This is an excerpt of Vormetric’s Encryption Architecture Overview Whitepaper: Protecting Enterprise Data at Rest with Encryption, Access Controls and Auditing
More on subject : www.vormetric.com/datasecurity82
This Vormetric whitepaper discusses data security threats and related incidents, such as security breaches, which can be harmful to any organization operating online. It then goes on to explain the real risks to the enterprise data and how to make encryption successful. The whitepaper also discusses Vormetric encryption, which is a comprehensive solution for key management and encryption of data at rest. The whitepaper on Vormetric Encryption Architecture consists of brief introduction to two most important components of Vormetric Encryption i.e., Data Security Manager and Encryption Expert Agents.
According to whitepaper, some of the advantages of using Vormetric Encryption solution are:
• Encryption and Access Controls
• Transparent Implementation
• High Performance
• Centralized Key and Policy Management
• Strong Separation of Duties
• Role-Based Administration and Domains
• Scalability
• Distributed IT Environments
• High Availability
• Fine-Grained Auditing
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper to protect enterprise data at rest
1. Vormetric Encryption
Architecture Overview
Protecting Enterprise Data at Rest with
Encryption, Access Controls, and Auditing
www.Vormetric.com
2. Data is Your Business
!
Data security breaches
are harmful to any
organization of any size.
Slide No: 2
3. People Devices Servers
People
34%
35%
94%
2012 DATA BREACH INVESTIGATION REPORT
A study conducted by the Verizon RISK Team with
cooperation from global policing agencies.
Slide No: 3 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
4. Protect private and confidential info.
Global Compliance
PCI DSS
HITECH Act
UK Data Protection Act
South Korea’s PIPA
And more …
Server Defense-in-Depth Controls
Slide No: 4 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
5. Data is Everywhere
Business Application
Unstructured data Systems
(SAP, PeopleSoft, Oracle Security &
File Systems Financials, In-
Office documents, house, CRM, eComm/eBiz, etc. Other Systems
PDF, Vision, Audio & other ) (Event logs, Error logs
Fax/Print Servers Application Server Cache, Encryption keys,
File Servers & other secrets)
Security Systems
Remote locations
& systems
Structured data
Database Systems
Storage & Backup (SQL, Oracle, DB2,
Informix, MySQL)
Systems Database Server
SAN/NAS Data Communications
Backup Systems VoIP Systems
FTP/Dropbox Server
Email Servers
! Data exists in different formats, states, and locations.
Traditional Controls are not designed to secure it.
Slide No: 5 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
6. Data Security Simplified
Transparent Strong
Must be transparent to business Privileged users should not have
processes, end users, and access to sensitive data
applications Firewall your data – approved
Data type neutral – any data, users and applications allowed,
anywhere deny all others.
Efficient Easy
SLA, User, and Application Easy to Understand
performance must remain
Easy to Implement
acceptable
Easy to Manage
Encryption overhead can
approach zero
Slide No: 6 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
7. Vormetric Data Security
Vormetric Vormetric
Encryption Key Management
Encryption Key Agent
Agent
Data Security
Manager Oracle 11gR2
Unstructured TDE
Encryption Key Agent
Agent
Vormetric
Key Vault
SQL Server
Database 2008 / 2012 TDE
Slide No: 7 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
8. Vormetric Encryption Architecture
Users
Application
Policy is used to restrict
access to sensitive data
Database
by user and process
information provided
by the OS.
OS
FS Agent
SSL/TLS
File System
SAN, NAS, DAS
Storage
Slide No: 8 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
9. Protect Server Data
Log Files
Payment Custom Apps Password files
ERP CRM CMS
Config files
Log Files Archive
Password files WebLogic
Config Files
IIS APACHE
Data Files
Archive
Transaction Logs
DB2 Oracle SQL Sybase MySQL Exports
File Share Backup
Archive File Servers FTP Servers Email Servers Others
Content
Multi Needs
DAS SAN NAS VM CLOUD
Slide No: 9 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
10. We Secure The Data
That Runs Your Business
Download Whitepaper
11. Vormetric Encryption
Architecture Overview
Protecting Enterprise Data at Rest with
Encryption, Access Controls, and Auditing
www.Vormetric.com