SlideShare a Scribd company logo
SOLUTION OVERVIEW
BLOOMBASE
EMC Business Partner Program for Technology
Connect Partners
BIG DATA AND OUTBOUND THREATS
Enterprise data is growing and expanding on multiple trajectories, according to
different forms, delivery platforms, computing and storage environments. EMC's
storage infrastructure harnesses this paradigm shift with its unified storage and rapid,
real time processing of this data. Valuable and sensitive data is distilled from this data
mass, both structured and unstructured.
While the complexity in management and execution of data security also increases
dramatically, this partnership underscores the tremendous value Bloombase brings to
confronting data exposure risk, efficiently and effectively, within the EMC storage
infrastructure (on-premises physical and virtual data centers, big data and off-
premises cloud). Bloombase displaces inadequate point-based solutions for data at-
rest encryption, and addresses vulnerabilities head-on using a unified application-
transparent, cross-platform, non-disruptive storage security solution that scales.
BLOOMBASE NEXT-GENERATION DATA
SECURITY
Bloombase stands out as an independent, versatile, security-proven, powerful and
standard-based storage security solution that enables enterprises to fulfill data
regulatory compliance requirements easily and cost-effectively.
Bloombase takes a unique software-appliance approach that transforms business-
critical storage data into cipher-text, and effectively secures sensitive contents from
cyber-attacks, data breaches and various outbound threats. Bloombase StoreSafe
delivers agentless, encryption security of at-rest storage data, by operating as a
storage proxy, securing a wide range of storage devices and services.
Trusted applications and authorized hosts leverage virtual storage resources provided
by Bloombase StoreSafe, to trigger encryption and un-encryption of at-rest data
stored at actual storage systems. When host applications write plain-text data to
backend storage via Bloombase StoreSafe, the encryption engine extracts plain
payloads and converts them as cipher-text in real-time, before transport to storage.
Reversing the process, as trusted host applications read from backend storage
through Bloombase StoreSafe, the un-encryption engine is triggered to retrieve
cipher-text from storage, and converts them to virtual plain-text on-the-fly before
getting recomposed as plain payloads, and presented to business applications.
Storage data stays naturally encrypted and permanently locked down on physical
storage media, therefore, private and safe.
Advantage Partner
Partner Products
• Bloombase StoreSafe
• Bloombase KeyCastle
EMC Products
• EMC®
VNX/VNXe®
• EMC®
ViPR®
• EMC®
Atmos®
• EMC®
NetWorker®
Solution highlights
• High-speed data at-rest
encryption
• Secure all types of enterprise
business data
Turnkey solution for immediate
regulatory compliance
BLOOMBASE UNIFIED DATA SECURITY FOR EMC
Bloombase StoreSafe provides strong protection of primary storage systems (SAN,
NAS, DAS), backup and archival systems (tape library, VTL), object and cloud storage
services (REST), which aligns seamlessly with EMC storage offerings from unified
storage VNX/VNXe, cloud storage ViPR/Atmos, and backup management NetWorker.
ABOUT BLOOMBASE
Bloombase is an Advantage partner in the EMC Business Partner Program for
Technology Connect. Bloombase delivers Next-Generation Data Security solutions
from Physical/Virtual Data Centers, through Big Data, and to the Cloud. Bloombase
provides turnkey, non-disruptive, defense-in-depth data at-rest protection against
dynamic cyber threats in heterogeneous storage environments, while simplifying the
IT security infrastructure. For more information, please visit
http://www.bloombase.com.
ABOUT EMC
EMC is a global leader in enabling businesses and service providers to transform their
operations and deliver IT as a service. Fundamental to this transformation is cloud
computing. Through innovative products and services, EMC accelerates the journey to
cloud computing, helping IT departments to store, manage, protect, and analyze their
most valuable asset— information—in a more agile, trusted, and cost-efficient way.
EMC2
, EMC, the EMC logo, VNX, VNXe and VSPEX are registered trademarks or trademarks of EMC
Corporation in the United States and other countries. VMware is a registered trademark or
trademark of VMware, Inc., in the United States and other jurisdictions. © Copyright 2014 EMC
Corporation. All rights reserved. Published in the USA. 03/14 Solution Overview; H13521.1
EMC believes the information in this document is accurate as of its publication date. The
information is subject to change without notice.
CONTACT US
To learn more about how EMC
products, services, and solutions can
help solve your business and IT
challenges, contact your local
representative or authorized reseller,
visit www.emc.com, or explore and
compare products in the EMC Store.

