SlideShare uma empresa Scribd logo
1 de 9
Specification Sheet




                      Bloombase Spitfire StoreSafe Storage
                      Security Server

                      Features
                      Transparent Encryption and Decryption
                      High performance and intelligent cryptographic engine sensing network storage information and carry out
                      cryptographic operations based on user-predefined rules. No user training required. Data to be stored are
                      encrypted and data to be read are decrypted automatically on the fly under the covers requiring no change
                      on user workflow and application logic.

                      Hardware, Platform and Filesystem Independent
                      Spitfire StoreSafe Security Server supports all platforms conforming to industrial storage communications
                      protocols and it operates on the storage networking layer abstracting filesystem underneath or above.

                      High Performance
                      Patent pending Spitfire Transparent Cache minimizes performance degradation as a result of real-time
                      encryption and decryption, pushing encryption throughput to the limits at gigabit and 10-gigabit wire-
                      speeds.

                      Flexible and Secure Access Control
                      Fine grain user and host access control suiting all enterprise storage security needs.

                      High Availability
                      Highly scalable and multiple Spitfire StoreSafe boxes running in cluster for failover in mission-critical
                      systems and load-balancing for high-throughput storage systems.



                      Security
                      Industry-proven cryptographic processing engine
                      NIST FIPS-197 AES encryption and decryption
                      IEEE 1619-compliant AES XTS block cipher
                      Japan NTT/Mitsubishi Electric Camellia encryption and decryption
                      Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption
                      NIST FIPS-46-3 3DES and DES encryption and decryption
                      RC2, RC4, RC5 and RC6 encryption and decryption
                      CAST5 encryption and decryption
                      Twofish and Blowfish encryption and decryption
                      IDEA encryption and decryption
                      Serpent and Skipjack encryption and decryption
                      Pluggable cipher architecture for future cipher upgrade or custom cipher support
                      128, 256, 512, 1024 and 2048 bit public key cryptography
                      RSA and DSA public key cryptography
                      SHA-1, MD5 and Chinese National SCH(SM3) hash generation
                      Hardware ASIC cryptographic acceleration (optional)
                      Obfuscation and data shuffling for simple data hiding


                                                                  www.bloombase.com
Storage Systems
Direct Attached Storage (DAS)
Network Attached Storage (NAS)
Storage Area Network (SAN)
Fiber Channel (FC) and LVD SCSI tape library and virtual tape library (VTL)



Privacy Control
Automated file-based and block-based encryption on storage device and file write operations
Automated decryption on storage device and file read operations on trusted hosts and clients
Multiple key encryption
Fix-sized file header regardless of actual file size for file-based protection
No additional storage required for block-based protection



Access Control
Fine grain read/write/create/delete/list access control
Time-window-based access control
Zero alteration to actual storage contents
Zero impact to performance



Integrity Control
Automated filesystem object digital signature generation
File integrity verification
Multiple key digital signature generation
Fix-sized file header regardless of actual file size



Write-Once-Read-Many (WORM)
Write-once-read-many feature resembling non-rewritable optical media supporting secure archival of data
eliminating potential risks being overwritten by intention or accidental operation
For storage archival, compliance, dynamic capacity management and information lifecycle management
(ILM)
Policy based engine dynamically adapts to changing demands in data requirements, by moving files auto-
matically and transparently to appropriate tiered storage
Rule based configuration for permanently delete and/or shred file contents



Authentication and Authorization
User-based and role-based authentication and authorization
Generic Lightweight Directory Access Protocol (LDAP) and Microsoft Active Directory (MSAD) authentication
and authorization
Host-based authentication and authorization
Microsoft NT Lan Manager (NTLM) authentication
Challenge Handshake Authentication Protocol (CHAP) based discovery and authentication




                                             www.bloombase.com
Direct Attached Storage (DAS)
Extensive Storage Communication Protocol Support
Fiber Channel Protocol (FCP)
Fiber Channel over Ethernet (FCoE)
Internet Small Computer System Interface (iSCSI)
Small Computer System Interface (SCSI)
Serial Attached SCSI (SAS)
Serial Advanced Technology Attachment (SATA)
Parallel Advanced Technology Attachment (PATA)/Integrated Drive Electronics (IDE), etc

Platform Independent
Bloombase SpitfireOS
HP-UX
OpenVMS
IBM-AIX
Sun Solaris
Linux
Microsoft Windows
Mac OS, etc

