SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
IBM System Storage




Protect your critical business information with
information security solutions from IBM
Organizations have always struggled to manage the exponential            become the principal threats today. These criminal organiza­
growth of information they create and store, and recently, they          tions are so well-funded that they can afford the latest in
have turned their attention to the increased exposure and vul­           sophisticated technology and can recruit computer scientists to
nerability to attacks of all of this information. What’s more, new       undermine what many consider to be highly secure systems.
laws demanding stronger accountability from organizations that           Today, many of these organizations successfully breach corpo­
lose sensitive personal data have intensified the need to ade­            rate IT security systems to gain access to high-value personal
quately protect sensitive corporate information.                         information such as Social Security numbers and credit card
                                                                         information, which can then be used to steal the identities of
As business opportunities expand in the global economy,                  individuals and drain their bank accounts. With their vast
organizations are becoming more distributed and business                 resources, criminal organizations often circumvent security
models are becoming more collaborative. It is no longer enough           mechanisms that are in place by recruiting company insiders to
to secure information internally; it also must be protected in the       steal sensitive information or provide access to secure systems.
context of a business environment with a growing number of               It is a problem that will continue to frustrate businesses as they
collaborators and a constantly changing universe of users.               continue to spend IT resources on securing their infrastructures.
Collaboration also means that it’s not enough for an organiza­
tion to protect its own information—it also has to work to               The costs of not securing information in this high-stakes envi­
ensure that its partners’ information is secure, too.                    ronment can be tremendous, especially when both the direct
                                                                         financial costs and the costs in areas such as loss of customer
Information assets are growing in complexity as well as in vol­          confidence and risk of regulatory exposure are taken into
ume. They must be secured at multiple levels: from stored infor­         account. On the other hand, the benefits of successfully secur­
mation, to information in applications, to physical devices in the       ing information can be inestimable. Information security enables
information infrastructure. For information security to be effec­        business success by building the foundation for trust that’s
tive, all areas of risk in the infrastructure must be addressed.         essential to collaboration and innovation. When information is
                                                                         secured and safe, the enterprise is free to pursue new business
Where thrill-seeking amateurs were once the main threats to an           opportunities in emerging markets or with innovative business
organization’s security, security experts acknowledge that pro­          models without fear of undue risk.
fessional criminals and organized crime syndicates have




                                                                     2
IBM framework for comprehensive information security                     technology and services to help organizations develop a
The IBM approach to securing information for today’s enterprise          strategic approach to their security challenges. To that end,
is to strategically manage information security across the entire        IBM offers information security solutions in five strategic areas:
organization—as a Dynamic Infrastructure®—rather than just at
the systems or data level. This approach means instituting con­          ●	   Security compliance
trols that can manage risk across all IT security domains:               ●	   Identity and access
                                                                         ●	   Information security
●	   Identity: Ensuring that the right people have access to the         ●	   Application security
     right assets at the right time                                      ●	   Infrastructure security
●	   Information: Protecting critical data wherever it is stored
     in the enterprise, and as it travels across private and pub­
     lic networks
●	   Applications: Securing applications and business services
●	   Systems infrastructure: Staying ahead of emerging threats
     across the entire IT environment
●	   Physical security: Using the increasing capabilities of digi­
     tal controls and video monitoring to secure physical spaces


Rather than focusing on only one domain, or managing only a
portion of the total risk, IBM can apply the right technologies
and expertise to provide leading-edge security across virtually
every domain. IBM is unique in its ability to address practically
every dimension of a secure infrastructure and provide the




                                                                     3
Information storage solutions from IBM System Storage™ play             Storage solutions are specifically relevant to the point in the life-
an important role in IBM’s information security strategy, helping       cycle where security controls are enforced, enabling information
organizations better protect and secure information assets that         to be shared securely within and beyond the enterprise.
reside across the enterprise.
                                                                        Protecting information with IBM self-encrypting storage solutions
Enforcing security controls with IBM System Storage information         IBM System Storage solutions can help organizations enforce
security solutions                                                      security controls by encrypting stored data. Encryption is critical
IBM System Storage solutions for securing information are part          because data center storage is inherently mobile: Tapes get
of a larger, lifecycle-driven approach that helps provide compre­       archived, disk drives routinely get replaced, and enterprises
hensive network protection to secure all points of access to            become understandably concerned about the sensitive data
information on the network, at all stages of the information            that resides in their storage systems. The idea of storage
security lifecycle.                                                     encryption is to protect the data stored in these systems so
                                                                        that if a tape cartridge or disk is lost or stolen, the information
                                                                        stored there is useless to anyone who accesses it—unreadable
                                                                        due to encryption.


