SlideShare une entreprise Scribd logo
1  sur  3
BLOOMBASE TURNKEY DATA-AT-REST
SECURITY COMPLIANCE SOLUTION
FOR EMC CELERRA

                                                 EMC CELERRA WITH BLOOMBASE SPITFIRE STORESAFE
 ESSENTIALS
                                                 Electronic business data represents an invaluable core asset of today’s enterprises and
                                                 organizations. Enterprise customers are concerned about being able to manage and use
 • Bloombase Spitfire StoreSafe is an            sensitive information to optimize day-to-day business operations, while protecting it and
   industry-proven solution for immediate
                                                 satisfying information privacy compliance needs—without the expense of drastic system
   security compliance of various standards
   including HIPAA, PCI DSS, SB 1386, SOX,       change and performance degradation.
   and more                                      The Bloombase Spitfire data-at-rest solution offers advanced security capabilities for a reliable,
 • Bundled Spitfire KeyCastle enables            application-transparent, cipher-text information storage infrastructure. Its tamper-proof
   automated initial migration of EMC Celerra    hardware encryption key security module ensures confidentiality and integrity throughout
   contents, rekey, and full lifecycle
                                                 its whole lifecycle. Bloombase Spitfire Cryptographic Module is NIST FIPS 140-2 certified
   management of cryptographic keys
                                                 providing FIPS-approved RSA and AES cryptographic algorithms, together with non-FIPS
 • A web-based management console,
                                                 ciphers including Camellia, SEED, 3DES, Twofish, Blowfish, etc.
   command line interface console, and
   SNMP offer total, simplified management       Sensitive persistent data is stored as cipher-text securely stored in EMC® Celerra®. The
 • Unlike proprietary dedicated hardware         encryption and un-encryption processes are automated by re-routing storage paths via
   with a high entry price, Bloombase Spitfire   Bloombase Spitfire StoreSafe Security Server cluster providing virtual plain contents to
   assumes a pay-as-you-go licensing model
                                                 authorized hosts and applications.
   to help reduce your initial investment
 • To maximize ROI, a single Bloombase           EMC Celerra storage targets are accessed by iSCSI, CIFS, and/or NFS storage protocols via
   Spitfire StoreSafe product:                   Bloombase Spitfire StoreSafe Security Servers. Ciphered sensitive information is stored in
   – Enables multiple storage hosts and          the EMC Celerra storage system for centralized management. Only authorized access of
     applications to produce and consume         virtual-plain information, by trusted applications and systems, per access rules and security
     secured at-rest data                        profiles governed by Bloombase Spitfire StoreSafe encryptors is permitted. Application data
   – Supports multiple EMC Celerra LUNs, file    files, directories, and storage volumes are protected by strong encryption offered by
     servers, and shares                         Bloombase Spitfire StoreSafe virtual storages, enabling application servers to achieve
   – Supports both file- and block-based         various information privacy compliance standards immediately and effectively.
     protection for CIFS, NFS, and/or iSCSI
     EMC Celerra storage resources
                                                 SOLUTION ARCHITECTURE
                                                 The Bloombase Spitfire data-at-rest encryption solution offers wire-speed, on-the-fly
                                                 encryption and un-encryption of storage data in an EMC Celerra network-attached storage
                                                 (NAS) system. It requires minimum change in the application tier by dropping-in Spitfire
                                                 StoreSafe security servers in the storage paths.

                                                 The Bloombase Spitfire High Availability Suite brings together dual Spitfire security servers
                                                 as a cluster so when active node fails, backup node picks up and maintains non-stop,
                                                 mission-critical service at complete storage and host transparency, requiring minimal
                                                 operator attention. Extending to the disaster recovery infrastructure, storage cipher-texts at
                                                 the primary site are replicated in their natural encrypted form over a private network to a
                                                 backup storage system at a secondary site, and secured by a replica of Bloombase Spitfire




SOLUTION OVERVIEW
StoreSafe and KeyCastle servers. As storage contents reside on EMC Celerra in their native
ciphered form, data backup done over the physical storage resources is inherently
encrypted, immediately satisfying secure archival needs.

