SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
S O L U T I O N O V E R V I E W | 1
BLOOMBASE STORESAFE
INTELLIGENT STORAGE FIREWALL
Safeguarding Crown Jewels from Data Breach
for Virtual Data Center and Hybrid Cloud
S O L U T I O N O V E R V I E W
The Increasing Complexity of Mitigating
Catastrophic Data Exposure Vulnerabilities
For any large-scale organization, data leakage remains a critical, yet unresolved
problem. The causes can be both intentional (hardware theft, cyberattack, espionage
and so on) and unintentional (media loss, buggy application, and so on). The
unbridled rate at which businesses are taking advantage of cloud computing is only
going to exacerbate the problem: Increased risk of information exfiltration regardless
the number of network defenses in place.
A paradigm shift in the approach to data storage management is evident: There has
been a move away from structured to unstructured data, resulting in spreading out of
crown jewels to virtually every dataset. There is also a concomitant change in the way
stored data is managed: from on-premises storage systems to datasources in
virtualization and cloud storage services. Despite encryption of data-at-rest as an
effective measure assuring the last line of defense in event of data breach, the
increased sophistication of cyberattacks targeting at the heterogeneous datacenter
environment renders traditional database encryption tools and encryption hardware
inadequate, if not useless.
Bloombase StoreSafe for VMware Cloud on AWS
Simplifies Data-at-Rest Protection for High
Security Cloud Computing
Bloombase StoreSafe intelligent storage firewall provides automatic protection of data-
at-rest for workloads running on VMware Cloud on AWS enabling business-critical
applications and invaluable crown jewels to be migrated to the cloud seamlessly and
securely. The solution addresses intensifying cyberattack challenges, supports
evolving datacenter transformation, and helps accelerate adoption of cloud computing
model for mission-critical applications.
VMware Cloud on AWS enables customers to run, manage and secure applications in
a production-ready, simple and consistent hybrid IT environment. The service enables
organizations to continue using existing VMware tools to manage VMware Cloud on
AWS environments without having to purchase custom hardware, rewrite applications,
or modify their operating model. With access to the broad range of AWS services, and
the functionality, elasticity, and security customers have come to expect from the AWS
Cloud, the service lays the foundation to run, manage and secure production
applications across vSphere®-based private, public and hybrid cloud environments
with access to innovative AWS services.
VMware Cloud on AWS Key Benefits
• Unified and operationally consistent hybrid cloud experience across vSphere-
based private clouds and VMware Cloud on AWS
• Workload portability and flexible consumption options with single support owner
and attractive TCO
• Familiar management tools eliminate the need to retrain staff (vCenter, vSphere
Bringing together best-of-
breed technologies and
capabilities that create a
seamless and flexible
hybrid cloud future for
customers, VMware and AWS
enable services that easily
grow and evolve as
enterprise needs change.
Whether expanding services
on-premises or in the
public cloud, the VMware
Cloud on AWS eliminates the
need to make changes to
operating models or
architectures. The result
is the most flexible
approach to evolving
enterprise cloud strategies
to keep pace with digital
transformation. driving
business environments.
VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com
Copyright © 2017 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a
registered trademark or trademark of VMware, Inc. and its subsidiaries in the United States and other jurisdictions. All other marks
and names mentioned herein may be trademarks of their respective companies.
BLOOMBASE STORESAFE INTELLIGENT STORAGE FIREWALL
API, PowerCLI and modern HTML5-based vSphere Client)
• VMware-delivered service creates zero lifecycle management while enabling
customers to retain control of application management and operation
• Lays the foundation for integration of 3rd party tools from leading ecosystem
partners.
Partner Solution Overview
Bloombase StoreSafe is an agentless, turnkey, application-transparent, high
performance unified stored data security solution which automatically discovers crown
jewels and locks them down proactively with a non-disruptive deployment approach:
protocol preserving with no operational change to application infrastructure nor daily
operations. Bloombase StoreSafe works almost like a firewall in the storage network
environment for trusted hosts in forms of virtual machine (VM) or cloud compute
instance providing encryption as software applications write, and unencrypting as they
read. Unlike traditional data encryption tools which require hardware retrofitting and
expensive software upgrades, the Bloombase solution operates as a holistic security
virtual appliance with an expansive reach over heterogeneous storage protocols (FCP,
iSCSI, NFS, SMB, CIFS, S3, REST, and so on) for both on-premises VMware
vSphere and off-premises VMware Cloud on AWS.
Leveraging optional Amazon CloudHSM and KMS for centralized key management,
not only Bloombase StoreSafe secures VM disks and vSAN-backed datastores, but
also cloud storage services including Amazon Elastic File System (EFS), Simple
Storage Service (S3) and Elastic Block Store (EBS). Bloombase’s software-defined
architecture is future-proofed to meet infrastructure changes through scalability and
flexibility to deliver secure data services for hyperconverged infrastructure (HCI),
private, hybrid and public cloud. As an independent add-on software, Bloombase
delivers security,
integrity and helps
maintain true
separation of duties,
enabling organizations
to meet data privacy
regulatory compliance
mandates (GDPR, PCI
DSS, HIPAA, PDPL,
and so on) easily and
cost-effectively.
Figure 1: Bloombase
StoreSafe for VMware Cloud
on AWS data-at-rest security
solution provides turnkey
encryption to help
organizations meet data
confidentiality regulatory
compliance requirements
PARTNER SOLUTION BENEFITS
Security Hardened Cloud
Computing
Automates security protection of
data to lower the risk and impact
of data breach with a unified line
of defense from virtual datacenter
to the cloud
Platform Agnostic and Open
Offers multi-tenancy security of
data-at-rest for any software
applications, OSes, storage
protocols and datacenter
infrastructure technologies
requiring no proprietary hardware
Operational Transparent
Provides scalable and flexible
application-transparent data-at-
rest security protection with zero
workflow change to administrators,
operations and end users
Security Proven
Mitigates data leakage
vulnerabilities by delivering
cryptographic services certified at
NIST FIPS 140-2 industry standard
Centralized Key Management
Integrates with optional OASIS KMIP
key managers, PKCS#11 HSMs, Amazon
CloudHSM and KMS for centralized
lifecycle key management
Simplified Compliance
Protects sensitive data-at-rest,
and helps enable compliance with
data privacy and security
regulations with clear audit
visibility
LEARN MORE
For more information, visit
https://marketplace.vmware.com/vsx/
solutions/bloombase-storesafe-
security-server
and
https://www.bloombase.com
VM
Applications on
VMware VMs
Read and Unencrypt
Write and Encrypt
Header
Trailer
Cleartext
Header
Trailer
^$8Yn+=Q~
Bloombase
StoreSafe VM on
VMware
S3 Object
EFS File
Amazon Elastic
File System (EFS)
Amazon Simple
Storage Service (S3)
Amazon
CloudHSM
.
Amazon
KMS
EBS
Volume
Amazon Elastic
Block Store (EBS)
^$8Yn
+=@~
^$8Yn
+=@~
^$8Yn
+=@~
Clear
text

