnel will the                             Sun FireTM X4450 is industry's smallest enterprise-
three-tier architecture at zero change, no                               private information be deciphered at wire-speed                            class 4-socket x64 server and now comes with
application change, no database object change                            by SpitfireTM StoreSafe. Ciphered block based SAN                          the Intel R Xeon R processor 7400 series with 6
and last but not least, to be fully transparent to                       storage updates are automatically synchronized                             processing cores. In fact, it's the first and only 4-
applications, administrators, operators and users.                       from primary site to DR site via a virtual private                         socket, 24-way, 2RU server - half the size of the
                                                                         lease line to be further reconstructed and applied                         other servers in its class.
After a three-months evaluation process, end                             to the DR SAN sub-system.                                                  The Sun FireTM X4240, powered by the Quad-Core
customer selected Bloombase R SpitfireTM
                                                                                                                                                    or enhanced Quad-Core AMD OpteronTM
Enterprise Security Solution over rivals taking                                                                                                     processor, gives you up to twice the memory and
kernel-based, database column-based, and                                                                                                            storage capacity of any system in its class. It's
hardware      appliance-based       encryption                                                                                                      the first and only two-socket AMD OpteronTM
approaches.
                                                                                          Sun FireTM X4450
                                                                                                                                                    system with *16 hard drive* slots in a 2RU form
                                                                                                                                                    factor.
Deployment of Bloombase R SpitfireTM KeyCastle
Key Management Servers and SpitfireTM Store-
Safe Storage Security Servers completed within 3
days whereas initial data migration of incoming
information feed repository, IBM DB2 UDB data
files and report storage area took merely another                         Reference Architecture
surprisingly 2 days.                                                      Sun x64 servers are the fastest, energy-efficient and
                                                                          reliable Intel R or AMD servers. These servers can
                                                                          run virtually any operating systems, including
                                                                          SolarisTM OS, Linux, Windows R or VMware.




Sun Microsystems of California Limited 66/F Centre Plaza, 18 Harbour Road, Wanchai, Hong Kong Phone 852-2202-6200 Web www.hk.sun.com
@2008 Sun Microsystems of California Limited. All rights reserved. Sun, Sun Microsystems, the Sun logo, Java, J2EE, J2SE, Solaris, the Solaris logo, StarOffice, Sun Enterprise Authentication Mechanism, and SunPCi are
trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. Mozilla is a trademark of Netscape Communications Corporation in the United States and other countries. UNIX
is a registered trademark in the United States, exclusively licensed through X/Open Company, Ltd. Information subject to change without notice.

Más contenido relacionado

Más de Bloombase

HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Bloombase
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usenBloombase
 

Más de Bloombase (20)

HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 

Oracle/Sun and Bloombase Spitfire StoreSafe End-to-end Storage Security Solution

  • 1. Sun and Bloombase R SpitfireTM StoreSafe End-to-end Storage Security Solution Data-at-rest and data-in-flight security with full life-cycle key management in a single solution. Sensitive departmental information interchange and storage data of government security organization are encrypted using Bloombase R SpitfireTM Storage Encryption Solution Running on Sun Microsystems x-Series Servers achieving end-to-end data in-flight and data at-rest security. About The Customer Implementation Highlights > Government security control organization First customer to practice both data-in-flight and > Employees: More than 10,000 data-at-rest protection for end-to-end security of Objective highly available sensitive business data To protect privacy of sensitive data interchange interchange and persistence. information submitted from various trusted data Features providers. Secure contents in storage sub- A municipal security control organization systems and backup tapes from secret data dynamically allocates their task forces and Highlights exposure to unauthorized parties caused by automatically reacts to potential incidents based > No client user training is required physical or electronic theft. on a self-developed intelligence information for third party data providers Key Challenges- system. Hundreds or even thousands of > Support heterogeneous host operating information feeds including weather forecast and > Application transparency reports, local news, foreign news, traffic reports, systems including Microsoft R Windows R, > High encryption performance IBM AIX, etc border and coastal data, calendar events, etc are > No change to end user, administrator and collected from hundreds of data sources every > Highly available and fault-tolerant operator workflow minute. These real-time information, structured > No coding or second development is required and/or unstructured, in form of flat files, are > Tamper proof and tamper resistant parsed, extracted and aggregated before they are > Sensitive information are physically stored- key protection yet-encrypted at all times and no physical loaded into a centralized data warehouse. plain originals and copies are allowed Based on various pre-defined data mining rules, > Interoperable with IBM WebSphere R real-time security data are analyzed to generate Application Server and IBM DB2 Universal reports, milestones and alerts to proactively Database (UDB) Server monitor potential hazards and risks. With > Encrypted archives on backup tapes response to these possible outcomes closely > High performance encryption and decryption monitored and tracked by the 24x7 operation Project Objectives unit, the bureau dynamically reacts and allocates resources and task forces to combat such > Protect in-flight data submitted from third potential incidents, better control the worsening parties by HTTP form posts situation, if any, or even suppress outbreak of the > Safeguard file system objects, relational incidents. databases and backup media > Encrypt dynamic database data stored in Among these incoming information feeds, data storage area network (SAN) warehouse and reports repository are extremely sensitive and are under airtight political and Why Bloombase R Solutions security privacy regulatory. In application's > All-in-one solution to achieve data in- perspective, security measures limit access to the flight and at-rest security system to authorized personnel only, protecting > Platform independence from unauth-orized access. > NIST FIPS-140-2 level-3 tamper proof and tamper resistant key protection > Full lifecycle key management
  • 2. 2 Sun and Bloombase www.hk.sun.com Network communications of these controlled An active self-executing component is deployed information are secured by secure socket layer at every data providers' internal network to poll Learn More (SSL) powered by Advanced Encryption Standard for latest news and information. These sensitive For more information, visit (AES) 256-bit strong encryption with industry- information feeds are encrypted automatically as www.hk.sun.com proven secure key exchange, thus, sensitive data they are uploaded to the intelligence system by www.bloombase.com exposure due to eavesdropping is eliminated. SpitfireTM StoreSafe Lite Storage Security API with or contact your local Sun Sales Physical access to the computing hardware, channel further protected by SSL. The ciphered representative. whether at primary data center or disaster information feed is temporarily stored at a recovery (DR) site, are securely isolated and staging area physically located at IBM under strict physical access control, blocking TotalStorage R DS4100 SAN in form of flat file. A possible physical tampering and data/hardware job is scheduled to run every other minute at an Sun FireTM X4240 IBM WebSphere R Application Server to scan for theft. With all these security measures in place latest information feeds, access of ciphered which are generally considered border or incoming files via SpitfireTM StoreSafe Security perimeter protection, the data system is Server provides a virtual plain view of sensitive vulnerable to core attacks, unknown attacks and contents to be extracted and bulk imported into outbound threats such as operator/insider a data warehouse powered by IBM DB2 UDB. attacks, spyware attacks and viral outbreaks, etc. Read/write access of DB2 UDB is made via a Sun FireTM X4150 provides the best combination The Mission Critical Encryption highly available SpitfireTM StoreSafe Server cluster of performance, expandability, and power To cope with these challenges and meet national operating on Sun Microsystems x-Series Servers. efficiency and is the best 1RU 2-socket server. data privacy requirements, end customer needs Thus, during bulk import of information, The Sun FireTM X4150 server gives you much more to implement effective data encryption to secure sensitive information are first encrypted on-the- throughput, growth options, and power savings information exchange with various data fly by SpitfireTM StoreSafe before they are than any other 1RU 2-socket x64 system. It's an providers, protect data repository storage, data persisted onto SAN, vice versa, on execution of excellent example of Sun's innovative warehouse and backup archives at both primary data-mining procedures, ciphered data are engineering delivering one of the most and disaster recovery systems. Implementing deciphered at real-time on-demand prior to compelling x64 solutions in the market. encryption on this mission critical system is full actual query reads. Dual-Core and Quad-Core Intel R Xeon R processors of constraints, baseline requirements being data Analysis results in form of data records and large power the Sun FireTM X4150 server to deliver in-flight and at-rest are securely encrypted by AES binary objects are stored in another DB2 UDB world-class 32-bit and 64-bit performance in a 256-bit cryptographic cipher, high availability instance which is also protected by SpitfireTM rack-mountable 1RU form factor - fully backed by ready and fault-tolerant, tamper proof and StoreSafe Storage Encryption Servers running on Sun's rock-solid, enterprise-class capabilities and tamper resistant key protection and Sun Microsystems x-Series Systems. Again, only quality. management. On the other hand, the encryption when these sensitive milestones are accessed solution has to fit perfectly into end customer's and presented to authorized personnel will the Sun FireTM X4450 is industry's smallest enterprise- three-tier architecture at zero change, no private information be deciphered at wire-speed class 4-socket x64 server and now comes with application change, no database object change by SpitfireTM StoreSafe. Ciphered block based SAN the Intel R Xeon R processor 7400 series with 6 and last but not least, to be fully transparent to storage updates are automatically synchronized processing cores. In fact, it's the first and only 4- applications, administrators, operators and users. from primary site to DR site via a virtual private socket, 24-way, 2RU server - half the size of the lease line to be further reconstructed and applied other servers in its class. After a three-months evaluation process, end to the DR SAN sub-system. The Sun FireTM X4240, powered by the Quad-Core customer selected Bloombase R SpitfireTM or enhanced Quad-Core AMD OpteronTM Enterprise Security Solution over rivals taking processor, gives you up to twice the memory and kernel-based, database column-based, and storage capacity of any system in its class. It's hardware appliance-based encryption the first and only two-socket AMD OpteronTM approaches. Sun FireTM X4450 system with *16 hard drive* slots in a 2RU form factor. Deployment of Bloombase R SpitfireTM KeyCastle Key Management Servers and SpitfireTM Store- Safe Storage Security Servers completed within 3 days whereas initial data migration of incoming information feed repository, IBM DB2 UDB data files and report storage area took merely another Reference Architecture surprisingly 2 days. Sun x64 servers are the fastest, energy-efficient and reliable Intel R or AMD servers. These servers can run virtually any operating systems, including SolarisTM OS, Linux, Windows R or VMware. Sun Microsystems of California Limited 66/F Centre Plaza, 18 Harbour Road, Wanchai, Hong Kong Phone 852-2202-6200 Web www.hk.sun.com @2008 Sun Microsystems of California Limited. All rights reserved. Sun, Sun Microsystems, the Sun logo, Java, J2EE, J2SE, Solaris, the Solaris logo, StarOffice, Sun Enterprise Authentication Mechanism, and SunPCi are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. Mozilla is a trademark of Netscape Communications Corporation in the United States and other countries. UNIX is a registered trademark in the United States, exclusively licensed through X/Open Company, Ltd. Information subject to change without notice.