SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
BLOOMBASE TURNKEY DATA-AT-REST
SECURITY COMPLIANCE SOLUTION
FOR EMC VNX/VNXe
ESSENTIALS


Bloombase StoreSafe is an industryproven solution for immediate security
compliance of various standards including HIPAA, PCI DSS, SB 1386, SOX,
and more



Bundled Bloombase KeyCastle enables
automated initial migration of EMC
VNX contents, rekey, and full lifecycle
management of cryptographic keys



Web-based management console,
command line interface console, and
SNMP offer total, simplified management



Unlike proprietary hardware with high
entry price, Bloombase StoreSafe offers a pay-as-you-go licensing model
to help reduce your initial investment



To maximize ROI, Bloombase
StoreSafe:



Enables multiple storage hosts and
applications to produce and consume
secured data at-rest





EMC VNX/VNXe WITH BLOOMBASE STORESAFE
Electronic business data represents an invaluable core asset of today’s enterprises and organizations. Enterprise customers are concerned about being able to manage and use sensitive information to optimize day-to-day business operations, while protecting it and fulfilling information
privacy compliance needs—with the expense of drastic infrastructure change and performance
degradation.
Bloombase StoreSafe data at-rest security solution offers advanced security capabilities for a
reliable, application-transparent, cipher-text data storage infrastructure. Its tamper-proof hardware encryption key security module ensures confidentiality and integrity throughout its whole
lifecycle. Bloombase Cryptographic Module is NIST FIPS 140-2 certified providing FIPS-approved
RSA and AES cryptographic algorithms, along with non-FIPS ciphers including Camellia, SEED,
ARIA, Twofish, Blowfish, etc.
Sensitive persistent data is stored as cipher-text securely stored in EMC VNX. The encryption and
un-encryption processes are automated by re-routing storage paths via Bloombase StoreSafe
software appliance delivering virtual plain contents to authorized hosts and applications.
EMC VNX storage targets are accessed by FCP, iSCSI, CIFS and/or NFS storage protocols via
Bloombase StoreSafe. Ciphered sensitive information is stored in EMC VNX storage system for
centralized management. Only authorized access of virtual-plain information, by trusted applications and systems, per access rules and security profiles secured by Bloombase StoreSafe is

Bloombase KeyCastle
operator smart-token
Active cluster

Bloombase KeyCastle
Key Management
Server Cluster

Supports multiple EMC VNX LUNs, file
service resources, and shares

Microsoft SQL Server on
Microsoft Windows Server 2003
On i386 appliance
Primary site
Bloombase StoreSafe
Security Server Cluster

Supports both file– and block-based
protection for CIFS, NFS, iSCSI, FCP
EMC VNX storage resources

Microsoft Exchange on
Microsoft Windows Server 2003
On i386 appliance

Switch (active)

Standby cluster

Microsoft SQL Server on
Microsoft Windows Server 2003
On i386 appliance

Microsoft Exchange on
Microsoft Windows Server 2003
On i386 appliance

X&*^2
3#$(+

EMC VNX storing
Microsoft SQLServer database and
application data files

Switch (standby)

X&*^2
3#$(+

VTL

Secondary site
VPN
Microsoft SQL Server on
Microsoft Windows Server 2003
On i386 appliance
X&*^2
3#$(+

Microsoft Exchange on
Microsoft Windows Server 2003
On i386 appliance

EMC VNX storing
Microsoft SQLServer database and
application data files
Bloombase KeyCastle
operator smart-token
Bloombase StoreSafe
Security Server Cluster
Ethernet Network
Storage Network
Bloombase KeyCastle
Key Management
Server Cluster

SOLUTION OVERVIEW
permitted. Application data files, shares, and storage volumes are
protected by strong encryption offered by Bloombase StoreSafe virtual storages, enabling application servers to achieve various information privacy compliance standards immediately and costeffectively.