More Related Content

What's hot

Lumenate_Fluency_OneSheet
Lumenate_Fluency_OneSheetLumenate_Fluency_OneSheet
Lumenate_Fluency_OneSheet
Chuck Ayott
 

What's hot (19)

Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
 
Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...Secure Enterprise Content Management and File Management for the Legal Sector...
Secure Enterprise Content Management and File Management for the Legal Sector...
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15
 
Bloombase sb pc_11.18_s_bedits_sd - final r6
Bloombase sb pc_11.18_s_bedits_sd - final r6Bloombase sb pc_11.18_s_bedits_sd - final r6
Bloombase sb pc_11.18_s_bedits_sd - final r6
 
The Enterprise File Fabric for Healthcare and Genomics | SME Solution Brief
The Enterprise File Fabric for Healthcare and Genomics | SME Solution BriefThe Enterprise File Fabric for Healthcare and Genomics | SME Solution Brief
The Enterprise File Fabric for Healthcare and Genomics | SME Solution Brief
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4
 
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution BriefThe Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
The Enterprise File Fabric for Media & Entertainment Industry | Solution Brief
 
Cohesity-One-Pager
Cohesity-One-PagerCohesity-One-Pager
Cohesity-One-Pager
 
M-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefM-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution Brief
 
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
Remote Working: On-cloud and On-premises Remote Collaboration and File Sharin...
 
The Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution BriefThe Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution Brief
 
Enterprise File Share and Sync with CleverSafe
Enterprise File Share and Sync with CleverSafeEnterprise File Share and Sync with CleverSafe
Enterprise File Share and Sync with CleverSafe
 
Lumenate_Fluency_OneSheet
Lumenate_Fluency_OneSheetLumenate_Fluency_OneSheet
Lumenate_Fluency_OneSheet
 
Data EcoSystem 2.0
Data EcoSystem 2.0Data EcoSystem 2.0
Data EcoSystem 2.0
 
Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy Infographic - Cloud Hosting and Tenancy
Infographic - Cloud Hosting and Tenancy
 
Modernize the Disperse Enterprise with CTERA Cloud Storage Gateways and Cloud...
Modernize the Disperse Enterprise with CTERA Cloud Storage Gateways and Cloud...Modernize the Disperse Enterprise with CTERA Cloud Storage Gateways and Cloud...
Modernize the Disperse Enterprise with CTERA Cloud Storage Gateways and Cloud...
 
The Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud PlatformThe Enterprise File Fabric for Google Cloud Platform
The Enterprise File Fabric for Google Cloud Platform
 

Similar to H13521 so-bloombase-solution-overview

Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Bloombase
 

Similar to H13521 so-bloombase-solution-overview (20)

Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
Soyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPSSoyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPS
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
PROACT SYNC 2013 - Breakout - VSPEX en vBlock Converged Infrastructure bouwbl...
PROACT SYNC 2013 - Breakout - VSPEX en vBlock Converged Infrastructure bouwbl...PROACT SYNC 2013 - Breakout - VSPEX en vBlock Converged Infrastructure bouwbl...
PROACT SYNC 2013 - Breakout - VSPEX en vBlock Converged Infrastructure bouwbl...
 
goipower.com
goipower.comgoipower.com
goipower.com
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Ibm spectrum storage protecion
Ibm spectrum storage protecion Ibm spectrum storage protecion
Ibm spectrum storage protecion
 
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication SolutionsMany-to-One Replication for IBM ProtecTIER Deduplication Solutions
Many-to-One Replication for IBM ProtecTIER Deduplication Solutions
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
High Res CIO Review Article
High Res CIO Review ArticleHigh Res CIO Review Article
High Res CIO Review Article
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
 
Providing a Unified Enterprise File Share & Sync Fabric
Providing a Unified Enterprise File Share & Sync FabricProviding a Unified Enterprise File Share & Sync Fabric
Providing a Unified Enterprise File Share & Sync Fabric
 

