SlideShare uma empresa Scribd logo
1 de 3
BLOOMBASE TURNKEY DATA-AT-REST
SECURITY COMPLIANCE SOLUTION
FOR EMC CELERRA

                                                 EMC CELERRA WITH BLOOMBASE SPITFIRE STORESAFE
 ESSENTIALS
                                                 Electronic business data represents an invaluable core asset of today’s enterprises and
                                                 organizations. Enterprise customers are concerned about being able to manage and use
 • Bloombase Spitfire StoreSafe is an            sensitive information to optimize day-to-day business operations, while protecting it and
   industry-proven solution for immediate
                                                 satisfying information privacy compliance needs—without the expense of drastic system
   security compliance of various standards
   including HIPAA, PCI DSS, SB 1386, SOX,       change and performance degradation.
   and more                                      The Bloombase Spitfire data-at-rest solution offers advanced security capabilities for a reliable,
 • Bundled Spitfire KeyCastle enables            application-transparent, cipher-text information storage infrastructure. Its tamper-proof
   automated initial migration of EMC Celerra    hardware encryption key security module ensures confidentiality and integrity throughout
   contents, rekey, and full lifecycle
                                                 its whole lifecycle. Bloombase Spitfire Cryptographic Module is NIST FIPS 140-2 certified
   management of cryptographic keys
                                                 providing FIPS-approved RSA and AES cryptographic algorithms, together with non-FIPS
 • A web-based management console,
                                                 ciphers including Camellia, SEED, 3DES, Twofish, Blowfish, etc.
   command line interface console, and
   SNMP offer total, simplified management       Sensitive persistent data is stored as cipher-text securely stored in EMC® Celerra®. The
 • Unlike proprietary dedicated hardware         encryption and un-encryption processes are automated by re-routing storage paths via
   with a high entry price, Bloombase Spitfire   Bloombase Spitfire StoreSafe Security Server cluster providing virtual plain contents to
   assumes a pay-as-you-go licensing model
                                                 authorized hosts and applications.
   to help reduce your initial investment
 • To maximize ROI, a single Bloombase           EMC Celerra storage targets are accessed by iSCSI, CIFS, and/or NFS storage protocols via
   Spitfire StoreSafe product:                   Bloombase Spitfire StoreSafe Security Servers. Ciphered sensitive information is stored in
   – Enables multiple storage hosts and          the EMC Celerra storage system for centralized management. Only authorized access of
     applications to produce and consume         virtual-plain information, by trusted applications and systems, per access rules and security
     secured at-rest data                        profiles governed by Bloombase Spitfire StoreSafe encryptors is permitted. Application data
   – Supports multiple EMC Celerra LUNs, file    files, directories, and storage volumes are protected by strong encryption offered by
     servers, and shares                         Bloombase Spitfire StoreSafe virtual storages, enabling application servers to achieve
   – Supports both file- and block-based         various information privacy compliance standards immediately and effectively.
     protection for CIFS, NFS, and/or iSCSI
     EMC Celerra storage resources
                                                 SOLUTION ARCHITECTURE
                                                 The Bloombase Spitfire data-at-rest encryption solution offers wire-speed, on-the-fly
                                                 encryption and un-encryption of storage data in an EMC Celerra network-attached storage
                                                 (NAS) system. It requires minimum change in the application tier by dropping-in Spitfire
                                                 StoreSafe security servers in the storage paths.

                                                 The Bloombase Spitfire High Availability Suite brings together dual Spitfire security servers
                                                 as a cluster so when active node fails, backup node picks up and maintains non-stop,
                                                 mission-critical service at complete storage and host transparency, requiring minimal
                                                 operator attention. Extending to the disaster recovery infrastructure, storage cipher-texts at
                                                 the primary site are replicated in their natural encrypted form over a private network to a
                                                 backup storage system at a secondary site, and secured by a replica of Bloombase Spitfire




SOLUTION OVERVIEW
StoreSafe and KeyCastle servers. As storage contents reside on EMC Celerra in their native
ciphered form, data backup done over the physical storage resources is inherently
encrypted, immediately satisfying secure archival needs.

The easy-to-manage Bloombase Spitfire storage security solution helps organizational cus-
tomers enforce data confidentiality for storage, which improves overall system security,
enables fast key rotation, reduces user workflows, segregates data ownership from adminis-
tration and operation, and enhances efficiency and internal controls.




Figure 1.


RESULTS
• A TPC-C-based database benchmarking test is carried out on a sample database stored in
  an EMC Celerra secured by a Bloombase Spitfire StoreSafe storage security solution.