Contenu connexe

Tendances

Hostingcon 2010 Cloud Presentation
Hostingcon 2010 Cloud PresentationHostingcon 2010 Cloud Presentation
Hostingcon 2010 Cloud PresentationJason Baker
 
Microsoft System Center 2012 Overview
Microsoft System Center 2012 OverviewMicrosoft System Center 2012 Overview
Microsoft System Center 2012 OverviewMotty Ben Atia
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformDavid Chou
 
CloudIUSPresentation v2
CloudIUSPresentation v2CloudIUSPresentation v2
CloudIUSPresentation v2Dani Glazman
 
Digital Asset Management with ES4
Digital Asset Management with ES4Digital Asset Management with ES4
Digital Asset Management with ES4Activo Consulting
 
Presentation enterprise cloud & v clouddatacenter
Presentation   enterprise cloud & v clouddatacenterPresentation   enterprise cloud & v clouddatacenter
Presentation enterprise cloud & v clouddatacenterxKinAnx
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center ProjectAbhijit Kundu
 
IAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperIAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperAlastair Orlando
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud ServicesJohn Rhoton
 
TechNet Event: August 2011 Private Cloud
TechNet Event: August 2011 Private CloudTechNet Event: August 2011 Private Cloud
TechNet Event: August 2011 Private CloudHarold Wong
 
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions TechniquesClub Cloud des Partenaires
 