More from Bloombase

More from Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbooklet
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-edition
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyer
 

Recently uploaded

Recently uploaded (20)

In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

H13521 so-bloombase-solution-overview

  • 1. SOLUTION OVERVIEW BLOOMBASE EMC Business Partner Program for Technology Connect Partners BIG DATA AND OUTBOUND THREATS Enterprise data is growing and expanding on multiple trajectories, according to different forms, delivery platforms, computing and storage environments. EMC's storage infrastructure harnesses this paradigm shift with its unified storage and rapid, real time processing of this data. Valuable and sensitive data is distilled from this data mass, both structured and unstructured. While the complexity in management and execution of data security also increases dramatically, this partnership underscores the tremendous value Bloombase brings to confronting data exposure risk, efficiently and effectively, within the EMC storage infrastructure (on-premises physical and virtual data centers, big data and off- premises cloud). Bloombase displaces inadequate point-based solutions for data at- rest encryption, and addresses vulnerabilities head-on using a unified application- transparent, cross-platform, non-disruptive storage security solution that scales. BLOOMBASE NEXT-GENERATION DATA SECURITY Bloombase stands out as an independent, versatile, security-proven, powerful and standard-based storage security solution that enables enterprises to fulfill data regulatory compliance requirements easily and cost-effectively. Bloombase takes a unique software-appliance approach that transforms business- critical storage data into cipher-text, and effectively secures sensitive contents from cyber-attacks, data breaches and various outbound threats. Bloombase StoreSafe delivers agentless, encryption security of at-rest storage data, by operating as a storage proxy, securing a wide range of storage devices and services. Trusted applications and authorized hosts leverage virtual storage resources provided by Bloombase StoreSafe, to trigger encryption and un-encryption of at-rest data stored at actual storage systems. When host applications write plain-text data to backend storage via Bloombase StoreSafe, the encryption engine extracts plain payloads and converts them as cipher-text in real-time, before transport to storage. Reversing the process, as trusted host applications read from backend storage through Bloombase StoreSafe, the un-encryption engine is triggered to retrieve cipher-text from storage, and converts them to virtual plain-text on-the-fly before getting recomposed as plain payloads, and presented to business applications. Storage data stays naturally encrypted and permanently locked down on physical storage media, therefore, private and safe. Advantage Partner Partner Products • Bloombase StoreSafe • Bloombase KeyCastle EMC Products • EMC® VNX/VNXe® • EMC® ViPR® • EMC® Atmos® • EMC® NetWorker® Solution highlights • High-speed data at-rest encryption • Secure all types of enterprise business data Turnkey solution for immediate regulatory compliance
  • 2. BLOOMBASE UNIFIED DATA SECURITY FOR EMC Bloombase StoreSafe provides strong protection of primary storage systems (SAN, NAS, DAS), backup and archival systems (tape library, VTL), object and cloud storage services (REST), which aligns seamlessly with EMC storage offerings from unified storage VNX/VNXe, cloud storage ViPR/Atmos, and backup management NetWorker. ABOUT BLOOMBASE Bloombase is an Advantage partner in the EMC Business Partner Program for Technology Connect. Bloombase delivers Next-Generation Data Security solutions from Physical/Virtual Data Centers, through Big Data, and to the Cloud. Bloombase provides turnkey, non-disruptive, defense-in-depth data at-rest protection against dynamic cyber threats in heterogeneous storage environments, while simplifying the IT security infrastructure. For more information, please visit http://www.bloombase.com. ABOUT EMC EMC is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect, and analyze their most valuable asset— information—in a more agile, trusted, and cost-efficient way. EMC2 , EMC, the EMC logo, VNX, VNXe and VSPEX are registered trademarks or trademarks of EMC Corporation in the United States and other countries. VMware is a registered trademark or trademark of VMware, Inc., in the United States and other jurisdictions. © Copyright 2014 EMC Corporation. All rights reserved. Published in the USA. 03/14 Solution Overview; H13521.1 EMC believes the information in this document is accurate as of its publication date. The information is subject to change without notice. CONTACT US To learn more about how EMC products, services, and solutions can help solve your business and IT challenges, contact your local representative or authorized reseller, visit www.emc.com, or explore and compare products in the EMC Store.