Hardware Interoperability
HP
IBM
Sun StorageTek
Dell
HDS
EMC
NetApp
Apple
Ultra 160 SCSI low voltage differential (LVD) compliant host bus adapter (HBA)
Emulex
Qlogic, etc

Filesystem Independent
Raw
ext2 and ext3
FAT
FAT-32
NTFS
UFS
ZFS
CFS
VxFS, etc




                                           www.bloombase.com
Network Attached Storage (NAS)
Extensive Storage Communication Protocol Support
Network File System (NFS)
Common Internet File System (CIFS)/Server Message Block (SMB)
Andrew File System (AFS)
NetWare Core Protocol (NCP)
Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FTP), etc

Platform Independent
Bloombase SpitfireOS
HP-UX
OpenVMS
IBM-AIX
Sun Solaris
Linux
Microsoft Windows
Mac OS, etc

Hardware Interoperability
HP
IBM
Sun StorageTek
Dell
HDS
EMC
NetApp
Apple
Generic and TCP/IP offloading network interface card (NIC)
Neterion
Intel, etc

Filesystem Independent
ext2 and ext3
FAT
FAT-32
NTFS
UFS
ZFS
CFS
VxFS, etc




                                          www.bloombase.com
Storage Area Network (SAN)
Extensive Storage Communication Protocol Support
Fiber Channel Protocol (FCP)
Fiber Channel over Ethernet (FCoE)
Internet Small Computer System Interface (iSCSI), etc

Platform Independent
Bloombase SpitfireOS
HP-UX
OpenVMS
IBM-AIX
Sun Solaris
Linux
Microsoft Windows
Mac OS, etc

Hardware Interoperability
HP
IBM
Sun StorageTek
Dell
HDS
EMC
NetApp
Apple
Brocade
Cisco
Emulex
Qlogic
Alacritech, etc

Filesystem Independent
Raw
ext2 and ext3
FAT
FAT-32
NTFS
UFS
ZFS
CFS
VxFS, etc




                                          www.bloombase.com
Tape Library and Virtual Tape Library (VTL)
Extensive Tape Communication Protocol Support
Fiber Channel
Low Voltage Differential (LVD) Small Computer System Interface (SCSI), etc

Platform Independent
Bloombase SpitfireOS
HP-UX
OpenVMS
IBM-AIX
Sun Solaris
Linux
Microsoft Windows
Mac OS, etc

Hardware Interoperability
HP
IBM
Sun StorageTek
Dell
HDS
EMC
NetApp
Apple
Brocade
Cisco
Emulex
Qlogic
Quantum
CommVault
FalconStor
Alacritech, etc




                                          www.bloombase.com
Key Management
Multiple certificate authority (CA) support
Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion
Built-in certificate request and revocation check (CRL/OCSP)
X.509 and PKCS#12 DER and PEM key import and export
Key Usage Profiling
RDBMS and Generic LDAP Support and Integration
Industry Standard PKCS#11
NIST FIPS-140-1 level 2 cryptographic module support (optional)
Automatic Certificate Retrieval via HTTP or LDAP
Certificate Validity Check
Certificate Revocation Check via HTTP or LDAP
Certificate Revocation List (CRL)
Certificate Revocation List Distribution Point (CRLDP)
Online Certificate Status Protocal (OCSP)
CRL scheduled download, caching and automatic retry
OCSP scheduled request, caching and automatic retry



Hardware Security Module Support
Gemalto/Schlumberger/Axalto Cryptoflex
Gemalto/Schlumberger/Axalto Cyberflex
Gemalto/Schlumberger/Axalto e-gate
Gemalto/Gemplus GPK
Aladdin eToken PRO
Hifn Express DS cards
Sun Microsystems Crypto Accelerator cards
Siemens CardOS M4
IBM JCOP
Micardo
Oberthur 64k Java-card
OpenPGP 1.0 card
Setcos 4.4.1 cards
RSA SecurID 3100 cards
Giesecke & Devrient Starcos
Eutrom CryptoIdendity IT-SEC
Rainbow iKey 3000




                                              www.bloombase.com
Standard Support and Certification
IEEE 1619 standard-based mode
OASIS Key Management Interoperability Protocol (KMIP) support
NIST FIPS 140-2 compliant Bloombase Cryptographic Module



Management
Web based management console
Central administration and configuration
User security
Serial console
SNMP v1, v2c, v3
syslog, auto log rotation and auto archive
Heartbeat and keep alive



