SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Hitachi Data Systems and Bloombase application-transparent encryption
solution:
n Safeguards data with industry-standard cryptography.
n Protects against outbound data exposure threats.
n Allows both on- and off-premises deployment.
n Meets confidentiality, regulatory compliance requirements.
DATASHEET
Mitigate Catastrophic Data
Exposure Vulnerabilities
For any enterprise, unauthorized data
exposure remains a critical, yet unresolved
problem. The causes can be both inten-
tional (hardware theft, espionage and so on)
and unintentional (media loss, viral attacks,
and so on). The unbridled rate at which
global businesses are taking advantage of
off-premises cloud and managed services
is only going to exacerbate the problem:
These offerings can increase the risk of
exposure, regardless of the number of net-
work defenses in place.
The Increasing Complexities
of Protecting Stored Data
A paradigm shift in the approach to data
management is evident: There is a move
away from managing a restrictive set of
critical data stored in a structured relational
database management system (RDBMS)
to the management and storage of virtually
everything and anything. There is also a
concomitant shift in the way data is stored:
from on-premises storage infrastructure
to off-premises cloud, platform as a ser-
vice (PaaS), managed service provider
(MSP), and so on. Although the use of
data encryption is vital for the protection
of information, database-level encryption
does not work with unstructured data for
Bloombase StoreSafe Data-at-Rest Security for Hitachi Content Platform
analytics applications. Furthermore, propri-
etary point-based encryption tool kits are
hard to maintain and difficult to integrate
into existing applications and software-as-
a-service (SaaS) environments. Then, there
is storage-based encryption, which involves
hardware infrastructure changes and rein-
vestment, often resulting in vendor lock-in
and posing challenges for cloud-based
models.
To combat these data vulnerability
challenges, Hitachi Data Systems and
Bloombase are offering a joint solution
based on Hitachi Content Platform (HCP)
and Bloombase StoreSafe (see Figure 1).
Bloombase StoreSafe:
Maximum Storage Security,
Minimum Effort Required
Bloombase StoreSafe is an agentless,
turnkey encryption solution for data-
at-rest applications. Its nondisruptive,
application-transparent and protocol-
preserving features make it ideally suited
to protecting a plethora of storage infra-
structures. It secures infrastructures from
on-premises storage systems [including
SAN, NAS, DAS, disk storage systems,
tape library, virtual tape library (VTL) and
object stores, for instance] to virtualization
(hypervisor data stores), big data (Hadoop)
and even off-premises cloud storage (AWS
S3 and EBS, OpenStack Swift and Cinder,
Google Cloud Storage, and Microsoft®
Azure™
Storage, for example).
Bloombase StoreSafe operates as a stor-
age proxy over heterogeneous networked
storage environments. To the network, the
solution looks like a virtual LUN, a network
share, VTL storage target or even a RESTful
storage service endpoint. As applications
make data storage requests, Bloombase
StoreSafe automatically and transparently
encrypts the plain text before it is physically
persisted in the storage medium. Likewise,
decryption of cipher text is performed on
the fly as data is requested from the per-
sistent storage, presenting the clear text
to the requesting application as if it were
Figure 1. The new Hitachi Data Systems and
Bloombase application-transparent security
solution safeguards data with industry-
standard cryptography.
DATASHEET
© Hitachi Data Systems Corporation 2014. All rights reserved. HITACHI is a trademark or registered trademark of Hitachi, Ltd. Microsoft and Azure are trademarks or registered
trademarks of Microsoft Corporation. All other trademarks, service marks, and company names are properties of their respective owners.
DS-354-A DG October 2014
Corporate Headquarters
2845 Lafayette Street
Santa Clara, CA 95050-2639 USA
www.HDS.com community.HDS.com
Regional Contact Information
Americas: +1 408 970 1000 or info@hds.com
Europe, Middle East and Africa: +44 (0) 1753 618000 or info.emea@hds.com
Asia Pacific: +852 3189 7900 or hds.marketing.apac@hds.com
never encrypted. This schema guarantees
operational transparency and maximum
interoperability. Unauthorized clients
accessing data from a StoreSafe protected
persistent storage will be unable to interpret
the protected cipher text.
Supporting a host of industry-standard pro-
tocols, StoreSafe is application transparent,
operating-system agnostic, portable across
storage technologies and vendor neutral.