DAM 2018 Review, What's next 2019 ?
DAM 2018 Review, What's next 2019 ?DAM 2018 Review, What's next 2019 ?
DAM 2018 Review, What's next 2019 ?Activo Consulting
 
Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy Jeff Davis
 
Virtualized SANS for Virtual Servers
Virtualized SANS for Virtual ServersVirtualized SANS for Virtual Servers
Virtualized SANS for Virtual ServersDataCore Software
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session aleyeldean
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Citrix
 

Tendances (20)

Hostingcon 2010 Cloud Presentation
Hostingcon 2010 Cloud PresentationHostingcon 2010 Cloud Presentation
Hostingcon 2010 Cloud Presentation
 
Microsoft System Center 2012 Overview
Microsoft System Center 2012 OverviewMicrosoft System Center 2012 Overview
Microsoft System Center 2012 Overview
 
Patterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services PlatformPatterns of Cloud Applications Using Microsoft Azure Services Platform
Patterns of Cloud Applications Using Microsoft Azure Services Platform
 
CloudIUSPresentation v2
CloudIUSPresentation v2CloudIUSPresentation v2
CloudIUSPresentation v2
 
Digital Asset Management with ES4
Digital Asset Management with ES4Digital Asset Management with ES4
Digital Asset Management with ES4
 
Presentation enterprise cloud & v clouddatacenter
Presentation   enterprise cloud & v clouddatacenterPresentation   enterprise cloud & v clouddatacenter
Presentation enterprise cloud & v clouddatacenter
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
IAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperIAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive Mapper
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
TechNet Event: August 2011 Private Cloud
TechNet Event: August 2011 Private CloudTechNet Event: August 2011 Private Cloud
TechNet Event: August 2011 Private Cloud
 
VersaStack brochure
VersaStack brochureVersaStack brochure
VersaStack brochure
 
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
 
DAM 2018 Review, What's next 2019 ?
DAM 2018 Review, What's next 2019 ?DAM 2018 Review, What's next 2019 ?
DAM 2018 Review, What's next 2019 ?
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy
 
CLD306 pptx en web
CLD306   pptx en webCLD306   pptx en web
CLD306 pptx en web
 
Virtualized SANS for Virtual Servers
Virtualized SANS for Virtual ServersVirtualized SANS for Virtual Servers
Virtualized SANS for Virtual Servers
 
Qinnova Cloud Computing Session
Qinnova Cloud Computing Session Qinnova Cloud Computing Session
Qinnova Cloud Computing Session
 
Cloud Services: Types of Cloud
Cloud Services: Types of CloudCloud Services: Types of Cloud
Cloud Services: Types of Cloud
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 

Similaire à Bloombase sb pc_11.18_s_bedits_sd - final r4

How to resolve the cloud migration dilemma with VMware investment_.pdf
How to resolve the cloud migration dilemma with VMware investment_.pdfHow to resolve the cloud migration dilemma with VMware investment_.pdf
How to resolve the cloud migration dilemma with VMware investment_.pdfAnil
 
vSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinavSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinaJaroslav Prodelal
 
SDE Solution Overview v1.5
SDE Solution Overview v1.5SDE Solution Overview v1.5
SDE Solution Overview v1.5Joe Kaluza
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...white paper
 
Best Cloud hosting provider in India | MilesWeb
Best Cloud hosting provider in India | MilesWebBest Cloud hosting provider in India | MilesWeb
Best Cloud hosting provider in India | MilesWebNishaNimse
 
cloud Raid
cloud Raidcloud Raid
cloud Raidgsmenon1
 
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...Bloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
What’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationWhat’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationSuministros Obras y Sistemas
 
Security Innovations in the Cloud
Security Innovations in the CloudSecurity Innovations in the Cloud
Security Innovations in the CloudAmazon Web Services
 
Trend Micro & VMware Datasheet
Trend Micro & VMware DatasheetTrend Micro & VMware Datasheet
Trend Micro & VMware DatasheetArrow ECS UK
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewBloombase
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any BusinessePlus
 
St. Louis VMUG Meeting - 09292015
St. Louis VMUG Meeting - 09292015St. Louis VMUG Meeting - 09292015
St. Louis VMUG Meeting - 09292015Jonathan Stewart
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewBloombase
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMwareJJDiGeronimo
 
Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Ashnikbiz
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for EnterprisesAmazon Web Services
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machinesIcomm Technologies
 

Similaire à Bloombase sb pc_11.18_s_bedits_sd - final r4 (20)

zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
How to resolve the cloud migration dilemma with VMware investment_.pdf
How to resolve the cloud migration dilemma with VMware investment_.pdfHow to resolve the cloud migration dilemma with VMware investment_.pdf
How to resolve the cloud migration dilemma with VMware investment_.pdf
 
vSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek BražinavSphere and private cloud - Marek Bražina
vSphere and private cloud - Marek Bražina
 
SDE Solution Overview v1.5
SDE Solution Overview v1.5SDE Solution Overview v1.5
SDE Solution Overview v1.5
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
 
Best Cloud hosting provider in India | MilesWeb
Best Cloud hosting provider in India | MilesWebBest Cloud hosting provider in India | MilesWeb
Best Cloud hosting provider in India | MilesWeb
 
cloud Raid
cloud Raidcloud Raid
cloud Raid
 
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
What’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer PresentationWhat’s new in VMware vShield 5 - Customer Presentation
What’s new in VMware vShield 5 - Customer Presentation
 
Security Innovations in the Cloud
Security Innovations in the CloudSecurity Innovations in the Cloud
Security Innovations in the Cloud
 
Trend Micro & VMware Datasheet
Trend Micro & VMware DatasheetTrend Micro & VMware Datasheet
Trend Micro & VMware Datasheet
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any Business
 
St. Louis VMUG Meeting - 09292015
St. Louis VMUG Meeting - 09292015St. Louis VMUG Meeting - 09292015
St. Louis VMUG Meeting - 09292015
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
Why Security Teams should care about VMware
Why Security Teams should care about VMwareWhy Security Teams should care about VMware
Why Security Teams should care about VMware
 
Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machines
 

Plus de Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Bloombase
 

Plus de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 

Dernier

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Bloombase sb pc_11.18_s_bedits_sd - final r4

