SlideShare a Scribd company logo
1 of 2
Download to read offline
Hitachi Data Systems and Bloombase application-transparent encryption
solution:
n Safeguards data with industry-standard cryptography.
n Protects against outbound data exposure threats.
n Allows both on- and off-premises deployment.
n Meets confidentiality, regulatory compliance requirements.
DATASHEET
Mitigate Catastrophic Data
Exposure Vulnerabilities
For any enterprise, unauthorized data
exposure remains a critical, yet unresolved
problem. The causes can be both inten-
tional (hardware theft, espionage and so on)
and unintentional (media loss, viral attacks,
and so on). The unbridled rate at which
global businesses are taking advantage of
off-premises cloud and managed services
is only going to exacerbate the problem:
These offerings can increase the risk of
exposure, regardless of the number of net-
work defenses in place.
The Increasing Complexities
of Protecting Stored Data
A paradigm shift in the approach to data
management is evident: There is a move
away from managing a restrictive set of
critical data stored in a structured relational
database management system (RDBMS)
to the management and storage of virtually
everything and anything. There is also a
concomitant shift in the way data is stored:
from on-premises storage infrastructure
to off-premises cloud, platform as a ser-
vice (PaaS), managed service provider
(MSP), and so on. Although the use of
data encryption is vital for the protection
of information, database-level encryption
does not work with unstructured data for
Bloombase StoreSafe Data-at-Rest Security for Hitachi Content Platform
analytics applications. Furthermore, propri-
etary point-based encryption tool kits are
hard to maintain and difficult to integrate
into existing applications and software-as-
a-service (SaaS) environments. Then, there
is storage-based encryption, which involves
hardware infrastructure changes and rein-
vestment, often resulting in vendor lock-in
and posing challenges for cloud-based
models.
To combat these data vulnerability
challenges, Hitachi Data Systems and
Bloombase are offering a joint solution
based on Hitachi Content Platform (HCP)
and Bloombase StoreSafe (see Figure 1).
Bloombase StoreSafe:
Maximum Storage Security,
Minimum Effort Required
Bloombase StoreSafe is an agentless,
turnkey encryption solution for data-
at-rest applications. Its nondisruptive,
application-transparent and protocol-
preserving features make it ideally suited
to protecting a plethora of storage infra-
structures. It secures infrastructures from
on-premises storage systems [including
SAN, NAS, DAS, disk storage systems,
tape library, virtual tape library (VTL) and
object stores, for instance] to virtualization
(hypervisor data stores), big data (Hadoop)
and even off-premises cloud storage (AWS
S3 and EBS, OpenStack Swift and Cinder,
Google Cloud Storage, and Microsoft®
Azure™
Storage, for example).
Bloombase StoreSafe operates as a stor-
age proxy over heterogeneous networked
storage environments. To the network, the
solution looks like a virtual LUN, a network
share, VTL storage target or even a RESTful
storage service endpoint. As applications
make data storage requests, Bloombase
StoreSafe automatically and transparently
encrypts the plain text before it is physically
persisted in the storage medium. Likewise,
decryption of cipher text is performed on
the fly as data is requested from the per-
sistent storage, presenting the clear text
to the requesting application as if it were
Figure 1. The new Hitachi Data Systems and
Bloombase application-transparent security
solution safeguards data with industry-
standard cryptography.
DATASHEET
© Hitachi Data Systems Corporation 2014. All rights reserved. HITACHI is a trademark or registered trademark of Hitachi, Ltd. Microsoft and Azure are trademarks or registered
trademarks of Microsoft Corporation. All other trademarks, service marks, and company names are properties of their respective owners.
DS-354-A DG October 2014
Corporate Headquarters
2845 Lafayette Street
Santa Clara, CA 95050-2639 USA
www.HDS.com community.HDS.com
Regional Contact Information
Americas: +1 408 970 1000 or info@hds.com
Europe, Middle East and Africa: +44 (0) 1753 618000 or info.emea@hds.com
Asia Pacific: +852 3189 7900 or hds.marketing.apac@hds.com
never encrypted. This schema guarantees
operational transparency and maximum
interoperability. Unauthorized clients
accessing data from a StoreSafe protected
persistent storage will be unable to interpret
the protected cipher text.
Supporting a host of industry-standard pro-
tocols, StoreSafe is application transparent,
operating-system agnostic, portable across
storage technologies and vendor neutral.