Purpose-built, StoreSafe is a software appli-
ance adapted for deployment on commodity
hardware servers in both physical data centers
and virtual data centers. It can be deployed on
hypervisors and private clouds, or as compute
instances on cloud infrastructures.
Hitachi Content Platform:
Enterprise-Class Cloud Storage
Hitachi Content Platform is an unstructured
content object store that facilitates access
and retention of data in a multitenant envi-
ronment. Through HCP, applications interact
with content over standard network storage
protocols. Organizations can quickly provision
storage across different on- and off-premises
data center topologies while retaining the free-
dom to move data quickly and automatically.
An intelligent, object storage system, HCP
supports multiple tiers of storage for a wide
range of structured and unstructured con-
tent. It also offers a multitenant architecture
and object versioning, all in a single platform.
Other features include:
■■ Content immutability via “write once, read
many” (WORM) capabilities.
■■ Content retention at the storage layer.
■■ Encryption of data against unauthorized
access.
■■ Deduplication capabilities: compression;
built-in data protection, verification and
repair; bi-directional tier to cloud.
■■ Replication services for disaster recovery.
■■ High scalability, up to 80PB.
Data Protection Services
Hitachi Data Systems offers various data protection and replication services that sim-
plify and accelerate local and remote data replication and disaster recovery solutions.
These solutions enable normal business operations to resume in minutes, rather than
hours or days, following a primary site outage. They help you meet your service levels
quicker and with lower risk.
HCP and StoreSafe: Security,
Flexibility and Performance
The Bloombase StoreSafe solution integrates
with anything from traditional storage systems
to next-generation object storage solutions
like Hitachi Content Platform. StoreSafe pro-
vides robust and reliable privacy protection
for content management, retention, backup
and archival applications with HCP. StoreSafe
supports transparent encryption protection of
HCP data content over network storage pro-
tocols including NFS, CIFS, HTTP, WebDAV,
AWS S3 and other RESTful storage services.
This allows existing HCP applications to auto-
matically encrypt business-sensitive data as
they write through StoreSafe. Likewise, by
retrieving secure HCP content via StoreSafe,
encrypted information is automatically
deciphered and presented to trusted HCP
applications as plain text. Without needing
to modify the business logic of HCP applica-
tions, organizations can immediately ensure
that their business-sensitive information is
managed by HCP securely and meets data
privacy regulatory compliance requirements.
StoreSafe realizes true separation of duties
(SoD) without impacting storage administra-
tors and operators. Data is stored in standard
volumes, shares, files and objects and are
encrypted or decrypted on the fly without
supervision and transparently. StoreSafe
seamlessly protects both on- and off-
premises at-rest data, regardless of the
complexity of the heterogeneous storage
infrastructure or storage medium. It can just
as easily protect data in content addressed
storage (CAS) such as object stores, tape
libraries, VTLs and various cloud storage ser-
vices. Enterprises can mitigate data leakage
threats and still meet data privacy and regula-
tory compliance requirements cost effectively.
Because of its transparent, agentless storage
proxy schema, the solution is futureproof and
ensures easy integration with any storage
technology.
Highly scalable, StoreSafe is built for high
availability and mission-critical applications. It
offers high-speed AES encryption and indus-
try standard IEEE 1619 compliant storage
security. StoreSafe leverages Intel’s AES-NI
cryptographic accelerator to dynamically even
out encryption workloads. There is a built-in
pluggable cipher algorithm architecture that
facilitates adaptation and enables compliance
with specific national and vertical market
security requirements. Other supported
standards include built-in NIST FIPS 140-2
certified key management and support for
PKCS#11 hardware security modules (HSM)
and OASIS KMIP compliant key managers.
Together, Hitachi Data
Systems and Bloombase
deliver unique transparent
encryption protection. They
enable business applications
to secure unstructured data
contents seamlessly with
validated cryptographic technologies at zero
operational change. These capabilities give
applications a trusted data environment for
day-to-day storage and long-term archival. To
learn more, contact your HDS or Bloombase
representative or visit www.HDS.com.
LEARN MORE
HDS and
Bloombase