  • 1. S O L U T I O N O V E R V I E W | 1 BLOOMBASE STORESAFE INTELLIGENT STORAGE FIREWALL Safeguarding Crown Jewels from Data Breach for Virtual Data Center and Hybrid Cloud S O L U T I O N O V E R V I E W The Increasing Complexity of Mitigating Catastrophic Data Exposure Vulnerabilities For any large-scale organization, data leakage remains a critical, yet unresolved problem. The causes can be both intentional (hardware theft, cyberattack, espionage and so on) and unintentional (media loss, buggy application, and so on). The unbridled rate at which businesses are taking advantage of cloud computing is only going to exacerbate the problem: Increased risk of information exfiltration regardless the number of network defenses in place. A paradigm shift in the approach to data storage management is evident: There has been a move away from structured to unstructured data, resulting in spreading out of crown jewels to virtually every dataset. There is also a concomitant change in the way stored data is managed: from on-premises storage systems to datasources in virtualization and cloud storage services. Despite encryption of data-at-rest as an effective measure assuring the last line of defense in event of data breach, the increased sophistication of cyberattacks targeting at the heterogeneous datacenter environment renders traditional database encryption tools and encryption hardware inadequate, if not useless. Bloombase StoreSafe for VMware Cloud on AWS Simplifies Data-at-Rest Protection for High Security Cloud Computing Bloombase StoreSafe intelligent storage firewall provides automatic protection of data- at-rest for workloads running on VMware Cloud on AWS enabling business-critical applications and invaluable crown jewels to be migrated to the cloud seamlessly and securely. The solution addresses intensifying cyberattack challenges, supports evolving datacenter transformation, and helps accelerate adoption of cloud computing model for mission-critical applications. VMware Cloud on AWS enables customers to run, manage and secure applications in a production-ready, simple and consistent hybrid IT environment. The service enables organizations to continue using existing VMware tools to manage VMware Cloud on AWS environments without having to purchase custom hardware, rewrite applications, or modify their operating model. With access to the broad range of AWS services, and the functionality, elasticity, and security customers have come to expect from the AWS Cloud, the service lays the foundation to run, manage and secure production applications across vSphere®-based private, public and hybrid cloud environments with access to innovative AWS services. VMware Cloud on AWS Key Benefits • Unified and operationally consistent hybrid cloud experience across vSphere- based private clouds and VMware Cloud on AWS • Workload portability and flexible consumption options with single support owner and attractive TCO • Familiar management tools eliminate the need to retrain staff (vCenter, vSphere Bringing together best-of- breed technologies and capabilities that create a seamless and flexible hybrid cloud future for customers, VMware and AWS enable services that easily grow and evolve as enterprise needs change. Whether expanding services on-premises or in the public cloud, the VMware Cloud on AWS eliminates the need to make changes to operating models or architectures. The result is the most flexible approach to evolving enterprise cloud strategies to keep pace with digital transformation. driving business environments.
  • 2. VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com Copyright © 2017 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. and its subsidiaries in the United States and other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. BLOOMBASE STORESAFE INTELLIGENT STORAGE FIREWALL API, PowerCLI and modern HTML5-based vSphere Client) • VMware-delivered service creates zero lifecycle management while enabling customers to retain control of application management and operation • Lays the foundation for integration of 3rd party tools from leading ecosystem partners. Partner Solution Overview Bloombase StoreSafe is an agentless, turnkey, application-transparent, high performance unified stored data security solution which automatically discovers crown jewels and locks them down proactively with a non-disruptive deployment approach: protocol preserving with no operational change to application infrastructure nor daily operations. Bloombase StoreSafe works almost like a firewall in the storage network environment for trusted hosts in forms of virtual machine (VM) or cloud compute instance providing encryption as software applications write, and unencrypting as they read. Unlike traditional data encryption tools which require hardware retrofitting and expensive software upgrades, the Bloombase solution operates as a holistic security virtual appliance with an expansive reach over heterogeneous storage protocols (FCP, iSCSI, NFS, SMB, CIFS, S3, REST, and so on) for both on-premises VMware vSphere and off-premises VMware Cloud on AWS. Leveraging optional Amazon CloudHSM and KMS for centralized key management, not only Bloombase StoreSafe secures VM disks and vSAN-backed datastores, but also cloud storage services including Amazon Elastic File System (EFS), Simple Storage Service (S3) and Elastic Block Store (EBS). Bloombase’s software-defined architecture is future-proofed to meet infrastructure changes through scalability and flexibility to deliver secure data services for hyperconverged infrastructure (HCI), private, hybrid and public cloud. As an independent add-on software, Bloombase delivers security, integrity and helps maintain true separation of duties, enabling organizations to meet data privacy regulatory compliance mandates (GDPR, PCI DSS, HIPAA, PDPL, and so on) easily and cost-effectively. Figure 1: Bloombase StoreSafe for VMware Cloud on AWS data-at-rest security solution provides turnkey encryption to help organizations meet data confidentiality regulatory compliance requirements PARTNER SOLUTION BENEFITS Security Hardened Cloud Computing Automates security protection of data to lower the risk and impact of data breach with a unified line of defense from virtual datacenter to the cloud Platform Agnostic and Open Offers multi-tenancy security of data-at-rest for any software applications, OSes, storage protocols and datacenter infrastructure technologies requiring no proprietary hardware Operational Transparent Provides scalable and flexible application-transparent data-at- rest security protection with zero workflow change to administrators, operations and end users Security Proven Mitigates data leakage vulnerabilities by delivering cryptographic services certified at NIST FIPS 140-2 industry standard Centralized Key Management Integrates with optional OASIS KMIP key managers, PKCS#11 HSMs, Amazon CloudHSM and KMS for centralized lifecycle key management Simplified Compliance Protects sensitive data-at-rest, and helps enable compliance with data privacy and security regulations with clear audit visibility LEARN MORE For more information, visit https://marketplace.vmware.com/vsx/ solutions/bloombase-storesafe- security-server and https://www.bloombase.com VM Applications on VMware VMs Read and Unencrypt Write and Encrypt Header Trailer Cleartext Header Trailer ^$8Yn+=Q~ Bloombase StoreSafe VM on VMware S3 Object EFS File Amazon Elastic File System (EFS) Amazon Simple Storage Service (S3) Amazon CloudHSM . Amazon KMS EBS Volume Amazon Elastic Block Store (EBS) ^$8Yn +=@~ ^$8Yn +=@~ ^$8Yn +=@~ Clear text