Disaster Recovery
Configurations backup and restore
FIPS-140 hardware security module recovery key or software recovery key vault for settings restoration
Customer-defined recovery quorum (e.g. 2 of 5)
FIPS-140 hardware security module operator key or operator pin for daily Spitfire KeyCastle operation
High-availability option for active-active or active-standby operation
Stateless active-standby failover



Platform Support
Bloombase SpitfireOS
Solaris
HP-UX
OpenVMS
IBM AIX
Linux
Microsoft Windows
Mac OS X



Hardware Support
i386-base architecture
AMD 32 and 64 architecture
Intel Itanium-2 architecture
IBM Power6 architecture
PA-RISC architecture
UltraSPARC architecture




                                             www.bloombase.com
System Requirements
                                                                            System free memory 1GB
                                                                            Free storage space 1GB



                                                                            Warranty and Maintenance
                                                                            Software maintenance and support services are available.




Bloombase Technologies - Information Security Company

email info@bloombase.com
web http://www.bloombase.com


Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products
and services mentioned herein as well as their respective logos are
trademarks or registered trademarks of Bloombase Technologies Ltd in
Hong Kong, China and in several other countries all over the world. All
other product and service names mentioned are the trademarks of their
respective companies.

The information contained herein is subject to change without notice.
The only warranties for Bloombase products and services are set forth in
the express warranty statements accompanying such products and
services. Nothing herein should be construed as constituting an addi-
tional warranty. Bloombase shall not be liable for technical or editorial
errors or omissions contained herein.

Copyright 2008 Bloombase Technologies. All rights reserved.

Specification Sheet
H87998                                                                                                               www.bloombase.com

Mais conteúdo relacionado

Mais procurados

Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452IOSR Journals
 
High end security for low-end microcontrollers
High end security for low-end microcontrollersHigh end security for low-end microcontrollers
High end security for low-end microcontrollersMilosch Meriac
 
Introduction to CPSA
Introduction to CPSAIntroduction to CPSA
Introduction to CPSAfullhouseweb
 
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniBSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniShellmates
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20eyad alaa
 
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security
 
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and DevicesTriangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and DevicesTyler Shields
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code ScannerLuigi Perrone
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecurecnnetwork
 
A pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsA pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsB.A.
 
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Cisco Russia
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
15-382_TenAsys-RTOS-DataSheet_HI
15-382_TenAsys-RTOS-DataSheet_HI15-382_TenAsys-RTOS-DataSheet_HI
15-382_TenAsys-RTOS-DataSheet_HIAssaf Galil
 
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...gueste37130
 

Mais procurados (20)

Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452
 
High end security for low-end microcontrollers
High end security for low-end microcontrollersHigh end security for low-end microcontrollers
High end security for low-end microcontrollers
 
Introduction to CPSA
Introduction to CPSAIntroduction to CPSA
Introduction to CPSA
 
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniBSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
Linux security-fosster-09
Linux security-fosster-09Linux security-fosster-09
Linux security-fosster-09
 
6550
65506550
6550
 
VLSI IEEE 2014 TITLES
VLSI IEEE 2014 TITLESVLSI IEEE 2014 TITLES
VLSI IEEE 2014 TITLES
 
Essential security for linux servers
Essential security for linux serversEssential security for linux servers
Essential security for linux servers
 
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentation
 
Pki Training V1.5
Pki Training V1.5Pki Training V1.5
Pki Training V1.5
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and DevicesTriangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
 
A pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsA pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security Solutions
 
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
15-382_TenAsys-RTOS-DataSheet_HI
15-382_TenAsys-RTOS-DataSheet_HI15-382_TenAsys-RTOS-DataSheet_HI
15-382_TenAsys-RTOS-DataSheet_HI
 
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...
 

Destaque

Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Bloombase
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Bloombase
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase
 
Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2Bloombase
 
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...Bloombase
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase
 
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2Bloombase
 
ES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsBloombase
 
Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase
 
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3Bloombase
 
Bloombase Spitfire SOA Compatibility Matrix
Bloombase Spitfire SOA Compatibility MatrixBloombase Spitfire SOA Compatibility Matrix
Bloombase Spitfire SOA Compatibility MatrixBloombase
 
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...Bloombase
 
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Bloombase
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Bloombase
 

Destaque (15)

Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility Matrix
 
Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2
 
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
 
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
 
ES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager Essentials
 
Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server Specifications
 
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
 
Bloombase Spitfire SOA Compatibility Matrix
Bloombase Spitfire SOA Compatibility MatrixBloombase Spitfire SOA Compatibility Matrix
Bloombase Spitfire SOA Compatibility Matrix
 
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
 
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
 

Semelhante a Bloombase Spitfire StoreSafe Security Server Specifications

Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase
 
Bloombase Spitfire Ethernet Encryptor Specifications
Bloombase Spitfire Ethernet Encryptor SpecificationsBloombase Spitfire Ethernet Encryptor Specifications
Bloombase Spitfire Ethernet Encryptor SpecificationsBloombase
 
Bloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server SpecificationsBloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server SpecificationsBloombase
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestIBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestSandeep Patil
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase
 
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presalesMustafa Kuğu
 
FalconStor NSS Presentation
FalconStor NSS PresentationFalconStor NSS Presentation
FalconStor NSS Presentationrpsprowl
 
ComWorth' Sirius SwiftWing Hi Performance Capture & Storage Solutions
ComWorth'  Sirius SwiftWing Hi Performance Capture & Storage SolutionsComWorth'  Sirius SwiftWing Hi Performance Capture & Storage Solutions
ComWorth' Sirius SwiftWing Hi Performance Capture & Storage SolutionsComWorth Europe
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionADVA
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security Sandeep Patil
 
ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.Advanced Card Systems Ltd.
 
High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...Ramesh Nagappan
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Securing Millions of Devices
Securing Millions of DevicesSecuring Millions of Devices
Securing Millions of DevicesKai Hudalla
 
Bloombase StoreSafe Compatibility Matrix
Bloombase StoreSafe Compatibility MatrixBloombase StoreSafe Compatibility Matrix
Bloombase StoreSafe Compatibility MatrixBloombase
 
Summit 16: Deploying Virtualized Mobile Infrastructures on Openstack
Summit 16: Deploying Virtualized Mobile Infrastructures on OpenstackSummit 16: Deploying Virtualized Mobile Infrastructures on Openstack
Summit 16: Deploying Virtualized Mobile Infrastructures on OpenstackOPNFV
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIOHigh Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIORebekah Rodriguez
 

Semelhante a Bloombase Spitfire StoreSafe Security Server Specifications (20)

Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
 
Bloombase Spitfire Ethernet Encryptor Specifications
Bloombase Spitfire Ethernet Encryptor SpecificationsBloombase Spitfire Ethernet Encryptor Specifications
Bloombase Spitfire Ethernet Encryptor Specifications
 
Bloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server SpecificationsBloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server Specifications
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestIBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presales
 
FalconStor NSS Presentation
FalconStor NSS PresentationFalconStor NSS Presentation
FalconStor NSS Presentation
 
Quickassist adapter-8960-8970-brief
Quickassist adapter-8960-8970-briefQuickassist adapter-8960-8970-brief
Quickassist adapter-8960-8970-brief
 
ComWorth' Sirius SwiftWing Hi Performance Capture & Storage Solutions
ComWorth'  Sirius SwiftWing Hi Performance Capture & Storage SolutionsComWorth'  Sirius SwiftWing Hi Performance Capture & Storage Solutions
ComWorth' Sirius SwiftWing Hi Performance Capture & Storage Solutions
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security
 
ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.
 
High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...
 
NodeGrid Flex
NodeGrid FlexNodeGrid Flex
NodeGrid Flex
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Securing Millions of Devices
Securing Millions of DevicesSecuring Millions of Devices
Securing Millions of Devices
 
Bloombase StoreSafe Compatibility Matrix
Bloombase StoreSafe Compatibility MatrixBloombase StoreSafe Compatibility Matrix
Bloombase StoreSafe Compatibility Matrix
 
Summit 16: Deploying Virtualized Mobile Infrastructures on Openstack
Summit 16: Deploying Virtualized Mobile Infrastructures on OpenstackSummit 16: Deploying Virtualized Mobile Infrastructures on Openstack
Summit 16: Deploying Virtualized Mobile Infrastructures on Openstack
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIOHigh Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
 

Mais de Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Bloombase
 

Mais de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 

Último

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Último (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Bloombase Spitfire StoreSafe Security Server Specifications