Mais conteúdo relacionado

Mais procurados

The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012Валерий Коржов
 
Object storage
Object storageObject storage
Object storageronpoul
 
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva
 
How e fpga future proofs data centers
How e fpga future proofs data centersHow e fpga future proofs data centers
How e fpga future proofs data centersdonnabrown085
 
Stackscale, infrastructure, bare-metal and private cloud
Stackscale, infrastructure, bare-metal and private cloudStackscale, infrastructure, bare-metal and private cloud
Stackscale, infrastructure, bare-metal and private cloudDavid Carrero Fdez-Baillo
 
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM India Smarter Computing
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionInka Traktman
 
Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)SP Home Run Inc.
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword EU Project
 
Storage Training July 10
Storage Training July 10Storage Training July 10
Storage Training July 10Fiaz27
 
Transceiver – How They Help Support Big Data in Data Centers?
 Transceiver – How They Help Support Big Data in Data Centers? Transceiver – How They Help Support Big Data in Data Centers?
Transceiver – How They Help Support Big Data in Data Centers?Fern Xu
 
Cloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix OverviewCloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix OverviewNirvanix
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storagePreludedx
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQDruva
 
Webinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File SystemWebinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File SystemStorage Switzerland
 
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Adnene Guabtni
 

Mais procurados (20)

F017414853
F017414853F017414853
F017414853
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
 
Object storage
Object storageObject storage
Object storage
 
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
 
How e fpga future proofs data centers
How e fpga future proofs data centersHow e fpga future proofs data centers
How e fpga future proofs data centers
 
Stackscale, infrastructure, bare-metal and private cloud
Stackscale, infrastructure, bare-metal and private cloudStackscale, infrastructure, bare-metal and private cloud
Stackscale, infrastructure, bare-metal and private cloud
 
Infrastructure Training Session
Infrastructure Training SessionInfrastructure Training Session
Infrastructure Training Session
 
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protection
 
Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges
 
Storage Training July 10
Storage Training July 10Storage Training July 10
Storage Training July 10
 
Transceiver – How They Help Support Big Data in Data Centers?
 Transceiver – How They Help Support Big Data in Data Centers? Transceiver – How They Help Support Big Data in Data Centers?
Transceiver – How They Help Support Big Data in Data Centers?
 
Cloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix OverviewCloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix Overview
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storage
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQ
 
Webinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File SystemWebinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File System
 
Database security
Database securityDatabase security
Database security
 
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
 

Destaque

Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewBloombase
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase
 
Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sbBloombase
 
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Bloombase
 
Hitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeHitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeBloombase
 
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...Bloombase
 

Destaque (7)

Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15
 
Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sb
 
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
 
Hitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeHitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafe
 
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
 

Semelhante a Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe

4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageIaetsd Iaetsd
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase
 
Hitachi Content Platform Datasheet
Hitachi Content Platform DatasheetHitachi Content Platform Datasheet
Hitachi Content Platform DatasheetHitachi Vantara
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Exclusive Networks ME
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
Bloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sbBloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sbBloombase
 
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerJerome J. Penna
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopVoltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopHPE Security - Data Security
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0 TTEC
 

Semelhante a Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe (20)

4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
Hitachi Content Platform Datasheet
Hitachi Content Platform DatasheetHitachi Content Platform Datasheet
Hitachi Content Platform Datasheet
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
Bloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sbBloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sb
 
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
 
Cleversafe.PPTX
Cleversafe.PPTXCleversafe.PPTX
Cleversafe.PPTX
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopVoltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in Hadoop
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0
 

Mais de Bloombase

Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Bloombase
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usenBloombase
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletBloombase
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-editionBloombase
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Bloombase
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiBloombase
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyerBloombase
 
Additional license authorizations
Additional license authorizationsAdditional license authorizations
Additional license authorizationsBloombase
 

Mais de Bloombase (20)

Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbooklet
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-edition
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyer
 