The easy-to-manage Bloombase Spitfire storage security solution helps organizational cus-
tomers enforce data confidentiality for storage, which improves overall system security,
enables fast key rotation, reduces user workflows, segregates data ownership from adminis-
tration and operation, and enhances efficiency and internal controls.




Figure 1.


RESULTS
• A TPC-C-based database benchmarking test is carried out on a sample database stored in
  an EMC Celerra secured by a Bloombase Spitfire StoreSafe storage security solution.

• TPC-C-like queries (with EMC Celerra read, Bloombase Spitfire unencryption) and updates
  (with Celerra write, Bloombase Spitfire encryption) are generated and applied to simulate
  workload on the EMC Celerra/Bloombase Spitfire setup.




Figure 2. TPC-C queries

• For TPC-C queries, Bloombase Spitfire StoreSafe encrypted database server stored in EMC
  Celerra recorded a nine percent drop in throughput, compared to 31 percent for host-based
  and 64 percent for column-based.
Figure 3. TPC-C inserts and update

                                                     • For TPC-C inserts and updates, Bloombase Spitfire StoreSafe encrypted database stored in
                                                       EMC Celerra recorded a 12 percent drop in throughput, compared to 53 percent for host-
                                                       based and 59 percent for column-based.


                                                     CONCLUSIONS
                                                     • Wire-speed encryption performance with least degradation in storage I/O and throughput

                                                     • Turnkey and proven solution for immediate compliance to stringent information confidenti-
                                                       ality regulatory requirements, no application change or second development needed

                                                     • Fast deployment and automated migration versus alternatives’ manual script-based migra-
                                                       tion approach

                                                     • iSCSI block-based and CIFS file-based encryption in a single solution

                                                     • Highly secure NIST FIPS 140-2 level 3 total key management

                                                     • Highly available and fault-tolerant

                                                     • Low total cost of ownership


                                                     ABOUT BLOOMBASE
                                                     Bloombase develops and markets Spitfire and Keyparc information security compliance solu-
                                                     tions for enterprises and organizations to address data-at-rest and in-flight threats. Focused
                                                     on solving the problem of securing enterprise transit and storage data, Bloombase has pio-
                                                     neered the use of encryption and authentication technologies that fit transparently into any
                                                     enterprise IT environment. For more information, please refer to http://www.bloombase.com.


  CONTACT US                                         ABOUT EMC
  To learn how EMC products, services, and           EMC Corporation is the world’s leading developer and provider of information infrastructure
  solutions can help solve your business and         technology and solutions that enable organizations of all sizes to transform the way they
  IT challenges, contact your local representative   compete and create value from their information. Information about EMC’s products and
  or authorized reseller—or visit us at              services can be found at www.EMC.com.
  www.EMC.com.




                                                     EMC2, EMC, Celerra, the EMC logo, and where information lives are registered trademarks or trademarks of EMC Corporation in the
                                                     United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2011
                                                     EMC Corporation. All rights reserved. Published in the USA. 01/11 Solution Overview H8568



EMC Corporation
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.EMC.com

Contenu connexe

Tendances

Xo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationXo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationSimonZXu
 
Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data CentersCisco Russia
 
Scalable midsize data center designs
Scalable midsize data center designsScalable midsize data center designs
Scalable midsize data center designsJing Bai
 
Avamar weekly webcast
Avamar weekly webcastAvamar weekly webcast
Avamar weekly webcaststefriche0199
 
Mellanox hpc day 2011 kiev
Mellanox hpc day 2011 kievMellanox hpc day 2011 kiev
Mellanox hpc day 2011 kievVolodymyr Saviak
 
Colocube Enterprise Cloud Solutions
Colocube Enterprise Cloud SolutionsColocube Enterprise Cloud Solutions
Colocube Enterprise Cloud Solutionslynnkuroski
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backupjpo1974
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...CTI Group
 