                                                                        IBM offers a portfolio of information security solutions based on
                                                                        its innovative self-encrypting disk and tape drives. These drives
                                                                        are designed to encrypt data automatically as it enters the drive
                                                                        to be stored, and then automatically decrypt it as it moves out
                                                                        of the drive. The embedded encryption engine helps to ensure
                                                                        that there is virtually no performance degradation compared to
                                                                        non-encrypting drives. This drive-level encryption approach
                                                                        reduces the risk that information could be compromised when
                                                                        storage media are physically removed from the storage systems
                                                                        for archiving.




                                                                    4
IBM introduced the industry’s first self-encrypting enterprise          Self-encrypting drives are rapidly becoming the preferred model
tape drive, the IBM System Storage TS1120, in 2006, followed           for securing data stored on tape cartridges and disk drives. For
by the next-generation IBM System Storage TS1130 and Linear            example, the National Security Agency recently qualified self-
Tape Open (LTO) self-encrypting drives, which can address a            encrypting disk drives for protecting information on computers
wide range of enterprise and entry-level tape environments. In         deployed by U.S. government agencies and contractors for
February of 2009, IBM introduced full disk encrypting drives in        national security purposes.
its flagship IBM System Storage DS8000® and soon followed
that with the announcement of full disk encrypting drives in its       When you talk about securing your information infrastructure,
mid-range disk platform, the IBM System Storage DS5000.                it’s difficult to not mention the mainframe. For years, the
Adding self-encrypting disk solutions to the highly successful         IBM mainframe has been satisfying the most demanding cus­
self-encrypting tape solutions offers customers a consistent           tomers with the highest levels of performance, availability and
approach to securing data at rest, enabling organizations to           security. Originally designed to be shared by thousands of
adequately address their data security concerns.                       users, the mainframe has security built into nearly every level of
                                                                       the system—from the processor level to the operating system
Using these IBM self-encrypting drives to encrypt data at the          to the application level. This design helps protect it from mal-
storage end point provides the ability to store data in an             ware, viruses and threats from both within and outside the
encrypted form with minimal operational complexity and mini­           organization.
mal impact on performance. Encrypting at the storage end
point can help organizations:                                          By providing the ability to enforce, monitor and manage secu­
                                                                       rity, IBM System z® is the logical central management point for
●	   Minimize the need for host-based encryption, which can            enterprise-wide security. For user identification and authentica­
     drain host performance.                                           tion, access control and auditing, distributed directory services,
●	   Minimize the need to use specialized encryption appliances        networking security and security administration, the mainframe
     that can add to infrastructure complexity.                        is designed to provide integrity, process isolation and crypto­
●	   Accommodate data compression of tape storage, so that             graphic capabilities to help keep information secure. On top of
     fewer tape cartridges are needed.                                 this solid hardware foundation, System z operating systems
●	   Reduce the risk that batch processing windows will be             offer a variety of customizable security elements within the
     affected by placing no significant impact on the tape              Security Server and Communication Server components.
     drive’s native performance.