4aa5 2782
4aa5 27824aa5 2782
4aa5 2782
 
Additional license authorizations
Additional license authorizationsAdditional license authorizations
Additional license authorizations
 
4aa5 3404
4aa5 34044aa5 3404
4aa5 3404
 

Último

%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benonimasabamasaba
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2
 

Último (20)

%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 

Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe

  • 1. Hitachi Data Systems and Bloombase application-transparent encryption solution: n Safeguards data with industry-standard cryptography. n Protects against outbound data exposure threats. n Allows both on- and off-premises deployment. n Meets confidentiality, regulatory compliance requirements. DATASHEET Mitigate Catastrophic Data Exposure Vulnerabilities For any enterprise, unauthorized data exposure remains a critical, yet unresolved problem. The causes can be both inten- tional (hardware theft, espionage and so on) and unintentional (media loss, viral attacks, and so on). The unbridled rate at which global businesses are taking advantage of off-premises cloud and managed services is only going to exacerbate the problem: These offerings can increase the risk of exposure, regardless of the number of net- work defenses in place. The Increasing Complexities of Protecting Stored Data A paradigm shift in the approach to data management is evident: There is a move away from managing a restrictive set of critical data stored in a structured relational database management system (RDBMS) to the management and storage of virtually everything and anything. There is also a concomitant shift in the way data is stored: from on-premises storage infrastructure to off-premises cloud, platform as a ser- vice (PaaS), managed service provider (MSP), and so on. Although the use of data encryption is vital for the protection of information, database-level encryption does not work with unstructured data for Bloombase StoreSafe Data-at-Rest Security for Hitachi Content Platform analytics applications. Furthermore, propri- etary point-based encryption tool kits are hard to maintain and difficult to integrate into existing applications and software-as- a-service (SaaS) environments. Then, there is storage-based encryption, which involves hardware infrastructure changes and rein- vestment, often resulting in vendor lock-in and posing challenges for cloud-based models. To combat these data vulnerability challenges, Hitachi Data Systems and Bloombase are offering a joint solution based on Hitachi Content Platform (HCP) and Bloombase StoreSafe (see Figure 1). Bloombase StoreSafe: Maximum Storage Security, Minimum Effort Required Bloombase StoreSafe is an agentless, turnkey encryption solution for data- at-rest applications. Its nondisruptive, application-transparent and protocol- preserving features make it ideally suited to protecting a plethora of storage infra- structures. It secures infrastructures from on-premises storage systems [including SAN, NAS, DAS, disk storage systems, tape library, virtual tape library (VTL) and object stores, for instance] to virtualization (hypervisor data stores), big data (Hadoop) and even off-premises cloud storage (AWS S3 and EBS, OpenStack Swift and Cinder, Google Cloud Storage, and Microsoft® Azure™ Storage, for example). Bloombase StoreSafe operates as a stor- age proxy over heterogeneous networked storage environments. To the network, the solution looks like a virtual LUN, a network share, VTL storage target or even a RESTful storage service endpoint. As applications make data storage requests, Bloombase StoreSafe automatically and transparently encrypts the plain text before it is physically persisted in the storage medium. Likewise, decryption of cipher text is performed on the fly as data is requested from the per- sistent storage, presenting the clear text to the requesting application as if it were Figure 1. The new Hitachi Data Systems and Bloombase application-transparent security solution safeguards data with industry- standard cryptography.
  • 2. DATASHEET © Hitachi Data Systems Corporation 2014. All rights reserved. HITACHI is a trademark or registered trademark of Hitachi, Ltd. Microsoft and Azure are trademarks or registered trademarks of Microsoft Corporation. All other trademarks, service marks, and company names are properties of their respective owners. DS-354-A DG October 2014 Corporate Headquarters 2845 Lafayette Street Santa Clara, CA 95050-2639 USA www.HDS.com community.HDS.com Regional Contact Information Americas: +1 408 970 1000 or info@hds.com Europe, Middle East and Africa: +44 (0) 1753 618000 or info.emea@hds.com Asia Pacific: +852 3189 7900 or hds.marketing.apac@hds.com never encrypted. This schema guarantees operational transparency and maximum interoperability. Unauthorized clients accessing data from a StoreSafe protected persistent storage will be unable to interpret