SOLUTION ARCHITECTURE
Bloombase StoreSafe data at-rest encryption solution offers wirespeed, on-the-fly encryption and un-encryption of storage data in EMC
VNX network-attached storage (NAS) system. It requires minimum
change in application tier by dropping-in Bloombase StoreSafe software appliances in the storage paths.
Bloombase High Availability brings together multiple nodes of Bloombase software appliances as a cluster so when master node fails,
slave nodes pick up and maintain non-stop, mission-critical service at
complete storage host transparency, requiring minimal operator attention. Extending to disaster recovery infrastructure, storage ciphertexts at the primary site are replicated in their natural encryption form
over private network to backup storage system at secondary site, and
secured by a replica of Bloombase StoreSafe and KeyCastle clusters.
As storage contents reside on EMC VNX in their native ciphered form,
data backup done over physical storage resources is inherently encrypted, satisfying secure archival needs immediately.
The easy-to-manage Bloombase StoreSafe storage encryption solution helps organizational customers enforce data confidentiality for
storage, which improves overall system security, enables fast key
rotation, reduces user workflows, segregates data ownership from
administration and operation, and enhances efficiency and internal
controls.

RESULTS

 For TPC-C queries, Bloombase StoreSafe-encrypted database server stored in EMC VNX recorded a 9 percent drop in throughput,
compared to 31 percent for host-based and 64 percent for data
column-level
 For TPC-C inserts and updates, Bloombase StoreSafe encrypted
database stored in EMC VNX recorded a 12 percent drop in
throughput, compared to 53 percent for host-based and 59 percent
for column-level

CONCLUSION
 Write-speed encryption performance with least degradation in
storage I/O and throughput

 Turnkey and proven solution for immediate compliance to stringent
information confidentiality regulatory compliance requirements

 No application change or second development needed
 Fast deployment and automated migration versus alternatives’
manual script-based migration approach

 FCP/iSCSI block-based and NFS/CIFS file-based encryption in a
single solution

 Highly secure NIST FIPS 140-2 and IEEE 1619 standard
 High availability and fault-tolerant
 Low total cost of ownership (TCO)

ABOUT BLOOMBASE
Bloombase is a worldwide provider and leading innovator in Next
Generation Data Security from Physical/Virtual Datacenter, through
Big Data and to the Cloud. Bloombase provides turnkey, nondisruptive, defense in-depth data protection against dynamic cyber
threats while simplifying the IT security infrastructure. Bloombase is
the trusted standard for Global 500-scale organizations that have
zero tolerance policy for security breaches. For more information, visit
www.bloombase.com.

ABOUT EMC
 A TPC-C-based database benchmark test is carried out on a sample
database stored in an EMC VNX secured by Bloombase StoreSafe
storage encryption software appliance
 TPC-C-like queries (with EMC VNX read, Bloombase StoreSafe unencryption) and updates (with VNX write, Bloombase StoreSafe
encryption) are generated and applied to simulate workload on
EMC VNX/Bloombase StoreSafe setup

EMC Corporation is the world’s leading developer and provider of
information infrastructure technology and solutions that enable organizations of all sizes to transform the way they compete and create
value from their information. Information about EMC’s products and
services can be found at www.EMC.com.

EMC, VNX, the EMC logo, and where information lives are registered trademarks or trademakrs of EMC Corporation in the United States and other countries. All other trademarks used herein are the
property of their respective owners. Copyright 2011 EMC Corporation. All rights reserved. Published in the USA. 01/11 Solution Overview H8568

EMC Corporation
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.EMC.com

Contenu connexe

Tendances

A Comparison of IBM’s New Flex System Environment to Traditional Blade Archit...
A Comparison of IBM’s New Flex System Environment to Traditional Blade Archit...A Comparison of IBM’s New Flex System Environment to Traditional Blade Archit...
A Comparison of IBM’s New Flex System Environment to Traditional Blade Archit...IBM India Smarter Computing
 
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)Antonella Rubicco
 
TECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackup
TECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackupTECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackup
TECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackupSymantec
 