                                                                   5
And of course along with the inherent security built into the           Part of IBM’s holistic approach to storage and security challenges
mainframe, there are additional security management offerings           Successfully implementing an end-to-end approach to informa­
from IBM Tivoli® software, such as identity and access man­             tion security requires more than technology; it requires expert
agement solutions and the IBM Tivoli zSecure suite, which can           planning, design, implementation and support services.
provide advanced security to help protect the information               IBM offers an extensive services portfolio that can help clients
infrastructure.                                                         address their short-term security concerns, as well as design
                                                                        and deploy a holistic information security environment. This,
Successful key management strategies                                    combined with our integrated and unrivaled portfolio of security
Just as each tape drive has an embedded encryption engine,              offerings and capabilities, makes IBM your partner of choice for
each disk drive also has an embedded encryption engine, and             end-to-end information security. Consider what IBM offers:
it, too, uses IBM’s encryption key management software to
manage the keys associated with the solution. This simplified            ●	   Skilled professionals: IBM’s security and privacy business
and proven key management system is being used in some of                    includes 3,500 professionals in regions around the world,
the largest banks in the world. As with the encrypting tape solu­            including 1,700 who have completed IBM’s rigorous secu­
tion, the encrypting disk solution is designed to be transparent             rity and privacy methodology training.
to the operating system, applications, databases, system                ●	   A worldwide presence: IBM maintains security and
administrators and users, making deployment much simpler                     privacy practices in the U.S., Canada, EMEA (Europe,
than with specialized encryption appliances.                                 Middle East, Africa), Asia, Australia, and Latin and
                                                                             South America.
IBM currently addresses key management in its self-encrypting           ●	   R&D leadership: IBM holds more security and privacy
tape storage solutions with the standards-based IBM Tivoli Key               copyrights and patents than any other company in the
Lifecycle Manager (TKLM) and its predecessor, Encryption                     world.
Key Manager (EKM). TKLM is designed to help manage the                  ●	   Ability to deliver: IBM demonstrates security leadership
growing volume of encryption keys across the enterprise with                 daily through successful service delivery within IBM and
simplified deployment, configuration and administration over                   to IBM customers worldwide.
their lifecycles.                                                       ●	   Industry recognition: IBM has been recognized repeatedly
                                                                             by industry analysts for our leadership in managed secu­
                                                                             rity services and related security areas.




                                                                    6
Case in point: deploying drive-based encryption technology across       Solution
the enterprise                                                          The company turned to IBM System Storage for a tape encryp­
The IT organization of a large U.S.-based healthcare firm                tion solution that would help ensure both the security and avail­
needed to encrypt all data across the enterprise to help fulfill         ability of their data in all IT environments. They deployed the
the company’s commitment to compliance with data privacy                IBM System Storage TS1120 tape drive, enabling full-fledged
regulations.                                                            encryption across the company’s mainframe, distributed and
                                                                        desktop computing environments.
Challenge
Data would have to be encrypted across multiple technology              Solution benefits
environments: IBM System z mainframe computing, distributed
computing, and Microsoft® Windows®–based desktop                        ●	   Delivers full-fledged encryption and simplified key man­
computing. The solution could not add significant time to the                 agement across the enterprise
company’s current data backup processes.                                ●	   Simplifies and streamlines IT by enabling a common
                                                                             encryption solution across all computing platforms
                                                                        ●	   Helps ensure protection of sensitive data and facilitates
                                                                             compliance with regulations, including the privacy
                                                                             components of the Health Insurance Portability and
                                                                             Accountability Act (HIPAA)




                                                                    7
For more information                                                                            © Copyright IBM Corporation 2009
                                                                                                  IBM Systems and Technology Group
To learn more about how IBM’s com­
                                                                                                  Route 100
prehensive information security solu­                                                             Somers, NY 10589
                                                                                                  U.S.A.
tions can help protect critical business

                                                                                                  Produced in the United States of America
information throughout its lifecycle, con­                                                        March 2009
tact your IBM representative or
                                                                  All Rights Reserved

IBM Business Partner or visit
                                                                    IBM, the IBM logo, ibm.com, DS8000, Dynamic
                                                                                                  Infrastructure, System Storage, System z and
ibm.com/security.
                                                                                Tivoli are trademarks or registered trademarks
                                                                                                  of International Business Machines Corporation
                                                                                                  in the United States, other countries, or both. If
For more information about how
                                                                   these and other IBM trademarked terms are
IBM System Storage solutions can
                                                                 marked on their first occurrence in this
                                                                                                  information with a trademark symbol (® or ™),
secure stored data on your network,
                                                              these symbols indicate U.S. registered or
visit ibm.com/storage.
                                                                           common law trademarks owned by IBM at the
                                                                                                  time this information was published. Such
                                                                                                  trademarks may also be registered or common
                                                                                                  law trademarks in other countries. A current list
                                                                                                  of IBM trademarks is available on the Web at
                                                                                                  “Copyright and trademark information” at
                                                                                                  ibm.com/legal/copytrade.shtml.
                                                                                                  Microsoft and Windows are trademarks of
                                                                                                  Microsoft Corporation in the United States,
                                                                                                  other countries, or both.
                                                                                                  Other company, product and service names
                                                                                                  may be trademarks or service marks of others.
                                                                                                  This document could include technical
                                                                                                  inaccuracies or typographical errors. IBM may
                                             Information concerning non-IBM products was          not offer the products, services or features
                                             obtained from the suppliers of their products        discussed in this document in other countries,
                                             their published announcements or other publicly      and the product information may be subject to
                                             available sources. Questions on the capabilities     change without notice. Consult your local
                                             of the non-IBM products should be addressed          IBM business contact for information on the
                                             with the suppliers. IBM does not warrant that        product or services available in your area.
                                             the information offered herein will meet your        Any statements regarding IBM’s future direction
                                             requirements or those of your distributors or        and intent are subject to change or withdrawal
                                             customers. IBM provides this information             without notice, and represent goals and
                                             “AS IS” without warranty. IBM disclaims all          objectives only. The information contained
                                             warranties, express or implied, including the        in this document is current as of the initial date
                                             implied warranties of non infringement,              of publication only and is subject to change
                                             merchantability and fitness for a particular          without notice. All performance information was
                                             purpose or non infringement. IBM products            determined in a controlled environment. Actual
                                             are warranted according to the terms and             results may vary. Performance information is
                                             conditions of the agreements under which they        provided “AS IS” and no warranties or
                                             are provided.                                        guarantees are expressed or implied by IBM.




                                                                                                  TSB03012-USEN-02

Weitere ähnliche Inhalte

Was ist angesagt?

Is the IT security gap a threat to SMBS?
Is the IT security gap a threat to SMBS?Is the IT security gap a threat to SMBS?
Is the IT security gap a threat to SMBS?Globizzcon
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information securityethanBrownusa
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.netethnos
 
TRUSTe Online Security Guidelines v2.0
TRUSTe Online Security Guidelines v2.0TRUSTe Online Security Guidelines v2.0
TRUSTe Online Security Guidelines v2.0TRUSTe
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyAndris Soroka
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseShwetank Jayaswal
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
IBM Immune System
IBM Immune SystemIBM Immune System
IBM Immune SystemLuke Kenny
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...solarisyougood
 
Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction rajakhurram
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 

Was ist angesagt? (19)

Is the IT security gap a threat to SMBS?
Is the IT security gap a threat to SMBS?Is the IT security gap a threat to SMBS?
Is the IT security gap a threat to SMBS?
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
TRUSTe Online Security Guidelines v2.0
TRUSTe Online Security Guidelines v2.0TRUSTe Online Security Guidelines v2.0
TRUSTe Online Security Guidelines v2.0
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security StrategyDSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
DSS ITSEC 2013 Conference 07.11.2013 - IBM Security Strategy
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
IBM Immune System
IBM Immune SystemIBM Immune System
IBM Immune System
 
Stu r35 b
Stu r35 bStu r35 b
Stu r35 b
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 
Term assignment
Term assignmentTerm assignment
Term assignment
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Lecture1 Introduction
Lecture1 Introduction Lecture1 Introduction
Lecture1 Introduction
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 

Ähnlich wie Protect critical business data with IBM System Storage security solutions

Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageIaetsd Iaetsd
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...Arbp Worldwide
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary StorageJessica Tanner
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
An Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityAn Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityGerard McNamee
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...Agora Group
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Tony Pearson
 

Ähnlich wie Protect critical business data with IBM System Storage security solutions (20)

Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
An Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to SecurityAn Integrated, Intelligent Approach to Security
An Integrated, Intelligent Approach to Security
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
 

Mehr von IBM India Smarter Computing

Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments IBM India Smarter Computing
 
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...IBM India Smarter Computing
 
A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceIBM India Smarter Computing
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM India Smarter Computing
 

Mehr von IBM India Smarter Computing (20)

Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments
 
All-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage EfficiencyAll-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage Efficiency
 
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
 
IBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product GuideIBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product Guide
 
IBM System x3250 M5
IBM System x3250 M5IBM System x3250 M5
IBM System x3250 M5
 
IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4
 
IBM System x3650 M4 HD
IBM System x3650 M4 HDIBM System x3650 M4 HD
IBM System x3650 M4 HD
 
