SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
S O L U T I O N O V E R V I E W | 1
BLOOMBASE STORESAFE
INTELLIGENT STORAGE FIREWALL
Safeguarding Crown Jewels from Data Breach
for Virtual Data Center and Hybrid Cloud
S O L U T I O N O V E R V I E W
The Increasing Complexity of Mitigating
Catastrophic Data Exposure Vulnerabilities
For any large-scale organization, data leakage remains a critical, yet unresolved
problem. The causes can be both intentional (hardware theft, cyberattack, espionage
and so on) and unintentional (media loss, buggy application, and so on). The
unbridled rate at which businesses are taking advantage of cloud computing is only
going to exacerbate the problem: Increased risk of information exfiltration regardless
the number of network defenses in place.
A paradigm shift in the approach to data storage management is evident: There has
been a move away from structured to unstructured data, resulting in spreading out of
crown jewels to virtually every dataset. There is also a concomitant change in the way
stored data is managed: from on-premises storage systems to datasources in
virtualization and cloud storage services. Despite encryption of data-at-rest as an
effective measure assuring the last line of defense in event of data breach, the
increased sophistication of cyberattacks targeting at the heterogeneous datacenter
environment renders traditional database encryption tools and encryption hardware
inadequate, if not useless.
Bloombase StoreSafe for VMware Cloud on AWS
Simplifies Data-at-Rest Protection for High
Security Cloud Computing
Bloombase StoreSafe intelligent storage firewall provides automatic protection of data-
at-rest for workloads running on VMware Cloud on AWS enabling business-critical
applications and invaluable crown jewels to be migrated to the cloud seamlessly and
securely. The solution addresses intensifying cyberattack challenges, supports
evolving datacenter transformation, and helps accelerate adoption of cloud computing
model for mission-critical applications.
VMware Cloud on AWS enables customers to run, manage and secure applications in
a production-ready, simple and consistent hybrid IT environment. The service enables
organizations to continue using existing VMware tools to manage VMware Cloud on
AWS environments without having to purchase custom hardware, rewrite applications,
or modify their operating model. With access to the broad range of AWS services, and
the functionality, elasticity, and security customers have come to expect from the AWS
Cloud, the service lays the foundation to run, manage and secure production
applications across vSphere®-based private, public and hybrid cloud environments
with access to innovative AWS services.
VMware Cloud on AWS Key Benefits
• Unified and operationally consistent hybrid cloud experience across vSphere-
based private clouds and VMware Cloud on AWS
• Workload portability and flexible consumption options with single support owner
and attractive TCO
• Familiar management tools eliminate the need to retrain staff (vCenter, vSphere
Bringing together best-of-
breed technologies and
capabilities that create a
seamless and flexible
hybrid cloud future for
customers, VMware and AWS
enable services that easily
grow and evolve as
enterprise needs change.
Whether expanding services
on-premises or in the
public cloud, the VMware
Cloud on AWS eliminates the
need to make changes to
operating models or
architectures. The result
is the most flexible
approach to evolving
enterprise cloud strategies
to keep pace with digital
transformation. driving
business environments.
VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com
Copyright © 2017 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a
registered trademark or trademark of VMware, Inc. and its subsidiaries in the United States and other jurisdictions. All other marks
and names mentioned herein may be trademarks of their respective companies.
BLOOMBASE STORESAFE INTELLIGENT STORAGE FIREWALL
API, PowerCLI and modern HTML5-based vSphere Client)
• VMware-delivered service creates zero lifecycle management while enabling
customers to retain control of application management and operation
• Lays the foundation for integration of 3rd party tools from leading ecosystem
partners.
Partner Solution Overview
Bloombase StoreSafe is an agentless, turnkey, application-transparent, high
performance unified stored data security solution which automatically discovers crown
jewels and locks them down proactively with a non-disruptive deployment approach:
protocol preserving with no operational change to application infrastructure nor daily
operations. Bloombase StoreSafe works almost like a firewall in the storage network
environment for trusted hosts in forms of virtual machine (VM) or cloud compute
instance providing encryption as software applications write, and unencrypting as they
read. Unlike traditional data encryption tools which require hardware retrofitting and
expensive software upgrades, the Bloombase solution operates as a holistic security
virtual appliance with an expansive reach over heterogeneous storage protocols (FCP,
iSCSI, NFS, SMB, CIFS, S3, REST, and so on) for both on-premises VMware
vSphere and off-premises VMware Cloud on AWS.
Leveraging optional Amazon CloudHSM and KMS for centralized key management,
not only Bloombase StoreSafe secures VM disks and vSAN-backed datastores, but
also cloud storage services including Amazon Elastic File System (EFS), Simple
Storage Service (S3) and Elastic Block Store (EBS). Bloombase’s software-defined
architecture is future-proofed to meet infrastructure changes through scalability and
flexibility to deliver secure data services for hyperconverged infrastructure (HCI),
private, hybrid and public cloud. As an independent add-on software, Bloombase
delivers security,
integrity and helps
maintain true separation
of duties, enabling
organizations to meet
data privacy regulatory
compliance mandates
(GDPR, PCI DSS,
HIPAA, PDPL, and so
on) easily and cost-
effectively.
Figure 1: Bloombase StoreSafe
for VMware Cloud on AWS
data-at-rest security solution
provides turnkey encryption to
help organizations meet data
confidentiality regulatory
compliance requirements
PARTNER SOLUTION BENEFITS
Security Hardened Cloud
Computing
Automates security protection of
data to lower the risk and impact
of data breach with a unified line
of defense from virtual datacenter
to the cloud
Platform Agnostic and Open
Offers multi-tenancy security of
data-at-rest for any software
applications, OSes, storage
protocols and datacenter
infrastructure technologies
requiring no proprietary hardware
Operational Transparent
Provides scalable and flexible
application-transparent data-at-
rest security protection with zero
workflow change to administrators,
operations and end users
Security Proven
Mitigates data leakage
vulnerabilities by delivering
cryptographic services certified at
NIST FIPS 140-2 industry standard
Centralized Key Management
Integrates with optional OASIS KMIP
key managers, PKCS#11 HSMs, Amazon
CloudHSM and KMS for centralized
lifecycle key management
Simplified Compliance
Protects sensitive data-at-rest,
and helps enable compliance with
data privacy and security
regulations with clear audit
visibility
LEARN MORE
For more information, visit
https://marketplace.vmware.com/vsx/
solutions/bloombase-storesafe-
security-server
and
https://www.bloombase.com
VM
Applications on
VMware VMs
Read and Unencrypt
Write and Encrypt
Clear
text
Header
Trailer
Cleartext
Header
Trailer
^$8Yn+=Q~
Bloombase
StoreSafe VM on
VMware
S3 Object
EFS File
Amazon Elastic
File System (EFS)
Amazon Simple
Storage Service (S3)
^$8Yn
+=@~
^$8Yn
+=@~
Amazon
CloudHSM
.
Amazon
KMS
EBS
Volume
Amazon Elastic
Block Store (EBS)
^$8Yn
+=@~

