SafeNet Protects Data at Rest

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

Tivoli SANergy. SANs are Powerful, but... Most SANs today offer limited value One system, multiple storage devices Multiple systems, isolated zones of.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
SafeNet Luna XML Hardware Security Module
Dell Compellent and SafeNet KeySecure
Meraki Mobile Device Management
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Introduction to DBA.
Chapter 7 LAN Operating Systems LAN Software Software Compatibility Network Operating System (NOP) Architecture NOP Functions NOP Trends.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Presentation Cosmos Business Systems & IBM Hellas.
Optimizing the User Experience Throughout the Infrastructure Consolidation Process Dan Smith, Enterprise Solutions Manager, GTSI Chris Theon, Practice.
June 23rd, 2009Inflectra Proprietary InformationPage: 1 SpiraTest/Plan/Team Deployment Considerations How to deploy for high-availability and strategies.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
Unified Logs and Reporting for Hybrid Centralized Management
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Module – 7 network-attached storage (NAS)
EToken TMS 5.0 CA June 09. eToken TMS 5.0 Agenda  The challenge: Authenticator life-cycle management  eToken TMS (Token Management System)  eToken.
Barracuda Networks Steve Scheidegger Commercial Account Manager
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
Bologna Aprile Atempo Product Suite Atempo Time Navigator™ Secure, highly scalable protection of heterogeneous data in complex, mission-critical.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
Clinic Security and Policy Enforcement in Windows Server 2008.
SQL Server 2014 Standard Edition SQL Server 2014 Standard Edition delivers business-class data management for a wide variety of database applications,
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
ESCOP ™ System Center Operations Portal Expanding SCOM 2007 Data Warehouse and ACS Function.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
Microsoft ® System Center Service Manager 2010 Infrastructure Planning and Design Published: December 2010.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
Microsoft TechForge 2009 SQL Server 2008 Unplugged Microsoft’s Data Platform Vinod Kumar Technology Evangelist – DB and BI
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
Chapter 2 Securing Network Server and User Workstations.
Managing and Monitoring the Microsoft Application Platform Damir Bersinic Ruth Morton IT Pro Advisor Microsoft Canada
CERN - IT Department CH-1211 Genève 23 Switzerland t High Availability Databases based on Oracle 10g RAC on Linux WLCG Tier2 Tutorials, CERN,
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
The Hierarchical Trust Model. PGP Certificate Server details Fast, efficient key repository –LDAP, HTTP interfaces Secure remote administration –“Pending”
1 © SafeNet Confidential and Proprietary SafeNet KeySecure with Luna HSM Management.
Red Hat Enterprise Linux Presenter name Title, Red Hat Date.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Improve the Performance, Scalability, and Reliability of Applications in the Cloud with jetNEXUS Load Balancer for Microsoft Azure MICROSOFT AZURE ISV.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Architecting Enterprise Workloads on AWS Mike Pfeiffer.
Barracuda SSL VPN 2012.
Dev and Test Solution reference architecture.
Basharat Institute of Higher Education
Dell Compellent and SafeNet KeySecure
Dev and Test Solution reference architecture.
Dev and Test Solution reference architecture.
Module Overview Installing and Configuring a Network Policy Server
2016 Citrix presentation.
Dev and Test Solution reference architecture.
Dev and Test Solution reference architecture.
Acutelearn Technologies Tivoli Storage Manager(TSM) Training Tivoli Storage Manager Basics: Tivoli Storage Manager Overview Tivoli Storage Manager concepts.
Data Security for Microsoft Azure
SpiraTest/Plan/Team Deployment Considerations
Public Key Infrastructure from the Most Trusted Name in e-Security
Dev and Test Solution reference architecture.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

SafeNet Protects Data at Rest SafeNet provides the most secure and cost-effective data at rest protection for database, disk, file, and removable media. Business Issues SafeNet Solution Protect sensitive data on variety of devices Protect Data at Risk – State of the art encryption for database, file, disk and removable media Implement robust data encryption controls for compliance Comply w/ Legislation – Proven compliance w/ mandates Minimize cost of securing & managing thousands of portable devices Reduce Operational Cost – Most cost-effective FDE w/ central management via Active Directory