IBM System x3300 M4
IBM System x3300 M4IBM System x3300 M4
IBM System x3300 M4
 
IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
 
IBM System x3550 M4
IBM System x3550 M4IBM System x3550 M4
IBM System x3550 M4
 
IBM System x3650 M4
IBM System x3650 M4IBM System x3650 M4
IBM System x3650 M4
 
IBM System x3500 M3
IBM System x3500 M3IBM System x3500 M3
IBM System x3500 M3
 
IBM System x3400 M3
IBM System x3400 M3IBM System x3400 M3
IBM System x3400 M3
 
IBM System x3250 M3
IBM System x3250 M3IBM System x3250 M3
IBM System x3250 M3
 
IBM System x3200 M3
IBM System x3200 M3IBM System x3200 M3
IBM System x3200 M3
 
IBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and ConfigurationIBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and Configuration
 
A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization Performance
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architecture
 
X6: The sixth generation of EXA Technology
X6: The sixth generation of EXA TechnologyX6: The sixth generation of EXA Technology
X6: The sixth generation of EXA Technology
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Protect critical business data with IBM System Storage security solutions

  • 1. IBM System Storage Protect your critical business information with information security solutions from IBM
  • 2. Organizations have always struggled to manage the exponential become the principal threats today. These criminal organiza­ growth of information they create and store, and recently, they tions are so well-funded that they can afford the latest in have turned their attention to the increased exposure and vul­ sophisticated technology and can recruit computer scientists to nerability to attacks of all of this information. What’s more, new undermine what many consider to be highly secure systems. laws demanding stronger accountability from organizations that Today, many of these organizations successfully breach corpo­ lose sensitive personal data have intensified the need to ade­ rate IT security systems to gain access to high-value personal quately protect sensitive corporate information. information such as Social Security numbers and credit card information, which can then be used to steal the identities of As business opportunities expand in the global economy, individuals and drain their bank accounts. With their vast organizations are becoming more distributed and business resources, criminal organizations often circumvent security models are becoming more collaborative. It is no longer enough mechanisms that are in place by recruiting company insiders to to secure information internally; it also must be protected in the steal sensitive information or provide access to secure systems. context of a business environment with a growing number of It is a problem that will continue to frustrate businesses as they collaborators and a constantly changing universe of users. continue to spend IT resources on securing their infrastructures. Collaboration also means that it’s not enough for an organiza­ tion to protect its own information—it also has to work to The costs of not securing information in this high-stakes envi­ ensure that its partners’ information is secure, too. ronment can be tremendous, especially when both the direct financial costs and the costs in areas such as loss of customer Information assets are growing in complexity as well as in vol­ confidence and risk of regulatory exposure are taken into ume. They must be secured at multiple levels: from stored infor­ account. On the other hand, the benefits of successfully secur­ mation, to information in applications, to physical devices in the ing information can be inestimable. Information security enables information infrastructure. For information security to be effec­ business success by building the foundation for trust that’s tive, all areas of risk in the infrastructure must be addressed. essential to collaboration and innovation. When information is secured and safe, the enterprise is free to pursue new business Where thrill-seeking amateurs were once the main threats to an opportunities in emerging markets or with innovative business organization’s security, security experts acknowledge that pro­ models without fear of undue risk. fessional criminals and organized crime syndicates have 2
  • 3. IBM framework for comprehensive information security technology and services to help organizations develop a The IBM approach to securing information for today’s enterprise strategic approach to their security challenges. To that end, is to strategically manage information security across the entire IBM offers information security solutions in five strategic areas: organization—as a Dynamic Infrastructure®—rather than just at the systems or data level. This approach means instituting con­ ● Security compliance trols that can manage risk across all IT security domains: ● Identity and access ● Information security ● Identity: Ensuring that the right people have access to the ● Application security right assets at the right time ● Infrastructure security ● Information: Protecting critical data wherever it is stored in the enterprise, and as it travels across private and pub­ lic networks ● Applications: Securing applications and business services ● Systems infrastructure: Staying ahead of emerging threats across the entire IT environment ● Physical security: Using the increasing capabilities of digi­ tal controls and video monitoring to secure physical spaces Rather than focusing on only one domain, or managing only a portion of the total risk, IBM can apply the right technologies and expertise to provide leading-edge security across virtually every domain. IBM is unique in its ability to address practically every dimension of a secure infrastructure and provide the 3