Contenu connexe

Tendances

DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
Denis Gundarev
 
CloudIUSPresentation v2
CloudIUSPresentation v2CloudIUSPresentation v2
CloudIUSPresentation v2
Dani Glazman
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
Abhijit Kundu
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
guest536dd0e
 
Presentation enterprise cloud & v clouddatacenter
Presentation   enterprise cloud & v clouddatacenterPresentation   enterprise cloud & v clouddatacenter
Presentation enterprise cloud & v clouddatacenter
xKinAnx
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
Gabor Bokor
 
IAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperIAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive Mapper
Alastair Orlando
 

Tendances (20)

DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
 
Microsoft System Center 2012 Overview
Microsoft System Center 2012 OverviewMicrosoft System Center 2012 Overview
Microsoft System Center 2012 Overview
 
Hostingcon 2010 Cloud Presentation
Hostingcon 2010 Cloud PresentationHostingcon 2010 Cloud Presentation
Hostingcon 2010 Cloud Presentation
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Digital Asset Management with ES4
Digital Asset Management with ES4Digital Asset Management with ES4
Digital Asset Management with ES4
 
CloudIUSPresentation v2
CloudIUSPresentation v2CloudIUSPresentation v2
CloudIUSPresentation v2
 
Azure Hybid
Azure HybidAzure Hybid
Azure Hybid
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services Platform
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Presentation enterprise cloud & v clouddatacenter
Presentation   enterprise cloud & v clouddatacenterPresentation   enterprise cloud & v clouddatacenter
Presentation enterprise cloud & v clouddatacenter
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
 
VersaStack brochure
VersaStack brochureVersaStack brochure
VersaStack brochure
 
DAM 2018 Review, What's next 2019 ?
DAM 2018 Review, What's next 2019 ?DAM 2018 Review, What's next 2019 ?
DAM 2018 Review, What's next 2019 ?
 