Vnx mr presentation kenny pool
Vnx mr presentation kenny poolVnx mr presentation kenny pool
Vnx mr presentation kenny poolEMC Nederland
 
Alluxio: Unify Data at Memory Speed
Alluxio: Unify Data at Memory SpeedAlluxio: Unify Data at Memory Speed
Alluxio: Unify Data at Memory SpeedAlluxio, Inc.
 
vProtect - enterprise-grade Nutanix backup & recovery
vProtect - enterprise-grade Nutanix backup & recoveryvProtect - enterprise-grade Nutanix backup & recovery
vProtect - enterprise-grade Nutanix backup & recoveryPawel Maczka
 
Interview operating system solaris
Interview operating system solarisInterview operating system solaris
Interview operating system solarisPajana Load
 
EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...
EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...
EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...Principled Technologies
 
Trio nas qsan storage
Trio nas qsan storageTrio nas qsan storage
Trio nas qsan storageJinesh Joseph
 
SME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for ScalitySME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for ScalityHybrid Cloud
 
EMC FAST VP for Unified Storage Systems
EMC FAST VP for Unified Storage Systems EMC FAST VP for Unified Storage Systems
EMC FAST VP for Unified Storage Systems EMC
 
Barracuda Backup Service - English Presentation
Barracuda Backup Service - English PresentationBarracuda Backup Service - English Presentation
Barracuda Backup Service - English PresentationStéphane Gilliers
 
Red Hat Storage combined with Commvault Simpana
Red Hat Storage combined with Commvault SimpanaRed Hat Storage combined with Commvault Simpana
Red Hat Storage combined with Commvault SimpanaMarcel Hergaarden
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0 TTEC
 
Deploying Applications in Today’s Network Infrastructure
Deploying Applications in Today’s Network InfrastructureDeploying Applications in Today’s Network Infrastructure
Deploying Applications in Today’s Network InfrastructureCisco Canada
 
Introduction to the EMC XtremIO All-Flash Array
Introduction to the EMC XtremIO All-Flash ArrayIntroduction to the EMC XtremIO All-Flash Array
Introduction to the EMC XtremIO All-Flash ArrayEMC
 
M. Rafaat_EMC_Presentation
M. Rafaat_EMC_PresentationM. Rafaat_EMC_Presentation
M. Rafaat_EMC_PresentationMohamed Raafat
 

Tendances (20)

A Comparison of IBM’s New Flex System Environment to Traditional Blade Archit...
A Comparison of IBM’s New Flex System Environment to Traditional Blade Archit...A Comparison of IBM’s New Flex System Environment to Traditional Blade Archit...
A Comparison of IBM’s New Flex System Environment to Traditional Blade Archit...
 
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
FORTISSIMO Foundation Hyper-converged Storage System (NO technical overview)
 
TECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackup
TECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackupTECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackup
TECHNICAL WHITE PAPER▶Protect Your Cisco UCS Domain with Symantec NetBackup
 
Vnx mr presentation kenny pool
Vnx mr presentation kenny poolVnx mr presentation kenny pool
Vnx mr presentation kenny pool
 
Alluxio: Unify Data at Memory Speed
Alluxio: Unify Data at Memory SpeedAlluxio: Unify Data at Memory Speed
Alluxio: Unify Data at Memory Speed
 
vProtect - enterprise-grade Nutanix backup & recovery
vProtect - enterprise-grade Nutanix backup & recoveryvProtect - enterprise-grade Nutanix backup & recovery
vProtect - enterprise-grade Nutanix backup & recovery
 
Emc storag
Emc storagEmc storag
Emc storag
 
Sklm webinar
Sklm webinarSklm webinar
Sklm webinar
 
Interview operating system solaris
Interview operating system solarisInterview operating system solaris
Interview operating system solaris
 
EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...
EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...
EMC XtremIO storage array 4.0 and VMware vSphere 6.0: Scaling mixed-database ...
 
Trio nas qsan storage
Trio nas qsan storageTrio nas qsan storage
Trio nas qsan storage
 
SME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for ScalitySME Providing an Enterprise File Fabric™ for Scality
SME Providing an Enterprise File Fabric™ for Scality
 
EMC FAST VP for Unified Storage Systems
EMC FAST VP for Unified Storage Systems EMC FAST VP for Unified Storage Systems
EMC FAST VP for Unified Storage Systems
 
Barracuda Backup Service - English Presentation
Barracuda Backup Service - English PresentationBarracuda Backup Service - English Presentation
Barracuda Backup Service - English Presentation
 
Red Hat Storage combined with Commvault Simpana
Red Hat Storage combined with Commvault SimpanaRed Hat Storage combined with Commvault Simpana
Red Hat Storage combined with Commvault Simpana
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0
 
Deploying Applications in Today’s Network Infrastructure
Deploying Applications in Today’s Network InfrastructureDeploying Applications in Today’s Network Infrastructure
Deploying Applications in Today’s Network Infrastructure
 
Introduction to the EMC XtremIO All-Flash Array
Introduction to the EMC XtremIO All-Flash ArrayIntroduction to the EMC XtremIO All-Flash Array
Introduction to the EMC XtremIO All-Flash Array
 
Emc
EmcEmc
Emc
 
M. Rafaat_EMC_Presentation
M. Rafaat_EMC_PresentationM. Rafaat_EMC_Presentation
M. Rafaat_EMC_Presentation
 

En vedette

Bladder disorders(neurogenic)
 Bladder disorders(neurogenic) Bladder disorders(neurogenic)
Bladder disorders(neurogenic)anil kumar g
 
Hard water and the consumer: The Hidden Costs of Hard Water
Hard water and the consumer: The Hidden Costs of Hard WaterHard water and the consumer: The Hidden Costs of Hard Water
Hard water and the consumer: The Hidden Costs of Hard WaterDan Garard
 
Preimplantation genetic screening (pgs) current ppt2
Preimplantation genetic screening (pgs)  current     ppt2Preimplantation genetic screening (pgs)  current     ppt2
Preimplantation genetic screening (pgs) current ppt2鋒博 蔡
 
Fun Activities to Improve English Pronunciation
Fun Activities to Improve English PronunciationFun Activities to Improve English Pronunciation
Fun Activities to Improve English PronunciationSylvia Rivera
 
Input Output Management In C Programming
Input Output Management In C ProgrammingInput Output Management In C Programming
Input Output Management In C ProgrammingKamal Acharya
 
Magic of Values AIESEC Y2B 2012 - Phil Clothier
Magic of Values AIESEC Y2B 2012 - Phil ClothierMagic of Values AIESEC Y2B 2012 - Phil Clothier
Magic of Values AIESEC Y2B 2012 - Phil ClothierPhil Clothier
 
Measuring schools and further education and skills providers on learners’ emp...
Measuring schools and further education and skills providers on learners’ emp...Measuring schools and further education and skills providers on learners’ emp...
Measuring schools and further education and skills providers on learners’ emp...Ofsted
 
Is it in Us - Chemical Contamination in Our Bodies
Is it in Us - Chemical Contamination in Our Bodies Is it in Us - Chemical Contamination in Our Bodies
Is it in Us - Chemical Contamination in Our Bodies v2zq
 
WebliografíA08 09
WebliografíA08 09WebliografíA08 09
WebliografíA08 09jmaq1997
 
Pgr insurance idcard
Pgr insurance idcardPgr insurance idcard
Pgr insurance idcardGreg in SD
 
A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013
A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013
A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013Amazon Web Services
 
Building self discipline in our students
Building self discipline in our studentsBuilding self discipline in our students
Building self discipline in our studentskkgmom03
 
Cetuximab treatment in a patient with metastatic colorectal
Cetuximab treatment in a patient with metastatic colorectalCetuximab treatment in a patient with metastatic colorectal
Cetuximab treatment in a patient with metastatic colorectaleman youssif
 