  • 4. Information storage solutions from IBM System Storage™ play Storage solutions are specifically relevant to the point in the life- an important role in IBM’s information security strategy, helping cycle where security controls are enforced, enabling information organizations better protect and secure information assets that to be shared securely within and beyond the enterprise. reside across the enterprise. Protecting information with IBM self-encrypting storage solutions Enforcing security controls with IBM System Storage information IBM System Storage solutions can help organizations enforce security solutions security controls by encrypting stored data. Encryption is critical IBM System Storage solutions for securing information are part because data center storage is inherently mobile: Tapes get of a larger, lifecycle-driven approach that helps provide compre­ archived, disk drives routinely get replaced, and enterprises hensive network protection to secure all points of access to become understandably concerned about the sensitive data information on the network, at all stages of the information that resides in their storage systems. The idea of storage security lifecycle. encryption is to protect the data stored in these systems so that if a tape cartridge or disk is lost or stolen, the information stored there is useless to anyone who accesses it—unreadable due to encryption. IBM offers a portfolio of information security solutions based on its innovative self-encrypting disk and tape drives. These drives are designed to encrypt data automatically as it enters the drive to be stored, and then automatically decrypt it as it moves out of the drive. The embedded encryption engine helps to ensure that there is virtually no performance degradation compared to non-encrypting drives. This drive-level encryption approach reduces the risk that information could be compromised when storage media are physically removed from the storage systems for archiving. 4
  • 5. IBM introduced the industry’s first self-encrypting enterprise Self-encrypting drives are rapidly becoming the preferred model tape drive, the IBM System Storage TS1120, in 2006, followed for securing data stored on tape cartridges and disk drives. For by the next-generation IBM System Storage TS1130 and Linear example, the National Security Agency recently qualified self- Tape Open (LTO) self-encrypting drives, which can address a encrypting disk drives for protecting information on computers wide range of enterprise and entry-level tape environments. In deployed by U.S. government agencies and contractors for February of 2009, IBM introduced full disk encrypting drives in national security purposes. its flagship IBM System Storage DS8000® and soon followed that with the announcement of full disk encrypting drives in its When you talk about securing your information infrastructure, mid-range disk platform, the IBM System Storage DS5000. it’s difficult to not mention the mainframe. For years, the Adding self-encrypting disk solutions to the highly successful IBM mainframe has been satisfying the most demanding cus­ self-encrypting tape solutions offers customers a consistent tomers with the highest levels of performance, availability and approach to securing data at rest, enabling organizations to security. Originally designed to be shared by thousands of adequately address their data security concerns. users, the mainframe has security built into nearly every level of the system—from the processor level to the operating system Using these IBM self-encrypting drives to encrypt data at the to the application level. This design helps protect it from mal- storage end point provides the ability to store data in an ware, viruses and threats from both within and outside the encrypted form with minimal operational complexity and mini­ organization. mal impact on performance. Encrypting at the storage end point can help organizations: By providing the ability to enforce, monitor and manage secu­ rity, IBM System z® is the logical central management point for ● Minimize the need for host-based encryption, which can enterprise-wide security. For user identification and authentica­ drain host performance. tion, access control and auditing, distributed directory services, ● Minimize the need to use specialized encryption appliances networking security and security administration, the mainframe that can add to infrastructure complexity. is designed to provide integrity, process isolation and crypto­ ● Accommodate data compression of tape storage, so that graphic capabilities to help keep information secure. On top of fewer tape cartridges are needed. this solid hardware foundation, System z operating systems ● Reduce the risk that batch processing windows will be offer a variety of customizable security elements within the affected by placing no significant impact on the tape Security Server and Communication Server components. drive’s native performance. 5