Purpose-built, StoreSafe is a software appli-
ance adapted for deployment on commodity
hardware servers in both physical data centers
and virtual data centers. It can be deployed on
hypervisors and private clouds, or as compute
instances on cloud infrastructures.
Hitachi Content Platform:
Enterprise-Class Cloud Storage
Hitachi Content Platform is an unstructured
content object store that facilitates access
and retention of data in a multitenant envi-
ronment. Through HCP, applications interact
with content over standard network storage
protocols. Organizations can quickly provision
storage across different on- and off-premises
data center topologies while retaining the free-
dom to move data quickly and automatically.
An intelligent, object storage system, HCP
supports multiple tiers of storage for a wide
range of structured and unstructured con-
tent. It also offers a multitenant architecture
and object versioning, all in a single platform.
Other features include:
■■ Content immutability via “write once, read
many” (WORM) capabilities.
■■ Content retention at the storage layer.
■■ Encryption of data against unauthorized
access.
■■ Deduplication capabilities: compression;
built-in data protection, verification and
repair; bi-directional tier to cloud.
■■ Replication services for disaster recovery.
■■ High scalability, up to 80PB.
Data Protection Services
Hitachi Data Systems offers various data protection and replication services that sim-
plify and accelerate local and remote data replication and disaster recovery solutions.
These solutions enable normal business operations to resume in minutes, rather than
hours or days, following a primary site outage. They help you meet your service levels
quicker and with lower risk.
HCP and StoreSafe: Security,
Flexibility and Performance
The Bloombase StoreSafe solution integrates
with anything from traditional storage systems
to next-generation object storage solutions
like Hitachi Content Platform. StoreSafe pro-
vides robust and reliable privacy protection
for content management, retention, backup
and archival applications with HCP. StoreSafe
supports transparent encryption protection of
HCP data content over network storage pro-
tocols including NFS, CIFS, HTTP, WebDAV,
AWS S3 and other RESTful storage services.
This allows existing HCP applications to auto-
matically encrypt business-sensitive data as
they write through StoreSafe. Likewise, by
retrieving secure HCP content via StoreSafe,
encrypted information is automatically
deciphered and presented to trusted HCP
applications as plain text. Without needing
to modify the business logic of HCP applica-
tions, organizations can immediately ensure
that their business-sensitive information is
managed by HCP securely and meets data
privacy regulatory compliance requirements.
StoreSafe realizes true separation of duties
(SoD) without impacting storage administra-
tors and operators. Data is stored in standard
volumes, shares, files and objects and are
encrypted or decrypted on the fly without
supervision and transparently. StoreSafe
seamlessly protects both on- and off-
premises at-rest data, regardless of the
complexity of the heterogeneous storage
infrastructure or storage medium. It can just
as easily protect data in content addressed
storage (CAS) such as object stores, tape
libraries, VTLs and various cloud storage ser-
vices. Enterprises can mitigate data leakage
threats and still meet data privacy and regula-
tory compliance requirements cost effectively.
Because of its transparent, agentless storage
proxy schema, the solution is futureproof and
ensures easy integration with any storage
technology.
Highly scalable, StoreSafe is built for high
availability and mission-critical applications. It
offers high-speed AES encryption and indus-
try standard IEEE 1619 compliant storage
security. StoreSafe leverages Intel’s AES-NI
cryptographic accelerator to dynamically even
out encryption workloads. There is a built-in
pluggable cipher algorithm architecture that
facilitates adaptation and enables compliance
with specific national and vertical market
security requirements. Other supported
standards include built-in NIST FIPS 140-2
certified key management and support for
PKCS#11 hardware security modules (HSM)
and OASIS KMIP compliant key managers.
Together, Hitachi Data
Systems and Bloombase
deliver unique transparent
encryption protection. They
enable business applications
to secure unstructured data
contents seamlessly with
validated cryptographic technologies at zero
operational change. These capabilities give
applications a trusted data environment for
day-to-day storage and long-term archival. To
learn more, contact your HDS or Bloombase
representative or visit www.HDS.com.
LEARN MORE
HDS and
Bloombase