• TPC-C-like queries (with EMC Celerra read, Bloombase Spitfire unencryption) and updates
  (with Celerra write, Bloombase Spitfire encryption) are generated and applied to simulate
  workload on the EMC Celerra/Bloombase Spitfire setup.




Figure 2. TPC-C queries

• For TPC-C queries, Bloombase Spitfire StoreSafe encrypted database server stored in EMC
  Celerra recorded a nine percent drop in throughput, compared to 31 percent for host-based
  and 64 percent for column-based.
Figure 3. TPC-C inserts and update

                                                     • For TPC-C inserts and updates, Bloombase Spitfire StoreSafe encrypted database stored in
                                                       EMC Celerra recorded a 12 percent drop in throughput, compared to 53 percent for host-
                                                       based and 59 percent for column-based.


                                                     CONCLUSIONS
                                                     • Wire-speed encryption performance with least degradation in storage I/O and throughput

                                                     • Turnkey and proven solution for immediate compliance to stringent information confidenti-
                                                       ality regulatory requirements, no application change or second development needed

                                                     • Fast deployment and automated migration versus alternatives’ manual script-based migra-
                                                       tion approach

                                                     • iSCSI block-based and CIFS file-based encryption in a single solution

                                                     • Highly secure NIST FIPS 140-2 level 3 total key management

                                                     • Highly available and fault-tolerant

                                                     • Low total cost of ownership


                                                     ABOUT BLOOMBASE
                                                     Bloombase develops and markets Spitfire and Keyparc information security compliance solu-
                                                     tions for enterprises and organizations to address data-at-rest and in-flight threats. Focused
                                                     on solving the problem of securing enterprise transit and storage data, Bloombase has pio-
                                                     neered the use of encryption and authentication technologies that fit transparently into any
                                                     enterprise IT environment. For more information, please refer to http://www.bloombase.com.


  CONTACT US                                         ABOUT EMC
  To learn how EMC products, services, and           EMC Corporation is the world’s leading developer and provider of information infrastructure
  solutions can help solve your business and         technology and solutions that enable organizations of all sizes to transform the way they
  IT challenges, contact your local representative   compete and create value from their information. Information about EMC’s products and
  or authorized reseller—or visit us at              services can be found at www.EMC.com.
  www.EMC.com.




                                                     EMC2, EMC, Celerra, the EMC logo, and where information lives are registered trademarks or trademarks of EMC Corporation in the
                                                     United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2011
                                                     EMC Corporation. All rights reserved. Published in the USA. 01/11 Solution Overview H8568



EMC Corporation
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.EMC.com

Mais conteúdo relacionado

Mais procurados

Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data Centers
Cisco Russia
 
Avamar weekly webcast
Avamar weekly webcastAvamar weekly webcast
Avamar weekly webcast
stefriche0199
 
Mellanox hpc day 2011 kiev
Mellanox hpc day 2011 kievMellanox hpc day 2011 kiev
Mellanox hpc day 2011 kiev
Volodymyr Saviak
 
Colocube Enterprise Cloud Solutions
Colocube Enterprise Cloud SolutionsColocube Enterprise Cloud Solutions
Colocube Enterprise Cloud Solutions
lynnkuroski
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
jpo1974
 
Customer Success - A Government Security Agency
Customer Success - A Government Security AgencyCustomer Success - A Government Security Agency
Customer Success - A Government Security Agency
Bloombase
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
ljaquet
 

Mais procurados (18)

Xo Managed Backup Customer Presentation
Xo Managed Backup Customer PresentationXo Managed Backup Customer Presentation
Xo Managed Backup Customer Presentation
 
Designing Secure Cisco Data Centers
Designing Secure Cisco Data CentersDesigning Secure Cisco Data Centers
Designing Secure Cisco Data Centers
 
Scalable midsize data center designs
Scalable midsize data center designsScalable midsize data center designs
Scalable midsize data center designs
 
Avamar weekly webcast
Avamar weekly webcastAvamar weekly webcast
Avamar weekly webcast
 
Mellanox hpc day 2011 kiev
Mellanox hpc day 2011 kievMellanox hpc day 2011 kiev
Mellanox hpc day 2011 kiev
 
Colocube Enterprise Cloud Solutions
Colocube Enterprise Cloud SolutionsColocube Enterprise Cloud Solutions
Colocube Enterprise Cloud Solutions
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
 
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
Transforming Backup and Recovery in VMware environments with EMC Avamar and D...
 