SafeNet Database, File and Application Layer Encryption DataSecure EdgeSecure Key Secure Connector Software High-Performance Database, File, and Application Encryption Transparently encrypts sensitive data across heterogeneous IT environments High-performance, low latency encryption offload (+100k TPS) Intuitive point-and-click administration console High-availability and scalability through clustering and load balancing FIPS, Common Criteria certified Locally encrypts sensitive data in remote locations High-availability appliance for local encryption Light, small form factor that is optimized for distributed environments Remote Management after initial setup Backed up by central DataSecure appliance in event of device failure FIPS 140-2 certified Centrally protects and manages crypto keys and security policy in hardware appliance Keys are securely stored in a single location for clear separation and definition of boundaries Centralized policy management Centralized logging, auditing and archiving Built-in Certificate Authority (CA) Separation of duties (dual control) FIPS, Common Criteria certified Enables seamless integration with database, application and file servers Load balancing health checking, connection pooling and SSL VPN Database Connectors (Oracle, IBM DB2, Windows SQL Server, Teradata, and Tandem NonStop, SAP, iSeries) File System Connectors (Windows Server, Linux) Application Connectors (.NET, CAPI, JCE, PKCS#11, z/OS, XML and support for all common application and web servers)

SafeNet DataSecure SafeNet DataSecure offers the highest level of database, file and application security available, featuring breakthrough performance, high availability, and streamlined implementation. Security Encryption in dedicated hardware appliance Secure multi-factor authentication and access control between servers and DataSecure appliance Centralized auditing and logging FIPS 140-2 and Common Criteria certified Separation of duties Performance Encryption offload to high-performance hardware appliance Clustering for linear scalability (up to 100k TPS) Low latency (300 microseconds) Batch processing for improved performance Ease of Integration & Management Pre-built connectors for seamless integration into heterogeneous environments (database, application, mainframe, and file servers) Intuitive, point-and-click administration and policy management console Centralized remote configuration, monitoring and management

SafeNet DataSecure Deployment Remote Location Data Center Databases SafeNet EdgeSecure® Application Servers z/OS Mainframes Web Servers File Servers There are several steps required to implement a solution based on the DataSecure platform: 1) First, you install the DataSecure hardware appliance in your data center. This will provide you with a secure hardware-based repository for encryption keys and will serve as the organizational hub for your solution. 2) Next, software connectors are installed as required onto the various elements in your data environment. We have a range of connectors for all common elements & technologies. The connector is a piece of light-weight client software that enables secure communication and transparent encryption functions. 3) Configuring keys and policies is next. Note that keys are stored in the hardened, Ingrian DataSecure appliance. 4) Next, migrate sensitive clear text data from the various data environment elements to the DataSecure appliance via secure SSL connection. The data is encrypted in the DataSecure and then sent back to the data elements. When a user with the appropriate authentication and authorization accesses this information, it is transparently decrypted. 5) Lastly, configure any batch processes. This is where the benefit of encryption offload is most obvious. In this example, the Ingrian DataSecure is able to encrypt 500,000 records in just 5 seconds. Note that in a distributed environment, a similar set of steps is used, whereby an Ingrian EdgeSecure device is deployed at each remote location allowing for rapid encryption of data at the remote location. All of the EdgeSecures are centrally managed by the DataSecure, which can operate as a backup in the event of an EdgeSecure failure. Backup Info: Although Ingrian does not directly touch laptop/devices or storage/tape elements at this time, we nonetheless augment the data security of systems that use these elements: users are not able to use their laptop/devices to access and/or download sensitive information from other data elements unless they have authorization. sensitive data can be encrypted before it is loaded onto storage/tape Laptop/ Device Storage/ Tape SafeNet DataSecure® 4