13.상관과 회귀
13.상관과 회귀13.상관과 회귀
13.상관과 회귀Yoonwhan Lee
 

En vedette (20)

Naver vs daum - 정구승
Naver vs daum - 정구승Naver vs daum - 정구승
Naver vs daum - 정구승
 
Bladder disorders(neurogenic)
 Bladder disorders(neurogenic) Bladder disorders(neurogenic)
Bladder disorders(neurogenic)
 
Hard water and the consumer: The Hidden Costs of Hard Water
Hard water and the consumer: The Hidden Costs of Hard WaterHard water and the consumer: The Hidden Costs of Hard Water
Hard water and the consumer: The Hidden Costs of Hard Water
 
Preimplantation genetic screening (pgs) current ppt2
Preimplantation genetic screening (pgs)  current     ppt2Preimplantation genetic screening (pgs)  current     ppt2
Preimplantation genetic screening (pgs) current ppt2
 
Fun Activities to Improve English Pronunciation
Fun Activities to Improve English PronunciationFun Activities to Improve English Pronunciation
Fun Activities to Improve English Pronunciation
 
B13 Investigating oracle by Julian Dyke
B13 Investigating oracle by Julian DykeB13 Investigating oracle by Julian Dyke
B13 Investigating oracle by Julian Dyke
 
Input Output Management In C Programming
Input Output Management In C ProgrammingInput Output Management In C Programming
Input Output Management In C Programming
 
Magic of Values AIESEC Y2B 2012 - Phil Clothier
Magic of Values AIESEC Y2B 2012 - Phil ClothierMagic of Values AIESEC Y2B 2012 - Phil Clothier
Magic of Values AIESEC Y2B 2012 - Phil Clothier
 
Measuring schools and further education and skills providers on learners’ emp...
Measuring schools and further education and skills providers on learners’ emp...Measuring schools and further education and skills providers on learners’ emp...
Measuring schools and further education and skills providers on learners’ emp...
 
final 26 september named
final 26 september namedfinal 26 september named
final 26 september named
 
Is it in Us - Chemical Contamination in Our Bodies
Is it in Us - Chemical Contamination in Our Bodies Is it in Us - Chemical Contamination in Our Bodies
Is it in Us - Chemical Contamination in Our Bodies
 
WebliografíA08 09
WebliografíA08 09WebliografíA08 09
WebliografíA08 09
 
Pgr insurance idcard
Pgr insurance idcardPgr insurance idcard
Pgr insurance idcard
 
A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013
A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013
A Day in the Life of a Billion Packets (CPN401) | AWS re:Invent 2013
 
BSL Research Report
BSL Research ReportBSL Research Report
BSL Research Report
 
Building self discipline in our students
Building self discipline in our studentsBuilding self discipline in our students
Building self discipline in our students
 
Cornish Pasty
Cornish PastyCornish Pasty
Cornish Pasty
 
Cetuximab treatment in a patient with metastatic colorectal
Cetuximab treatment in a patient with metastatic colorectalCetuximab treatment in a patient with metastatic colorectal
Cetuximab treatment in a patient with metastatic colorectal
 
Hong Kong in the 1950's
Hong Kong in the 1950'sHong Kong in the 1950's
Hong Kong in the 1950's
 
13.상관과 회귀
13.상관과 회귀13.상관과 회귀
13.상관과 회귀
 

Similaire à Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-vnx-vn xe-uslet-en-r2

H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewBloombase
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewBloombase
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
SMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution BriefSMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution BriefHybrid Cloud
 
Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400RaGaZoMe
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMwareJJDiGeronimo
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
Bloombase sb pc_11.18_s_bedits_sd - final r6
Bloombase sb pc_11.18_s_bedits_sd - final r6Bloombase sb pc_11.18_s_bedits_sd - final r6
Bloombase sb pc_11.18_s_bedits_sd - final r6Bloombase
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase
 