Customer Success - A Government Security Agency
Customer Success - A Government Security AgencyCustomer Success - A Government Security Agency
Customer Success - A Government Security AgencyBloombase
 
2012 10 sep-gwava_novell_backup_and_more
2012 10 sep-gwava_novell_backup_and_more2012 10 sep-gwava_novell_backup_and_more
2012 10 sep-gwava_novell_backup_and_moreGWAVA
 
Virtualization Technology and Directions ( EMC World 2010 )
Virtualization Technology and Directions ( EMC World 2010 )Virtualization Technology and Directions ( EMC World 2010 )
Virtualization Technology and Directions ( EMC World 2010 )EMC
 
Verax Nms - Product Presentation
Verax Nms - Product PresentationVerax Nms - Product Presentation
Verax Nms - Product Presentationkarol_andrzejewski
 
Scale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC IsilonScale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC IsilonEMC
 
Prueba para postear un ppt
Prueba para postear un pptPrueba para postear un ppt
Prueba para postear un pptGerardo Lema
 
Interview operating system solaris
Interview operating system solarisInterview operating system solaris
Interview operating system solarisPajana Load
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...ljaquet
 

Tendances (18)

Xo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationXo Managed Backup Customer Presentation
Xo Managed Backup Customer Presentation
 
Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data Centers
 
Scalable midsize data center designs
Scalable midsize data center designsScalable midsize data center designs
Scalable midsize data center designs
 
Avamar weekly webcast
Avamar weekly webcastAvamar weekly webcast
Avamar weekly webcast
 
Mellanox hpc day 2011 kiev
Mellanox hpc day 2011 kievMellanox hpc day 2011 kiev
Mellanox hpc day 2011 kiev
 
Colocube Enterprise Cloud Solutions
Colocube Enterprise Cloud SolutionsColocube Enterprise Cloud Solutions
Colocube Enterprise Cloud Solutions
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
 
Customer Success - A Government Security Agency
Customer Success - A Government Security AgencyCustomer Success - A Government Security Agency
Customer Success - A Government Security Agency
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
 
2012 10 sep-gwava_novell_backup_and_more
2012 10 sep-gwava_novell_backup_and_more2012 10 sep-gwava_novell_backup_and_more
2012 10 sep-gwava_novell_backup_and_more
 
Virtualization Technology and Directions ( EMC World 2010 )
Virtualization Technology and Directions ( EMC World 2010 )Virtualization Technology and Directions ( EMC World 2010 )
Virtualization Technology and Directions ( EMC World 2010 )
 
Verax Nms - Product Presentation
Verax Nms - Product PresentationVerax Nms - Product Presentation
Verax Nms - Product Presentation
 
Emc storag
Emc storagEmc storag
Emc storag
 
Scale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC IsilonScale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC Isilon
 
Prueba para postear un ppt
Prueba para postear un pptPrueba para postear un ppt
Prueba para postear un ppt
 
Interview operating system solaris
Interview operating system solarisInterview operating system solaris
Interview operating system solaris
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
 

Similaire à Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra

H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewBloombase
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewBloombase
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase
 
Customer Success - A Government Organization
Customer Success - A Government OrganizationCustomer Success - A Government Organization
Customer Success - A Government OrganizationBloombase
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase
 
EMC Symmetrix Data at Rest Encryption - Detailed Review
EMC Symmetrix Data at Rest Encryption - Detailed Review EMC Symmetrix Data at Rest Encryption - Detailed Review
EMC Symmetrix Data at Rest Encryption - Detailed Review EMC
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-PacificCustomer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-PacificBloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Transforming Mission Critical Applications
Transforming Mission Critical ApplicationsTransforming Mission Critical Applications
Transforming Mission Critical ApplicationsCenk Ersoy
 
SMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution BriefSMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution BriefHybrid Cloud
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facilityramparasa
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facilityramparasa
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
Bloombase store safe mf solution brief 2018 r0.91
Bloombase store safe   mf solution brief 2018 r0.91Bloombase store safe   mf solution brief 2018 r0.91
Bloombase store safe mf solution brief 2018 r0.91Bloombase
 
Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400RaGaZoMe
 
Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sbBloombase
 

Similaire à Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra (20)

H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
Customer Success - A Government Organization
Customer Success - A Government OrganizationCustomer Success - A Government Organization
Customer Success - A Government Organization
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
EMC Symmetrix Data at Rest Encryption - Detailed Review
EMC Symmetrix Data at Rest Encryption - Detailed Review EMC Symmetrix Data at Rest Encryption - Detailed Review
EMC Symmetrix Data at Rest Encryption - Detailed Review
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-PacificCustomer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
 
High Res CIO Review Article
High Res CIO Review ArticleHigh Res CIO Review Article
High Res CIO Review Article
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
emc world keynote gelsinger
emc world keynote gelsinger emc world keynote gelsinger
emc world keynote gelsinger
 
Transforming Mission Critical Applications
Transforming Mission Critical ApplicationsTransforming Mission Critical Applications
Transforming Mission Critical Applications
 
SMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution BriefSMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution Brief
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facility
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facility
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
Bloombase store safe mf solution brief 2018 r0.91
Bloombase store safe   mf solution brief 2018 r0.91Bloombase store safe   mf solution brief 2018 r0.91
Bloombase store safe mf solution brief 2018 r0.91
 
Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400
 
Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sb
 

Plus de Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Bloombase
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usenBloombase
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletBloombase
 