Customer Success - A Government Security Agency
Customer Success - A Government Security AgencyCustomer Success - A Government Security Agency
Customer Success - A Government Security Agency
 
Avamar 7 2010
Avamar 7 2010Avamar 7 2010
Avamar 7 2010
 
2012 10 sep-gwava_novell_backup_and_more
2012 10 sep-gwava_novell_backup_and_more2012 10 sep-gwava_novell_backup_and_more
2012 10 sep-gwava_novell_backup_and_more
 
Virtualization Technology and Directions ( EMC World 2010 )
Virtualization Technology and Directions ( EMC World 2010 )Virtualization Technology and Directions ( EMC World 2010 )
Virtualization Technology and Directions ( EMC World 2010 )
 
Verax Nms - Product Presentation
Verax Nms - Product PresentationVerax Nms - Product Presentation
Verax Nms - Product Presentation
 
Emc storag
Emc storagEmc storag
Emc storag
 
Scale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC IsilonScale-Out Data Lake with EMC Isilon
Scale-Out Data Lake with EMC Isilon
 
Prueba para postear un ppt
Prueba para postear un pptPrueba para postear un ppt
Prueba para postear un ppt
 
Interview operating system solaris
Interview operating system solarisInterview operating system solaris
Interview operating system solaris
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
 

Semelhante a Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra

Customer Success - A Government Organization
Customer Success - A Government OrganizationCustomer Success - A Government Organization
Customer Success - A Government Organization
Bloombase
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Bloombase
 
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-PacificCustomer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Bloombase
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facility
ramparasa
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facility
ramparasa
 

Semelhante a Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra (20)

H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
Customer Success - A Government Organization
Customer Success - A Government OrganizationCustomer Success - A Government Organization
Customer Success - A Government Organization
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
EMC Symmetrix Data at Rest Encryption - Detailed Review
EMC Symmetrix Data at Rest Encryption - Detailed Review EMC Symmetrix Data at Rest Encryption - Detailed Review
EMC Symmetrix Data at Rest Encryption - Detailed Review
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-PacificCustomer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
 
High Res CIO Review Article
High Res CIO Review ArticleHigh Res CIO Review Article
High Res CIO Review Article
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
emc world keynote gelsinger
emc world keynote gelsinger emc world keynote gelsinger
emc world keynote gelsinger
 
Transforming Mission Critical Applications
Transforming Mission Critical ApplicationsTransforming Mission Critical Applications
Transforming Mission Critical Applications
 
SMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution BriefSMBStream™ Office to Office File Acceleration | Solution Brief
SMBStream™ Office to Office File Acceleration | Solution Brief
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facility
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facility
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
Bloombase store safe mf solution brief 2018 r0.91
Bloombase store safe   mf solution brief 2018 r0.91Bloombase store safe   mf solution brief 2018 r0.91
Bloombase store safe mf solution brief 2018 r0.91
 
Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400
 
Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sb
 

Mais de Bloombase

Mais de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbooklet
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra

  • 1. BLOOMBASE TURNKEY DATA-AT-REST SECURITY COMPLIANCE SOLUTION FOR EMC CELERRA EMC CELERRA WITH BLOOMBASE SPITFIRE STORESAFE ESSENTIALS Electronic business data represents an invaluable core asset of today’s enterprises and organizations. Enterprise customers are concerned about being able to manage and use • Bloombase Spitfire StoreSafe is an sensitive information to optimize day-to-day business operations, while protecting it and industry-proven solution for immediate satisfying information privacy compliance needs—without the expense of drastic system security compliance of various standards including HIPAA, PCI DSS, SB 1386, SOX, change and performance degradation. and more The Bloombase Spitfire data-at-rest solution offers advanced security capabilities for a reliable, • Bundled Spitfire KeyCastle enables application-transparent, cipher-text information storage infrastructure. Its tamper-proof automated initial migration of EMC Celerra hardware encryption key security module ensures confidentiality and integrity throughout contents, rekey, and full lifecycle its whole lifecycle. Bloombase Spitfire Cryptographic Module is NIST FIPS 140-2 certified management of cryptographic keys providing FIPS-approved RSA and AES cryptographic algorithms, together with non-FIPS • A web-based management console, ciphers including Camellia, SEED, 3DES, Twofish, Blowfish, etc. command line interface console, and SNMP offer total, simplified management Sensitive persistent data is stored as cipher-text securely stored in EMC® Celerra®. The • Unlike proprietary dedicated hardware encryption and un-encryption processes are automated by re-routing storage paths via with a high entry price, Bloombase Spitfire Bloombase Spitfire StoreSafe Security Server cluster providing virtual plain contents to assumes a pay-as-you-go licensing model authorized hosts and applications. to help reduce your initial investment • To maximize ROI, a single Bloombase EMC Celerra storage targets are accessed by iSCSI, CIFS, and/or NFS storage protocols via Spitfire StoreSafe product: Bloombase Spitfire StoreSafe Security Servers. Ciphered sensitive information is stored in – Enables multiple storage hosts and the EMC Celerra storage system for centralized management. Only authorized access of applications to produce and consume virtual-plain information, by trusted applications and systems, per access rules and security secured at-rest data profiles governed by Bloombase Spitfire StoreSafe encryptors is permitted. Application data – Supports multiple EMC Celerra LUNs, file files, directories, and storage volumes are protected by strong encryption offered by servers, and shares Bloombase Spitfire StoreSafe virtual storages, enabling application servers to achieve – Supports both file- and block-based various information privacy compliance standards immediately and effectively. protection for CIFS, NFS, and/or iSCSI EMC Celerra storage resources SOLUTION ARCHITECTURE The Bloombase Spitfire data-at-rest encryption solution offers wire-speed, on-the-fly encryption and un-encryption of storage data in an EMC Celerra network-attached storage (NAS) system. It requires minimum change in the application tier by dropping-in Spitfire StoreSafe security servers in the storage paths. The Bloombase Spitfire High Availability Suite brings together dual Spitfire security servers as a cluster so when active node fails, backup node picks up and maintains non-stop, mission-critical service at complete storage and host transparency, requiring minimal operator attention. Extending to the disaster recovery infrastructure, storage cipher-texts at the primary site are replicated in their natural encrypted form over a private network to a backup storage system at a secondary site, and secured by a replica of Bloombase Spitfire SOLUTION OVERVIEW
  • 2. StoreSafe and KeyCastle servers. As storage contents reside on EMC Celerra in their native ciphered form, data backup done over the physical storage resources is inherently encrypted, immediately satisfying secure archival needs. The easy-to-manage Bloombase Spitfire storage security solution helps organizational cus- tomers enforce data confidentiality for storage, which improves overall system security, enables fast key rotation, reduces user workflows, segregates data ownership from adminis- tration and operation, and enhances efficiency and internal controls. Figure 1. RESULTS • A TPC-C-based database benchmarking test is carried out on a sample database stored in an EMC Celerra secured by a Bloombase Spitfire StoreSafe storage security solution. • TPC-C-like queries (with EMC Celerra read, Bloombase Spitfire unencryption) and updates (with Celerra write, Bloombase Spitfire encryption) are generated and applied to simulate workload on the EMC Celerra/Bloombase Spitfire setup. Figure 2. TPC-C queries • For TPC-C queries, Bloombase Spitfire StoreSafe encrypted database server stored in EMC Celerra recorded a nine percent drop in throughput, compared to 31 percent for host-based and 64 percent for column-based.
  • 3. Figure 3. TPC-C inserts and update • For TPC-C inserts and updates, Bloombase Spitfire StoreSafe encrypted database stored in EMC Celerra recorded a 12 percent drop in throughput, compared to 53 percent for host- based and 59 percent for column-based. CONCLUSIONS • Wire-speed encryption performance with least degradation in storage I/O and throughput • Turnkey and proven solution for immediate compliance to stringent information confidenti- ality regulatory requirements, no application change or second development needed • Fast deployment and automated migration versus alternatives’ manual script-based migra- tion approach • iSCSI block-based and CIFS file-based encryption in a single solution • Highly secure NIST FIPS 140-2 level 3 total key management • Highly available and fault-tolerant • Low total cost of ownership ABOUT BLOOMBASE Bloombase develops and markets Spitfire and Keyparc information security compliance solu- tions for enterprises and organizations to address data-at-rest and in-flight threats. Focused on solving the problem of securing enterprise transit and storage data, Bloombase has pio- neered the use of encryption and authentication technologies that fit transparently into any enterprise IT environment. For more information, please refer to http://www.bloombase.com. CONTACT US ABOUT EMC To learn how EMC products, services, and EMC Corporation is the world’s leading developer and provider of information infrastructure solutions can help solve your business and technology and solutions that enable organizations of all sizes to transform the way they IT challenges, contact your local representative compete and create value from their information. Information about EMC’s products and or authorized reseller—or visit us at services can be found at www.EMC.com. www.EMC.com. EMC2, EMC, Celerra, the EMC logo, and where information lives are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2011 EMC Corporation. All rights reserved. Published in the USA. 01/11 Solution Overview H8568 EMC Corporation Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.EMC.com