  • 1. Specification Sheet Bloombase Spitfire StoreSafe Storage Security Server Features Transparent Encryption and Decryption High performance and intelligent cryptographic engine sensing network storage information and carry out cryptographic operations based on user-predefined rules. No user training required. Data to be stored are encrypted and data to be read are decrypted automatically on the fly under the covers requiring no change on user workflow and application logic. Hardware, Platform and Filesystem Independent Spitfire StoreSafe Security Server supports all platforms conforming to industrial storage communications protocols and it operates on the storage networking layer abstracting filesystem underneath or above. High Performance Patent pending Spitfire Transparent Cache minimizes performance degradation as a result of real-time encryption and decryption, pushing encryption throughput to the limits at gigabit and 10-gigabit wire- speeds. Flexible and Secure Access Control Fine grain user and host access control suiting all enterprise storage security needs. High Availability Highly scalable and multiple Spitfire StoreSafe boxes running in cluster for failover in mission-critical systems and load-balancing for high-throughput storage systems. Security Industry-proven cryptographic processing engine NIST FIPS-197 AES encryption and decryption IEEE 1619-compliant AES XTS block cipher Japan NTT/Mitsubishi Electric Camellia encryption and decryption Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption NIST FIPS-46-3 3DES and DES encryption and decryption RC2, RC4, RC5 and RC6 encryption and decryption CAST5 encryption and decryption Twofish and Blowfish encryption and decryption IDEA encryption and decryption Serpent and Skipjack encryption and decryption Pluggable cipher architecture for future cipher upgrade or custom cipher support 128, 256, 512, 1024 and 2048 bit public key cryptography RSA and DSA public key cryptography SHA-1, MD5 and Chinese National SCH(SM3) hash generation Hardware ASIC cryptographic acceleration (optional) Obfuscation and data shuffling for simple data hiding www.bloombase.com
  • 2. Storage Systems Direct Attached Storage (DAS) Network Attached Storage (NAS) Storage Area Network (SAN) Fiber Channel (FC) and LVD SCSI tape library and virtual tape library (VTL) Privacy Control Automated file-based and block-based encryption on storage device and file write operations Automated decryption on storage device and file read operations on trusted hosts and clients Multiple key encryption Fix-sized file header regardless of actual file size for file-based protection No additional storage required for block-based protection Access Control Fine grain read/write/create/delete/list access control Time-window-based access control Zero alteration to actual storage contents Zero impact to performance Integrity Control Automated filesystem object digital signature generation File integrity verification Multiple key digital signature generation Fix-sized file header regardless of actual file size Write-Once-Read-Many (WORM) Write-once-read-many feature resembling non-rewritable optical media supporting secure archival of data eliminating potential risks being overwritten by intention or accidental operation For storage archival, compliance, dynamic capacity management and information lifecycle management (ILM) Policy based engine dynamically adapts to changing demands in data requirements, by moving files auto- matically and transparently to appropriate tiered storage Rule based configuration for permanently delete and/or shred file contents Authentication and Authorization User-based and role-based authentication and authorization Generic Lightweight Directory Access Protocol (LDAP) and Microsoft Active Directory (MSAD) authentication and authorization Host-based authentication and authorization Microsoft NT Lan Manager (NTLM) authentication Challenge Handshake Authentication Protocol (CHAP) based discovery and authentication www.bloombase.com
  • 3. Direct Attached Storage (DAS) Extensive Storage Communication Protocol Support Fiber Channel Protocol (FCP) Fiber Channel over Ethernet (FCoE) Internet Small Computer System Interface (iSCSI) Small Computer System Interface (SCSI) Serial Attached SCSI (SAS) Serial Advanced Technology Attachment (SATA) Parallel Advanced Technology Attachment (PATA)/Integrated Drive Electronics (IDE), etc Platform Independent Bloombase SpitfireOS HP-UX OpenVMS IBM-AIX Sun Solaris Linux Microsoft Windows Mac OS, etc Hardware Interoperability HP IBM Sun StorageTek Dell HDS EMC NetApp Apple Ultra 160 SCSI low voltage differential (LVD) compliant host bus adapter (HBA) Emulex Qlogic, etc Filesystem Independent Raw ext2 and ext3 FAT FAT-32 NTFS UFS ZFS CFS VxFS, etc www.bloombase.com