Plus de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbooklet
 

Dernier

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra

  • 1. BLOOMBASE TURNKEY DATA-AT-REST SECURITY COMPLIANCE SOLUTION FOR EMC CELERRA EMC CELERRA WITH BLOOMBASE SPITFIRE STORESAFE ESSENTIALS Electronic business data represents an invaluable core asset of today’s enterprises and organizations. Enterprise customers are concerned about being able to manage and use • Bloombase Spitfire StoreSafe is an sensitive information to optimize day-to-day business operations, while protecting it and industry-proven solution for immediate satisfying information privacy compliance needs—without the expense of drastic system security compliance of various standards including HIPAA, PCI DSS, SB 1386, SOX, change and performance degradation. and more The Bloombase Spitfire data-at-rest solution offers advanced security capabilities for a reliable, • Bundled Spitfire KeyCastle enables application-transparent, cipher-text information storage infrastructure. Its tamper-proof automated initial migration of EMC Celerra hardware encryption key security module ensures confidentiality and integrity throughout contents, rekey, and full lifecycle its whole lifecycle. Bloombase Spitfire Cryptographic Module is NIST FIPS 140-2 certified management of cryptographic keys providing FIPS-approved RSA and AES cryptographic algorithms, together with non-FIPS • A web-based management console, ciphers including Camellia, SEED, 3DES, Twofish, Blowfish, etc. command line interface console, and SNMP offer total, simplified management Sensitive persistent data is stored as cipher-text securely stored in EMC® Celerra®. The • Unlike proprietary dedicated hardware encryption and un-encryption processes are automated by re-routing storage paths via with a high entry price, Bloombase Spitfire Bloombase Spitfire StoreSafe Security Server cluster providing virtual plain contents to assumes a pay-as-you-go licensing model authorized hosts and applications. to help reduce your initial investment • To maximize ROI, a single Bloombase EMC Celerra storage targets are accessed by iSCSI, CIFS, and/or NFS storage protocols via Spitfire StoreSafe product: Bloombase Spitfire StoreSafe Security Servers. Ciphered sensitive information is stored in – Enables multiple storage hosts and the EMC Celerra storage system for centralized management. Only authorized access of applications to produce and consume virtual-plain information, by trusted applications and systems, per access rules and security secured at-rest data profiles governed by Bloombase Spitfire StoreSafe encryptors is permitted. Application data – Supports multiple EMC Celerra LUNs, file files, directories, and storage volumes are protected by strong encryption offered by servers, and shares Bloombase Spitfire StoreSafe virtual storages, enabling application servers to achieve – Supports both file- and block-based various information privacy compliance standards immediately and effectively. protection for CIFS, NFS, and/or iSCSI EMC Celerra storage resources SOLUTION ARCHITECTURE The Bloombase Spitfire data-at-rest encryption solution offers wire-speed, on-the-fly encryption and un-encryption of storage data in an EMC Celerra network-attached storage (NAS) system. It requires minimum change in the application tier by dropping-in Spitfire StoreSafe security servers in the storage paths. The Bloombase Spitfire High Availability Suite brings together dual Spitfire security servers as a cluster so when active node fails, backup node picks up and maintains non-stop, mission-critical service at complete storage and host transparency, requiring minimal operator attention. Extending to the disaster recovery infrastructure, storage cipher-texts at the primary site are replicated in their natural encrypted form over a private network to a backup storage system at a secondary site, and secured by a replica of Bloombase Spitfire SOLUTION OVERVIEW
  • 2. StoreSafe and KeyCastle servers. As storage contents reside on EMC Celerra in their native ciphered form, data backup done over the physical storage resources is inherently encrypted, immediately satisfying secure archival needs. The easy-to-manage Bloombase Spitfire storage security solution helps organizational cus- tomers enforce data confidentiality for storage, which improves overall system security, enables fast key rotation, reduces user workflows, segregates data ownership from adminis- tration and operation, and enhances efficiency and internal controls. Figure 1. RESULTS • A TPC-C-based database benchmarking test is carried out on a sample database stored in an EMC Celerra secured by a Bloombase Spitfire StoreSafe storage security solution. • TPC-C-like queries (with EMC Celerra read, Bloombase Spitfire unencryption) and updates (with Celerra write, Bloombase Spitfire encryption) are generated and applied to simulate workload on the EMC Celerra/Bloombase Spitfire setup. Figure 2. TPC-C queries • For TPC-C queries, Bloombase Spitfire StoreSafe encrypted database server stored in EMC Celerra recorded a nine percent drop in throughput, compared to 31 percent for host-based and 64 percent for column-based.
  • 3. Figure 3. TPC-C inserts and update • For TPC-C inserts and updates, Bloombase Spitfire StoreSafe encrypted database stored in EMC Celerra recorded a 12 percent drop in throughput, compared to 53 percent for host- based and 59 percent for column-based. CONCLUSIONS • Wire-speed encryption performance with least degradation in storage I/O and throughput • Turnkey and proven solution for immediate compliance to stringent information confidenti- ality regulatory requirements, no application change or second development needed • Fast deployment and automated migration versus alternatives’ manual script-based migra- tion approach • iSCSI block-based and CIFS file-based encryption in a single solution • Highly secure NIST FIPS 140-2 level 3 total key management • Highly available and fault-tolerant • Low total cost of ownership ABOUT BLOOMBASE Bloombase develops and markets Spitfire and Keyparc information security compliance solu- tions for enterprises and organizations to address data-at-rest and in-flight threats. Focused on solving the problem of securing enterprise transit and storage data, Bloombase has pio- neered the use of encryption and authentication technologies that fit transparently into any enterprise IT environment. For more information, please refer to http://www.bloombase.com. CONTACT US ABOUT EMC To learn how EMC products, services, and EMC Corporation is the world’s leading developer and provider of information infrastructure solutions can help solve your business and technology and solutions that enable organizations of all sizes to transform the way they IT challenges, contact your local representative compete and create value from their information. Information about EMC’s products and or authorized reseller—or visit us at services can be found at www.EMC.com. www.EMC.com. EMC2, EMC, Celerra, the EMC logo, and where information lives are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2011 EMC Corporation. All rights reserved. Published in the USA. 01/11 Solution Overview H8568 EMC Corporation Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.EMC.com