Dell Compellent and SafeNet KeySecure

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

© SafeNet Confidential and Proprietary Administering SafeNet StorageSecure Smart Card Module 3: Lesson 5 SafeNet StorageSecure Storage Security Course.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
SafeNet Luna XML Hardware Security Module
Privileged Identity Management Enterprise Password Vault
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Security Controls – What Works
Barracuda Backup Service Data Backup and Disaster Recovery.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Unified Logs and Reporting for Hybrid Centralized Management
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Pre-adoption concern 60% cited concerns around data security as a barrier to adoption 45% concerned that the cloud would result in a lack of data control.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Windows 7 Windows Server 2008 R2 VirtualizationVirtualization Heterogeneous Server Environment Inventory Linux, Unix & VMware Windows 7 & Server 2008.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
IBM TotalStorage ® IBM logo must not be moved, added to, or altered in any way. © 2007 IBM Corporation Break through with IBM TotalStorage Business Continuity.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.
Copyright 2013 FUJITSU LIMITED. AGENDA Mitigation Considerations 4. Data Security – Examples and Application 2. Data Security Life-Cycle 1 1. Data Management.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Chapter 10 : Designing a SQL Server 2005 Solution for High Availability MCITP Administrator: Microsoft SQL Server 2005 Database Server Infrastructure Design.
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Buying factors – HP.
© TecSec® Incorporated 2003 Threat Notification Model for Federal, State and Local Authorities Threat Notification Model for Federal, State and Local Authorities.
HIPAA COMPLIANCE WITH DELL
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
SafeNet Protects Data at Rest
RULES OF ENGAGEMENT Engage if client expresses an interest in data preservation Engage if the client is experiencing one or more “pains” (see “customer.
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
Our Channel 3 The Team Liat Ivri Nadav Elkabets Orit Cittone Nir Peim.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Module 15 Managing Windows Server® 2008 Backup and Restore.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Building a Fully Trusted Authentication Environment
Protecting Your Data With Just Get Backup, LLC. Agenda How important is your data – Acknowledging worst-case scenarios. Understanding that data backup.
Alliance Key Manager for Windows Azure Puts Encryption Key Management and Data Breach Security at Your Fingertips COMPANY PROFILE: TOWNSEND SECURITY Townsend.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
To provide the world with a next generation storage platform for unstructured data, enabling deployment of mobile applications, virtualization solutions,
Picturex Secures and Scales Event-Photo Sharing for Enterprise and Private Customers by Relying on the Powerful, Scalable Microsoft Azure Platform MICROSOFT.
OTech CalCloud Security General 1  Meets the operational and compliance requirements of the State  SAM/SIMM  NIST  FedRAMP v2  Other necessary regulatory.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
Sales Training Presentation Name Title SafeNet KeySecure and StorageSecure NetApp Confidential - Internal Use Only.
1 © SafeNet Confidential and Proprietary SafeNet KeySecure with Luna HSM Management.
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
1 March © SafeNet Confidential and Proprietary Cloud Security Solutions March 2011 Customer Use Case Scenarios.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Market Leader in Business Cloud Services KeepItSafe: Part of Publicly-Traded j2 Global, Inc (Nasdaq; JCOM) Well capitalized with a market cap of $2.5.
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Dell Compellent and SafeNet KeySecure
VIRTUALIZATION & CLOUD COMPUTING
KMIP Key Management with Vormetric Data Security Manager
Enterprise Key Management with OASIS KMIP
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Data Security for Microsoft Azure
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

Dell Compellent and SafeNet KeySecure

SafeNet: What We Do Trusted to protect the world’s most sensitive data for the world’s most trusted brands. We protect the most money that moves in the world, $1 trillion daily. FOUNDED 1983 OWNERSHIP Private REVENUE 340m GLOBAL FOOTPRINT 25,000+ Customers in 100 countries We protect the most digital identities in the world. Goal of Slide: Speaker Notes: EMPLOYEES 1,500+ In 25 countries ACCREDITED Products certified to the highest security standard We protect the most classified information in the world.

Why Data at Rest Encryption? Secures data wherever it resides Data remains secured both in and out of the data center Secures data in event of drive, array or Storage Center system theft Protect intellectual property and digital assets from unauthorized access Full data control Only authorized users with appropriate keys have access. Key loss or deletion renders data permanently unreadable. Keys never appear in the clear on outside networks Log and audit user access to IP Compliance PCI-DSS, HIPAA, Basel II, 46+ State Laws, European Union requirements Regulatory violations bring financial and legal penalties Proactive security and reputation preservation have compelling ROI Goal of Slide: Speaker Notes:

Dell Compellent Self-encrypting Drives (SED) Secures data against lost, transported or stolen drives theft of entire array theft an entire Storage Center system 100% unrecoverable keys Key loss means data loss. No back door to access data on stolen drives Removed or stolen drives are automatically locked Even if platters are placed on a spin stand, data is secure Keys are secure and never passed in the clear on outside networks Robust encryption and security Secured using 256-bit AES encryption Option to operate in non-SED mode without system impact FIPS 140-2 Level 2 security Instant cryptographic erase Delete keys to decommissioned drives to render data unreadable Cryptographically erase data on individual drive basis

SafeNet KeySecure Enterprise Key Management Each SED contains its own encryption key. How do you effectively manage an entire datacenter? Centralized key management Store, manage, generate, distribute, rotate, back up, activate, deactivate, and destroy keys Up to 1 million keys per cluster High assurance level Geographically dispersed operations Standard-based approach: OASIS KMIP Manage keys for: Dell Full Disk Encryption Other supported 3rd party KMIP-based solutions Supports key management for cloud solutions Hardware encryption key storage Maintain encryption keys in SafeNet Luna SA (HSM) and PCI Card World Class Support Services 7x24x365 Support offerings available Goal of Slide: Speaker Notes: k150 k460 25,000 max keys 1,000,000 max keys 100 max concurrent clients 1,000 max concurrent clients FIPS 140-2 Level 1 FIPS 140-2 Level 3

KeySecure manages keys for many vendors

Key Benefits Centralize Encryption Key Management Unify key management (e.g. key generation, escrow, recovery) for all Compellent self- encrypting drives and other KMIP compatible solutions in SafeNet’s partner ecosystem behind an intuitive graphical user interface. Multi-Tenant Data Isolation Share storage resources while securing data by business policy to segregate data for multiple departments, business units, or customers. High Availability Configurations Cluster appliances to maintain encrypted data availability in geographically dispersed data centers. Separation of duties. Segment key ownership and management based on individuals or by group owners to protect sensitive material against unauthorized access from staff. Auditing and Logging Detailed logs can be used by SIEM reporting tools such as IBM QRadar, Splunk and others for improved day-to-day operations management and easier compliance reporting.

KeySecure Summary Security Performance Manageability Availability Flexibility Hardware-based, centralized key and policy management FIPS/CC certified solution Authentication and authorization Low and high performance models (k460, k250, k150, k150v) Models matched to performance requirements Efficient backup/restore capabilities, local encryption option Support for heterogeneous environments (app, db, file) Support for open standards and APIs and stress KMIP Range of enterprise deployment models Intuitive, easy-to-use administration Separation of duties Centralized policy management Enterprise clustering and replication Load balancing, health checking, and failover Geographically distributed redundancy 8 8 8 8

Questions? Blair Semple Director Business Development blair.semple@safenet-inc.com For more information visit: http://www.safenet-inc.com/partners/dell 9