  • 4. Network Attached Storage (NAS) Extensive Storage Communication Protocol Support Network File System (NFS) Common Internet File System (CIFS)/Server Message Block (SMB) Andrew File System (AFS) NetWare Core Protocol (NCP) Hypertext Transfer Protocol (HTTP) File Transfer Protocol (FTP), etc Platform Independent Bloombase SpitfireOS HP-UX OpenVMS IBM-AIX Sun Solaris Linux Microsoft Windows Mac OS, etc Hardware Interoperability HP IBM Sun StorageTek Dell HDS EMC NetApp Apple Generic and TCP/IP offloading network interface card (NIC) Neterion Intel, etc Filesystem Independent ext2 and ext3 FAT FAT-32 NTFS UFS ZFS CFS VxFS, etc www.bloombase.com
  • 5. Storage Area Network (SAN) Extensive Storage Communication Protocol Support Fiber Channel Protocol (FCP) Fiber Channel over Ethernet (FCoE) Internet Small Computer System Interface (iSCSI), etc Platform Independent Bloombase SpitfireOS HP-UX OpenVMS IBM-AIX Sun Solaris Linux Microsoft Windows Mac OS, etc Hardware Interoperability HP IBM Sun StorageTek Dell HDS EMC NetApp Apple Brocade Cisco Emulex Qlogic Alacritech, etc Filesystem Independent Raw ext2 and ext3 FAT FAT-32 NTFS UFS ZFS CFS VxFS, etc www.bloombase.com
  • 6. Tape Library and Virtual Tape Library (VTL) Extensive Tape Communication Protocol Support Fiber Channel Low Voltage Differential (LVD) Small Computer System Interface (SCSI), etc Platform Independent Bloombase SpitfireOS HP-UX OpenVMS IBM-AIX Sun Solaris Linux Microsoft Windows Mac OS, etc Hardware Interoperability HP IBM Sun StorageTek Dell HDS EMC NetApp Apple Brocade Cisco Emulex Qlogic Quantum CommVault FalconStor Alacritech, etc www.bloombase.com
  • 7. Key Management Multiple certificate authority (CA) support Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion Built-in certificate request and revocation check (CRL/OCSP) X.509 and PKCS#12 DER and PEM key import and export Key Usage Profiling RDBMS and Generic LDAP Support and Integration Industry Standard PKCS#11 NIST FIPS-140-1 level 2 cryptographic module support (optional) Automatic Certificate Retrieval via HTTP or LDAP Certificate Validity Check Certificate Revocation Check via HTTP or LDAP Certificate Revocation List (CRL) Certificate Revocation List Distribution Point (CRLDP) Online Certificate Status Protocal (OCSP) CRL scheduled download, caching and automatic retry OCSP scheduled request, caching and automatic retry Hardware Security Module Support Gemalto/Schlumberger/Axalto Cryptoflex Gemalto/Schlumberger/Axalto Cyberflex Gemalto/Schlumberger/Axalto e-gate Gemalto/Gemplus GPK Aladdin eToken PRO Hifn Express DS cards Sun Microsystems Crypto Accelerator cards Siemens CardOS M4 IBM JCOP Micardo Oberthur 64k Java-card OpenPGP 1.0 card Setcos 4.4.1 cards RSA SecurID 3100 cards Giesecke & Devrient Starcos Eutrom CryptoIdendity IT-SEC Rainbow iKey 3000 www.bloombase.com
  • 8. Standard Support and Certification IEEE 1619 standard-based mode OASIS Key Management Interoperability Protocol (KMIP) support NIST FIPS 140-2 compliant Bloombase Cryptographic Module Management Web based management console Central administration and configuration User security Serial console SNMP v1, v2c, v3 syslog, auto log rotation and auto archive Heartbeat and keep alive Disaster Recovery Configurations backup and restore FIPS-140 hardware security module recovery key or software recovery key vault for settings restoration Customer-defined recovery quorum (e.g. 2 of 5) FIPS-140 hardware security module operator key or operator pin for daily Spitfire KeyCastle operation High-availability option for active-active or active-standby operation Stateless active-standby failover Platform Support Bloombase SpitfireOS Solaris HP-UX OpenVMS IBM AIX Linux Microsoft Windows Mac OS X Hardware Support i386-base architecture AMD 32 and 64 architecture Intel Itanium-2 architecture IBM Power6 architecture PA-RISC architecture UltraSPARC architecture www.bloombase.com
  • 9. System Requirements System free memory 1GB Free storage space 1GB Warranty and Maintenance Software maintenance and support services are available. Bloombase Technologies - Information Security Company email info@bloombase.com web http://www.bloombase.com Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase Technologies Ltd in Hong Kong, China and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an addi- tional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. Copyright 2008 Bloombase Technologies. All rights reserved. Specification Sheet H87998 www.bloombase.com