Similaire à Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-vnx-vn xe-uslet-en-r2 (20)

H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
SMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution BriefSMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution Brief
 
Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
emc world keynote gelsinger
emc world keynote gelsinger emc world keynote gelsinger
emc world keynote gelsinger
 
Bloombase sb pc_11.18_s_bedits_sd - final r6
Bloombase sb pc_11.18_s_bedits_sd - final r6Bloombase sb pc_11.18_s_bedits_sd - final r6
Bloombase sb pc_11.18_s_bedits_sd - final r6
 
EMC VNX
EMC VNXEMC VNX
EMC VNX
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4
 

Plus de Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Bloombase
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usenBloombase
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletBloombase
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-editionBloombase
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Bloombase
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiBloombase
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyerBloombase
 

Plus de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbooklet
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-edition
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyer
 

Dernier

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-vnx-vn xe-uslet-en-r2

  • 1. BLOOMBASE TURNKEY DATA-AT-REST SECURITY COMPLIANCE SOLUTION FOR EMC VNX/VNXe ESSENTIALS  Bloombase StoreSafe is an industryproven solution for immediate security compliance of various standards including HIPAA, PCI DSS, SB 1386, SOX, and more  Bundled Bloombase KeyCastle enables automated initial migration of EMC VNX contents, rekey, and full lifecycle management of cryptographic keys  Web-based management console, command line interface console, and SNMP offer total, simplified management  Unlike proprietary hardware with high entry price, Bloombase StoreSafe offers a pay-as-you-go licensing model to help reduce your initial investment  To maximize ROI, Bloombase StoreSafe:  Enables multiple storage hosts and applications to produce and consume secured data at-rest   EMC VNX/VNXe WITH BLOOMBASE STORESAFE Electronic business data represents an invaluable core asset of today’s enterprises and organizations. Enterprise customers are concerned about being able to manage and use sensitive information to optimize day-to-day business operations, while protecting it and fulfilling information privacy compliance needs—with the expense of drastic infrastructure change and performance degradation. Bloombase StoreSafe data at-rest security solution offers advanced security capabilities for a reliable, application-transparent, cipher-text data storage infrastructure. Its tamper-proof hardware encryption key security module ensures confidentiality and integrity throughout its whole lifecycle. Bloombase Cryptographic Module is NIST FIPS 140-2 certified providing FIPS-approved RSA and AES cryptographic algorithms, along with non-FIPS ciphers including Camellia, SEED, ARIA, Twofish, Blowfish, etc. Sensitive persistent data is stored as cipher-text securely stored in EMC VNX. The encryption and un-encryption processes are automated by re-routing storage paths via Bloombase StoreSafe software appliance delivering virtual plain contents to authorized hosts and applications. EMC VNX storage targets are accessed by FCP, iSCSI, CIFS and/or NFS storage protocols via Bloombase StoreSafe. Ciphered sensitive information is stored in EMC VNX storage system for centralized management. Only authorized access of virtual-plain information, by trusted applications and systems, per access rules and security profiles secured by Bloombase StoreSafe is Bloombase KeyCastle operator smart-token Active cluster Bloombase KeyCastle Key Management Server Cluster Supports multiple EMC VNX LUNs, file service resources, and shares Microsoft SQL Server on Microsoft Windows Server 2003 On i386 appliance Primary site Bloombase StoreSafe Security Server Cluster Supports both file– and block-based protection for CIFS, NFS, iSCSI, FCP EMC VNX storage resources Microsoft Exchange on Microsoft Windows Server 2003 On i386 appliance Switch (active) Standby cluster Microsoft SQL Server on Microsoft Windows Server 2003 On i386 appliance Microsoft Exchange on Microsoft Windows Server 2003 On i386 appliance X&*^2 3#$(+ EMC VNX storing Microsoft SQLServer database and application data files Switch (standby) X&*^2 3#$(+ VTL Secondary site VPN Microsoft SQL Server on Microsoft Windows Server 2003 On i386 appliance X&*^2 3#$(+ Microsoft Exchange on Microsoft Windows Server 2003 On i386 appliance EMC VNX storing Microsoft SQLServer database and application data files Bloombase KeyCastle operator smart-token Bloombase StoreSafe Security Server Cluster Ethernet Network Storage Network Bloombase KeyCastle Key Management Server Cluster SOLUTION OVERVIEW