the protected cipher text. Supporting a host of industry-standard pro- tocols, StoreSafe is application transparent, operating-system agnostic, portable across storage technologies and vendor neutral. Purpose-built, StoreSafe is a software appli- ance adapted for deployment on commodity hardware servers in both physical data centers and virtual data centers. It can be deployed on hypervisors and private clouds, or as compute instances on cloud infrastructures. Hitachi Content Platform: Enterprise-Class Cloud Storage Hitachi Content Platform is an unstructured content object store that facilitates access and retention of data in a multitenant envi- ronment. Through HCP, applications interact with content over standard network storage protocols. Organizations can quickly provision storage across different on- and off-premises data center topologies while retaining the free- dom to move data quickly and automatically. An intelligent, object storage system, HCP supports multiple tiers of storage for a wide range of structured and unstructured con- tent. It also offers a multitenant architecture and object versioning, all in a single platform. Other features include: ■■ Content immutability via “write once, read many” (WORM) capabilities. ■■ Content retention at the storage layer. ■■ Encryption of data against unauthorized access. ■■ Deduplication capabilities: compression; built-in data protection, verification and repair; bi-directional tier to cloud. ■■ Replication services for disaster recovery. ■■ High scalability, up to 80PB. Data Protection Services Hitachi Data Systems offers various data protection and replication services that sim- plify and accelerate local and remote data replication and disaster recovery solutions. These solutions enable normal business operations to resume in minutes, rather than hours or days, following a primary site outage. They help you meet your service levels quicker and with lower risk. HCP and StoreSafe: Security, Flexibility and Performance The Bloombase StoreSafe solution integrates with anything from traditional storage systems to next-generation object storage solutions like Hitachi Content Platform. StoreSafe pro- vides robust and reliable privacy protection for content management, retention, backup and archival applications with HCP. StoreSafe supports transparent encryption protection of HCP data content over network storage pro- tocols including NFS, CIFS, HTTP, WebDAV, AWS S3 and other RESTful storage services. This allows existing HCP applications to auto- matically encrypt business-sensitive data as they write through StoreSafe. Likewise, by retrieving secure HCP content via StoreSafe, encrypted information is automatically deciphered and presented to trusted HCP applications as plain text. Without needing to modify the business logic of HCP applica- tions, organizations can immediately ensure that their business-sensitive information is managed by HCP securely and meets data privacy regulatory compliance requirements. StoreSafe realizes true separation of duties (SoD) without impacting storage administra- tors and operators. Data is stored in standard volumes, shares, files and objects and are encrypted or decrypted on the fly without supervision and transparently. StoreSafe seamlessly protects both on- and off- premises at-rest data, regardless of the complexity of the heterogeneous storage infrastructure or storage medium. It can just as easily protect data in content addressed storage (CAS) such as object stores, tape libraries, VTLs and various cloud storage ser- vices. Enterprises can mitigate data leakage threats and still meet data privacy and regula- tory compliance requirements cost effectively. Because of its transparent, agentless storage proxy schema, the solution is futureproof and ensures easy integration with any storage technology. Highly scalable, StoreSafe is built for high availability and mission-critical applications. It offers high-speed AES encryption and indus- try standard IEEE 1619 compliant storage security. StoreSafe leverages Intel’s AES-NI cryptographic accelerator to dynamically even out encryption workloads. There is a built-in pluggable cipher algorithm architecture that facilitates adaptation and enables compliance with specific national and vertical market security requirements. Other supported standards include built-in NIST FIPS 140-2 certified key management and support for PKCS#11 hardware security modules (HSM) and OASIS KMIP compliant key managers. Together, Hitachi Data Systems and Bloombase deliver unique transparent encryption protection. They enable business applications to secure unstructured data contents seamlessly with validated cryptographic technologies at zero operational change. These capabilities give applications a trusted data environment for day-to-day storage and long-term archival. To learn more, contact your HDS or Bloombase representative or visit www.HDS.com. LEARN MORE HDS and Bloombase