© Softmark www.softmark.com www.softmark.com - 1 - Continuous Availability Operational Simplicity Financial Advantage Secure Your Stratus Systems VOS Encryption.

Slides:



Advertisements
Similar presentations
EasyDirector® Simplifying the way you manage your business... Full-Featured Contact & Customer Relationship Management Tool Prepared by AITechConsulting.
Advertisements

Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
© Softmark Continuous Availability Operational Simplicity Financial Advantage Replicate Your Stratus Data DRMS.
Introducing FailSafeSolutions Online Backup Software.
Chapter 20 Oracle Secure Backup.
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
A university wide electronic research ethics review system?
© Softmark Continuous Availability Operational Simplicity Financial Advantage Manage Your Stratus Systems Software.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
The twenty-four/seven database Oracle Database Security David Yahalom Senior database consultant
Oracle Database Security
Association Management System Norman Campbell Director, Information Systems.
© 1 Eran Mertens
© Softmark VOS C o n s o l e.
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Technical Architectures
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Sample School Website Sydney Region ITSU School Support
© Softmark Continuous Availability Operational Simplicity Financial Advantage Secure Your Stratus Systems VOS Auditor.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
Microcrypt Technologies SPACER Secure Physical Access Control Enhanced Reader for contactless cryptographic smart cards.
Electronic Customer Portal System. Reducing Risks – Increasing Efficiency – Lowering Costs Secure Internet based Communication Gateway direct to your.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Windows Vista: Volume Activation 2.0
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
SafeNet Protects Data at Rest
B.Ramamurthy9/19/20151 Operating Systems u Bina Ramamurthy CS421.
Who is ROH Incorporated? Founded in 1971 Service oriented company built on client “partnering” Florida State Contract # Provide advanced.
Prestashop is an open source e-commerce application. It is written in PHP and is based on Smarty template engine. It can incorporate the advantages of.
SEC835 Practical aspects of security implementation Part 1.
Figures – Chapter 14. Figure 14.1 System layers where security may be compromised.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Sensitive Metric Collection and Reporting System Michael Aiello Hanning Gao Martin Goldberg Michael Sosonkin Jason Woloz.
Dale Smith COSC 4010 Computer Security Authentication & Security in the.NET environment.
Database Security and Data Protection Suseel Pachalla, CISSP.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Sample School Website. What is wrong with the existing School Webspace Site? Can only host static pages – no dynamic content possible. Can not be edited.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
MBA 664 Database Management Dave Salisbury ( )
Chapter 9  2000 by Prentice Hall. 9-1 Client/Server Computing.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Enterprise Messaging & Collaboration. e-Interact Modules.
Module 11: Managing Data Storage. Overview Managing File Compression Configuring File Encryption Configuring EFS Recovery Agents Implementing Disk Quotas.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
WHAT WE OFFER Go-To-Market Services MICROSOFT AZURE APP BUILDER PROFILE: MxHero MxHero, launched in 2012 in New York, is a cloud-based application that.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
CLOUDENTIFY.
Securing Network Servers
Introduction to Operating Systems
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Chapter 27: System Security
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
O.S. Security.
IT Management Services Infrastructure Services
3PL Software Solutions | Global Shipping Software
Presentation transcript:

© Softmark Continuous Availability Operational Simplicity Financial Advantage Secure Your Stratus Systems VOS Encryption Capabilities

© Softmark Provide comprehensive, cost effective data encryption program Satisfy internal audit requirements Satisfy corporate governance, regulatory and industry standards (PCI) Eliminate security threats and vulnerabilities Reduce cost by automation Protect your most important asset – your data Objectives

© Softmark Encrypted Business Databases Encryptor Components Keys Database Key Management System Encrypted Tapes Encryptor Tape Encryptor

© Softmark Key Management Keys are protected in a secure encrypted (AES) database Keys may be changed up 50 times during their life cycle Archives include date/time of change and user-name Database and Key functions protected by – Standard VOS access controls – VOS/Auditor – Registration Admin – RADIUS Encryption and Key Management require split knowledge

© Softmark Key Management & VOS Inherits VOS’ legacy security and registration features Registration-Database authorization RADIUS – external authorization Login-Admin – Temporary restrictions – Account expirations and renewals – Failed access attempts – Password grace time Password-Security Admin – Password format requirements – Password renewal

© Softmark Key Management Keys Database Key Management System VOS-Auditor RADIUS Archives Encryptor AdminRegistration Admin VOS LOGIN Admin VOS PASSWORD Admin

© Softmark Keys Database Encrypted Business Database Application Encryptor VOS Encryptor AES, T-DES Encryption Unchanged user programs Key Management System Seamless integration with existing VOS application

© Softmark VOS Encryptor Provides fast, simple, reliable and transparent data encryption Uses secure 128-bit keys Meets PCI Key management requirements Incorporates latest cryptographic algorithms (AES, 3DES) Encrypts selected data - by file / directory Supports all file types: Sequential, Fixed, Relative, Indexed Allows local and remote encrypted tape save/restore Offers simplicity and ease of use: –No additional hardware or software –No application changes –Single point of configuration –Practically no learning curve

© Softmark Simplicity by design Scalability – Single system-wide database – Multiple Application-based configurations Flexibility – Single files – Directories – Star-names (wild-cards) – Exclusions Conversion tools – Application business / transaction data – Static files (source-code, reports, configuration)

© Softmark Tape-Encryptor: Save/Restore Business Databases ( “ Clear ” ) Encrypted Tapes Keys Database Tape Encryptor AES, T-DES Encryption Key Management System

© Softmark Tape-Encryptor: Remote Encrypted Tapes Tape Encryptor Business Databases ( “ Clear ” ) TCP/IP Backup Restore Non-Production module Performance overhead of Save/Restore and tape activities is off-loaded to a non-Production module

© Softmark SoftMark solutions are exclusively distributed worldwide by Contact: Mr. Eran Mertens Telephone: ARI: SoftMark: