Download presentation
1
SafeNet Protects Data at Rest
SafeNet provides the most secure and cost-effective data at rest protection for database, disk, file, and removable media. Business Issues SafeNet Solution Protect sensitive data on variety of devices Protect Data at Risk – State of the art encryption for database, file, disk and removable media Implement robust data encryption controls for compliance Comply w/ Legislation – Proven compliance w/ mandates Minimize cost of securing & managing thousands of portable devices Reduce Operational Cost – Most cost-effective FDE w/ central management via Active Directory
2
SafeNet Database, File and Application Layer Encryption
DataSecure EdgeSecure Key Secure Connector Software High-Performance Database, File, and Application Encryption Transparently encrypts sensitive data across heterogeneous IT environments High-performance, low latency encryption offload (+100k TPS) Intuitive point-and-click administration console High-availability and scalability through clustering and load balancing FIPS, Common Criteria certified Locally encrypts sensitive data in remote locations High-availability appliance for local encryption Light, small form factor that is optimized for distributed environments Remote Management after initial setup Backed up by central DataSecure appliance in event of device failure FIPS certified Centrally protects and manages crypto keys and security policy in hardware appliance Keys are securely stored in a single location for clear separation and definition of boundaries Centralized policy management Centralized logging, auditing and archiving Built-in Certificate Authority (CA) Separation of duties (dual control) FIPS, Common Criteria certified Enables seamless integration with database, application and file servers Load balancing health checking, connection pooling and SSL VPN Database Connectors (Oracle, IBM DB2, Windows SQL Server, Teradata, and Tandem NonStop, SAP, iSeries) File System Connectors (Windows Server, Linux) Application Connectors (.NET, CAPI, JCE, PKCS#11, z/OS, XML and support for all common application and web servers)
3
SafeNet DataSecure SafeNet DataSecure offers the highest level of database, file and application security available, featuring breakthrough performance, high availability, and streamlined implementation. Security Encryption in dedicated hardware appliance Secure multi-factor authentication and access control between servers and DataSecure appliance Centralized auditing and logging FIPS and Common Criteria certified Separation of duties Performance Encryption offload to high-performance hardware appliance Clustering for linear scalability (up to 100k TPS) Low latency (300 microseconds) Batch processing for improved performance Ease of Integration & Management Pre-built connectors for seamless integration into heterogeneous environments (database, application, mainframe, and file servers) Intuitive, point-and-click administration and policy management console Centralized remote configuration, monitoring and management
4
SafeNet DataSecure Deployment
Remote Location Data Center Databases SafeNet EdgeSecure® Application Servers z/OS Mainframes Web Servers File Servers There are several steps required to implement a solution based on the DataSecure platform: 1) First, you install the DataSecure hardware appliance in your data center. This will provide you with a secure hardware-based repository for encryption keys and will serve as the organizational hub for your solution. 2) Next, software connectors are installed as required onto the various elements in your data environment. We have a range of connectors for all common elements & technologies. The connector is a piece of light-weight client software that enables secure communication and transparent encryption functions. 3) Configuring keys and policies is next. Note that keys are stored in the hardened, Ingrian DataSecure appliance. 4) Next, migrate sensitive clear text data from the various data environment elements to the DataSecure appliance via secure SSL connection. The data is encrypted in the DataSecure and then sent back to the data elements. When a user with the appropriate authentication and authorization accesses this information, it is transparently decrypted. 5) Lastly, configure any batch processes. This is where the benefit of encryption offload is most obvious. In this example, the Ingrian DataSecure is able to encrypt 500,000 records in just 5 seconds. Note that in a distributed environment, a similar set of steps is used, whereby an Ingrian EdgeSecure device is deployed at each remote location allowing for rapid encryption of data at the remote location. All of the EdgeSecures are centrally managed by the DataSecure, which can operate as a backup in the event of an EdgeSecure failure. Backup Info: Although Ingrian does not directly touch laptop/devices or storage/tape elements at this time, we nonetheless augment the data security of systems that use these elements: users are not able to use their laptop/devices to access and/or download sensitive information from other data elements unless they have authorization. sensitive data can be encrypted before it is loaded onto storage/tape Laptop/ Device Storage/ Tape SafeNet DataSecure® 4
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.