  • 2. permitted. Application data files, shares, and storage volumes are protected by strong encryption offered by Bloombase StoreSafe virtual storages, enabling application servers to achieve various information privacy compliance standards immediately and costeffectively. SOLUTION ARCHITECTURE Bloombase StoreSafe data at-rest encryption solution offers wirespeed, on-the-fly encryption and un-encryption of storage data in EMC VNX network-attached storage (NAS) system. It requires minimum change in application tier by dropping-in Bloombase StoreSafe software appliances in the storage paths. Bloombase High Availability brings together multiple nodes of Bloombase software appliances as a cluster so when master node fails, slave nodes pick up and maintain non-stop, mission-critical service at complete storage host transparency, requiring minimal operator attention. Extending to disaster recovery infrastructure, storage ciphertexts at the primary site are replicated in their natural encryption form over private network to backup storage system at secondary site, and secured by a replica of Bloombase StoreSafe and KeyCastle clusters. As storage contents reside on EMC VNX in their native ciphered form, data backup done over physical storage resources is inherently encrypted, satisfying secure archival needs immediately. The easy-to-manage Bloombase StoreSafe storage encryption solution helps organizational customers enforce data confidentiality for storage, which improves overall system security, enables fast key rotation, reduces user workflows, segregates data ownership from administration and operation, and enhances efficiency and internal controls. RESULTS  For TPC-C queries, Bloombase StoreSafe-encrypted database server stored in EMC VNX recorded a 9 percent drop in throughput, compared to 31 percent for host-based and 64 percent for data column-level  For TPC-C inserts and updates, Bloombase StoreSafe encrypted database stored in EMC VNX recorded a 12 percent drop in throughput, compared to 53 percent for host-based and 59 percent for column-level CONCLUSION  Write-speed encryption performance with least degradation in storage I/O and throughput  Turnkey and proven solution for immediate compliance to stringent information confidentiality regulatory compliance requirements  No application change or second development needed  Fast deployment and automated migration versus alternatives’ manual script-based migration approach  FCP/iSCSI block-based and NFS/CIFS file-based encryption in a single solution  Highly secure NIST FIPS 140-2 and IEEE 1619 standard  High availability and fault-tolerant  Low total cost of ownership (TCO) ABOUT BLOOMBASE Bloombase is a worldwide provider and leading innovator in Next Generation Data Security from Physical/Virtual Datacenter, through Big Data and to the Cloud. Bloombase provides turnkey, nondisruptive, defense in-depth data protection against dynamic cyber threats while simplifying the IT security infrastructure. Bloombase is the trusted standard for Global 500-scale organizations that have zero tolerance policy for security breaches. For more information, visit www.bloombase.com. ABOUT EMC  A TPC-C-based database benchmark test is carried out on a sample database stored in an EMC VNX secured by Bloombase StoreSafe storage encryption software appliance  TPC-C-like queries (with EMC VNX read, Bloombase StoreSafe unencryption) and updates (with VNX write, Bloombase StoreSafe encryption) are generated and applied to simulate workload on EMC VNX/Bloombase StoreSafe setup EMC Corporation is the world’s leading developer and provider of information infrastructure technology and solutions that enable organizations of all sizes to transform the way they compete and create value from their information. Information about EMC’s products and services can be found at www.EMC.com. EMC, VNX, the EMC logo, and where information lives are registered trademarks or trademakrs of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. Copyright 2011 EMC Corporation. All rights reserved. Published in the USA. 01/11 Solution Overview H8568 EMC Corporation Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.EMC.com