  • 6. And of course along with the inherent security built into the Part of IBM’s holistic approach to storage and security challenges mainframe, there are additional security management offerings Successfully implementing an end-to-end approach to informa­ from IBM Tivoli® software, such as identity and access man­ tion security requires more than technology; it requires expert agement solutions and the IBM Tivoli zSecure suite, which can planning, design, implementation and support services. provide advanced security to help protect the information IBM offers an extensive services portfolio that can help clients infrastructure. address their short-term security concerns, as well as design and deploy a holistic information security environment. This, Successful key management strategies combined with our integrated and unrivaled portfolio of security Just as each tape drive has an embedded encryption engine, offerings and capabilities, makes IBM your partner of choice for each disk drive also has an embedded encryption engine, and end-to-end information security. Consider what IBM offers: it, too, uses IBM’s encryption key management software to manage the keys associated with the solution. This simplified ● Skilled professionals: IBM’s security and privacy business and proven key management system is being used in some of includes 3,500 professionals in regions around the world, the largest banks in the world. As with the encrypting tape solu­ including 1,700 who have completed IBM’s rigorous secu­ tion, the encrypting disk solution is designed to be transparent rity and privacy methodology training. to the operating system, applications, databases, system ● A worldwide presence: IBM maintains security and administrators and users, making deployment much simpler privacy practices in the U.S., Canada, EMEA (Europe, than with specialized encryption appliances. Middle East, Africa), Asia, Australia, and Latin and South America. IBM currently addresses key management in its self-encrypting ● R&D leadership: IBM holds more security and privacy tape storage solutions with the standards-based IBM Tivoli Key copyrights and patents than any other company in the Lifecycle Manager (TKLM) and its predecessor, Encryption world. Key Manager (EKM). TKLM is designed to help manage the ● Ability to deliver: IBM demonstrates security leadership growing volume of encryption keys across the enterprise with daily through successful service delivery within IBM and simplified deployment, configuration and administration over to IBM customers worldwide. their lifecycles. ● Industry recognition: IBM has been recognized repeatedly by industry analysts for our leadership in managed secu­ rity services and related security areas. 6
  • 7. Case in point: deploying drive-based encryption technology across Solution the enterprise The company turned to IBM System Storage for a tape encryp­ The IT organization of a large U.S.-based healthcare firm tion solution that would help ensure both the security and avail­ needed to encrypt all data across the enterprise to help fulfill ability of their data in all IT environments. They deployed the the company’s commitment to compliance with data privacy IBM System Storage TS1120 tape drive, enabling full-fledged regulations. encryption across the company’s mainframe, distributed and desktop computing environments. Challenge Data would have to be encrypted across multiple technology Solution benefits environments: IBM System z mainframe computing, distributed computing, and Microsoft® Windows®–based desktop ● Delivers full-fledged encryption and simplified key man­ computing. The solution could not add significant time to the agement across the enterprise company’s current data backup processes. ● Simplifies and streamlines IT by enabling a common encryption solution across all computing platforms ● Helps ensure protection of sensitive data and facilitates compliance with regulations, including the privacy components of the Health Insurance Portability and Accountability Act (HIPAA) 7
  • 8. For more information © Copyright IBM Corporation 2009 IBM Systems and Technology Group To learn more about how IBM’s com­ Route 100 prehensive information security solu­ Somers, NY 10589 U.S.A. tions can help protect critical business Produced in the United States of America information throughout its lifecycle, con­ March 2009 tact your IBM representative or All Rights Reserved IBM Business Partner or visit IBM, the IBM logo, ibm.com, DS8000, Dynamic Infrastructure, System Storage, System z and ibm.com/security. Tivoli are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If For more information about how these and other IBM trademarked terms are IBM System Storage solutions can marked on their first occurrence in this information with a trademark symbol (® or ™), secure stored data on your network, these symbols indicate U.S. registered or visit ibm.com/storage. common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. Other company, product and service names may be trademarks or service marks of others. This document could include technical inaccuracies or typographical errors. IBM may Information concerning non-IBM products was not offer the products, services or features obtained from the suppliers of their products discussed in this document in other countries, their published announcements or other publicly and the product information may be subject to available sources. Questions on the capabilities change without notice. Consult your local of the non-IBM products should be addressed IBM business contact for information on the with the suppliers. IBM does not warrant that product or services available in your area. the information offered herein will meet your Any statements regarding IBM’s future direction requirements or those of your distributors or and intent are subject to change or withdrawal customers. IBM provides this information without notice, and represent goals and “AS IS” without warranty. IBM disclaims all objectives only. The information contained warranties, express or implied, including the in this document is current as of the initial date implied warranties of non infringement, of publication only and is subject to change merchantability and fitness for a particular without notice. All performance information was purpose or non infringement. IBM products determined in a controlled environment. Actual are warranted according to the terms and results may vary. Performance information is conditions of the agreements under which they provided “AS IS” and no warranties or are provided. guarantees are expressed or implied by IBM. TSB03012-USEN-02