TechNet Event: August 2011 Private Cloud
TechNet Event: August 2011 Private CloudTechNet Event: August 2011 Private Cloud
TechNet Event: August 2011 Private Cloud
 
IAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperIAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive Mapper
 
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
 

Similaire à Bloombase sb pc_11.18_s_bedits_sd - final r4

Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
white paper
 
SDE Solution Overview v1.5
SDE Solution Overview v1.5SDE Solution Overview v1.5
SDE Solution Overview v1.5
Joe Kaluza
 

Similaire à Bloombase sb pc_11.18_s_bedits_sd - final r4 (20)

zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
 
How to resolve the cloud migration dilemma with VMware investment_.pdf
How to resolve the cloud migration dilemma with VMware investment_.pdfHow to resolve the cloud migration dilemma with VMware investment_.pdf
How to resolve the cloud migration dilemma with VMware investment_.pdf
 
SDE Solution Overview v1.5
SDE Solution Overview v1.5SDE Solution Overview v1.5
SDE Solution Overview v1.5
 
Best Cloud hosting provider in India | MilesWeb
Best Cloud hosting provider in India | MilesWebBest Cloud hosting provider in India | MilesWeb
Best Cloud hosting provider in India | MilesWeb
 
vSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinavSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek Bražina
 
cloud Raid
cloud Raidcloud Raid
cloud Raid
 
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
 
Hitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeHitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafe
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
Security Innovations in the Cloud
Security Innovations in the CloudSecurity Innovations in the Cloud
Security Innovations in the Cloud
 
Bigfix Multicloud Management
Bigfix Multicloud ManagementBigfix Multicloud Management
Bigfix Multicloud Management
 
Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2
 
Private Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | SysforePrivate Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | Sysfore
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any Business
 
How Cloud Infrastructure Automation Benefits Organizations.pdf
How Cloud Infrastructure Automation Benefits Organizations.pdfHow Cloud Infrastructure Automation Benefits Organizations.pdf
How Cloud Infrastructure Automation Benefits Organizations.pdf
 

Plus de Bloombase

Plus de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Bloombase sb pc_11.18_s_bedits_sd - final r4

  • 1. S O L U T I O N O V E R V I E W | 1 BLOOMBASE STORESAFE INTELLIGENT STORAGE FIREWALL Safeguarding Crown Jewels from Data Breach for Virtual Data Center and Hybrid Cloud S O L U T I O N O V E R V I E W The Increasing Complexity of Mitigating Catastrophic Data Exposure Vulnerabilities For any large-scale organization, data leakage remains a critical, yet unresolved problem. The causes can be both intentional (hardware theft, cyberattack, espionage and so on) and unintentional (media loss, buggy application, and so on). The unbridled rate at which businesses are taking advantage of cloud computing is only going to exacerbate the problem: Increased risk of information exfiltration regardless the number of network defenses in place. A paradigm shift in the approach to data storage management is evident: There has been a move away from structured to unstructured data, resulting in spreading out of crown jewels to virtually every dataset. There is also a concomitant change in the way stored data is managed: from on-premises storage systems to datasources in virtualization and cloud storage services. Despite encryption of data-at-rest as an effective measure assuring the last line of defense in event of data breach, the increased sophistication of cyberattacks targeting at the heterogeneous datacenter environment renders traditional database encryption tools and encryption hardware inadequate, if not useless. Bloombase StoreSafe for VMware Cloud on AWS Simplifies Data-at-Rest Protection for High Security Cloud Computing Bloombase StoreSafe intelligent storage firewall provides automatic protection of data- at-rest for workloads running on VMware Cloud on AWS enabling business-critical applications and invaluable crown jewels to be migrated to the cloud seamlessly and securely. The solution addresses intensifying cyberattack challenges, supports evolving datacenter transformation, and helps accelerate adoption of cloud computing model for mission-critical applications. VMware Cloud on AWS enables customers to run, manage and secure applications in a production-ready, simple and consistent hybrid IT environment. The service enables organizations to continue using existing VMware tools to manage VMware Cloud on AWS environments without having to purchase custom hardware, rewrite applications, or modify their operating model. With access to the broad range of AWS services, and the functionality, elasticity, and security customers have come to expect from the AWS Cloud, the service lays the foundation to run, manage and secure production applications across vSphere®-based private, public and hybrid cloud environments with access to innovative AWS services. VMware Cloud on AWS Key Benefits • Unified and operationally consistent hybrid cloud experience across vSphere- based private clouds and VMware Cloud on AWS • Workload portability and flexible consumption options with single support owner and attractive TCO • Familiar management tools eliminate the need to retrain staff (vCenter, vSphere Bringing together best-of- breed technologies and capabilities that create a seamless and flexible hybrid cloud future for customers, VMware and AWS enable services that easily grow and evolve as enterprise needs change. Whether expanding services on-premises or in the public cloud, the VMware Cloud on AWS eliminates the need to make changes to operating models or architectures. The result is the most flexible approach to evolving enterprise cloud strategies to keep pace with digital transformation. driving business environments.
  • 2. VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com Copyright © 2017 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. and its subsidiaries in the United States and other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. BLOOMBASE STORESAFE INTELLIGENT STORAGE FIREWALL API, PowerCLI and modern HTML5-based vSphere Client) • VMware-delivered service creates zero lifecycle management while enabling customers to retain control of application management and operation • Lays the foundation for integration of 3rd party tools from leading ecosystem partners. Partner Solution Overview Bloombase StoreSafe is an agentless, turnkey, application-transparent, high performance unified stored data security solution which automatically discovers crown jewels and locks them down proactively with a non-disruptive deployment approach: protocol preserving with no operational change to application infrastructure nor daily operations. Bloombase StoreSafe works almost like a firewall in the storage network environment for trusted hosts in forms of virtual machine (VM) or cloud compute instance providing encryption as software applications write, and unencrypting as they read. Unlike traditional data encryption tools which require hardware retrofitting and expensive software upgrades, the Bloombase solution operates as a holistic security virtual appliance with an expansive reach over heterogeneous storage protocols (FCP, iSCSI, NFS, SMB, CIFS, S3, REST, and so on) for both on-premises VMware vSphere and off-premises VMware Cloud on AWS. Leveraging optional Amazon CloudHSM and KMS for centralized key management, not only Bloombase StoreSafe secures VM disks and vSAN-backed datastores, but also cloud storage services including Amazon Elastic File System (EFS), Simple Storage Service (S3) and Elastic Block Store (EBS). Bloombase’s software-defined architecture is future-proofed to meet infrastructure changes through scalability and flexibility to deliver secure data services for hyperconverged infrastructure (HCI), private, hybrid and public cloud. As an independent add-on software, Bloombase delivers security, integrity and helps maintain true separation of duties, enabling organizations to meet data privacy regulatory compliance mandates (GDPR, PCI DSS, HIPAA, PDPL, and so on) easily and cost- effectively. Figure 1: Bloombase StoreSafe for VMware Cloud on AWS data-at-rest security solution provides turnkey encryption to help organizations meet data confidentiality regulatory compliance requirements PARTNER SOLUTION BENEFITS Security Hardened Cloud Computing Automates security protection of data to lower the risk and impact of data breach with a unified line of defense from virtual datacenter to the cloud Platform Agnostic and Open Offers multi-tenancy security of data-at-rest for any software applications, OSes, storage protocols and datacenter infrastructure technologies requiring no proprietary hardware Operational Transparent Provides scalable and flexible application-transparent data-at- rest security protection with zero workflow change to administrators, operations and end users Security Proven Mitigates data leakage vulnerabilities by delivering cryptographic services certified at NIST FIPS 140-2 industry standard Centralized Key Management Integrates with optional OASIS KMIP key managers, PKCS#11 HSMs, Amazon CloudHSM and KMS for centralized lifecycle key management Simplified Compliance Protects sensitive data-at-rest, and helps enable compliance with data privacy and security regulations with clear audit visibility LEARN MORE For more information, visit https://marketplace.vmware.com/vsx/ solutions/bloombase-storesafe- security-server and https://www.bloombase.com VM Applications on VMware VMs Read and Unencrypt Write and Encrypt Clear text Header Trailer Cleartext Header Trailer ^$8Yn+=Q~ Bloombase StoreSafe VM on VMware S3 Object EFS File Amazon Elastic File System (EFS) Amazon Simple Storage Service (S3) ^$8Yn +=@~ ^$8Yn +=@~ Amazon CloudHSM . Amazon KMS EBS Volume Amazon Elastic Block Store (EBS) ^$8Yn +=@~