More Related Content

What's hot

The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012Валерий Коржов
 
Object storage
Object storageObject storage
Object storageronpoul
 
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva
 
How e fpga future proofs data centers
How e fpga future proofs data centersHow e fpga future proofs data centers
How e fpga future proofs data centersdonnabrown085
 
Stackscale, infrastructure, bare-metal and private cloud
Stackscale, infrastructure, bare-metal and private cloudStackscale, infrastructure, bare-metal and private cloud
Stackscale, infrastructure, bare-metal and private cloudDavid Carrero Fdez-Baillo
 
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM India Smarter Computing
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionInka Traktman
 
Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)SP Home Run Inc.
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword EU Project
 
Storage Training July 10
Storage Training July 10Storage Training July 10
Storage Training July 10Fiaz27
 
Transceiver – How They Help Support Big Data in Data Centers?
 Transceiver – How They Help Support Big Data in Data Centers? Transceiver – How They Help Support Big Data in Data Centers?
Transceiver – How They Help Support Big Data in Data Centers?Fern Xu
 
Cloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix OverviewCloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix OverviewNirvanix
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storagePreludedx
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQDruva
 
Webinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File SystemWebinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File SystemStorage Switzerland
 
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Adnene Guabtni
 

What's hot (20)

F017414853
F017414853F017414853
F017414853
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
 
Object storage
Object storageObject storage
Object storage
 
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
 
How e fpga future proofs data centers
How e fpga future proofs data centersHow e fpga future proofs data centers
How e fpga future proofs data centers
 
Stackscale, infrastructure, bare-metal and private cloud
Stackscale, infrastructure, bare-metal and private cloudStackscale, infrastructure, bare-metal and private cloud
Stackscale, infrastructure, bare-metal and private cloud
 
Infrastructure Training Session
Infrastructure Training SessionInfrastructure Training Session
Infrastructure Training Session
 
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protection
 
Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges
 
Storage Training July 10
Storage Training July 10Storage Training July 10
Storage Training July 10
 
Transceiver – How They Help Support Big Data in Data Centers?
 Transceiver – How They Help Support Big Data in Data Centers? Transceiver – How They Help Support Big Data in Data Centers?
Transceiver – How They Help Support Big Data in Data Centers?
 
Cloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix OverviewCloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix Overview
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storage
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQ
 
Webinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File SystemWebinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File System
 
Database security
Database securityDatabase security
Database security
 
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
 

Viewers also liked

Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sbBloombase
 
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Bloombase
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewBloombase
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeBloombase
 
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...Bloombase
 

Viewers also liked (7)

Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sb
 
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
 
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
 

Similar to Hitachi datasheet-hcp-and-bloombase-storesafe

4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageIaetsd Iaetsd
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase
 
Hitachi Content Platform Datasheet
Hitachi Content Platform DatasheetHitachi Content Platform Datasheet
Hitachi Content Platform DatasheetHitachi Vantara
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Exclusive Networks ME
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
Bloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sbBloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sbBloombase
 
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerJerome J. Penna
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopVoltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopHPE Security - Data Security
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0 TTEC
 

Similar to Hitachi datasheet-hcp-and-bloombase-storesafe (20)

4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
Hitachi Content Platform Datasheet
Hitachi Content Platform DatasheetHitachi Content Platform Datasheet
Hitachi Content Platform Datasheet
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
Bloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sbBloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sb
 
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
 
Cleversafe.PPTX
Cleversafe.PPTXCleversafe.PPTX
Cleversafe.PPTX
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopVoltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in Hadoop
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0
 

More from Bloombase

Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Bloombase
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usenBloombase
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletBloombase
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-editionBloombase
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Bloombase
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiBloombase
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyerBloombase
 
Additional license authorizations
Additional license authorizationsAdditional license authorizations
Additional license authorizationsBloombase
 

More from Bloombase (20)

Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbooklet
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-edition
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyer
 
4aa5 2782
4aa5 27824aa5 2782
4aa5 2782
 
Additional license authorizations
Additional license authorizationsAdditional license authorizations
Additional license authorizations
 
4aa5 3404
4aa5 34044aa5 3404
4aa5 3404
 

Recently uploaded

办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 

Recently uploaded (20)

办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 

Hitachi datasheet-hcp-and-bloombase-storesafe

  • 1. Hitachi Data Systems and Bloombase application-transparent encryption solution: n Safeguards data with industry-standard cryptography. n Protects against outbound data exposure threats. n Allows both on- and off-premises deployment. n Meets confidentiality, regulatory compliance requirements. DATASHEET Mitigate Catastrophic Data Exposure Vulnerabilities For any enterprise, unauthorized data exposure remains a critical, yet unresolved problem. The causes can be both inten- tional (hardware theft, espionage and so on) and unintentional (media loss, viral attacks, and so on). The unbridled rate at which global businesses are taking advantage of off-premises cloud and managed services is only going to exacerbate the problem: These offerings can increase the risk of exposure, regardless of the number of net- work defenses in place. The Increasing Complexities of Protecting Stored Data A paradigm shift in the approach to data management is evident: There is a move away from managing a restrictive set of critical data stored in a structured relational database management system (RDBMS) to the management and storage of virtually everything and anything. There is also a concomitant shift in the way data is stored: from on-premises storage infrastructure to off-premises cloud, platform as a ser- vice (PaaS), managed service provider (MSP), and so on. Although the use of data encryption is vital for the protection of information, database-level encryption does not work with unstructured data for Bloombase StoreSafe Data-at-Rest Security for Hitachi Content Platform analytics applications. Furthermore, propri- etary point-based encryption tool kits are hard to maintain and difficult to integrate into existing applications and software-as- a-service (SaaS) environments. Then, there is storage-based encryption, which involves hardware infrastructure changes and rein- vestment, often resulting in vendor lock-in and posing challenges for cloud-based models. To combat these data vulnerability challenges, Hitachi Data Systems and Bloombase are offering a joint solution based on Hitachi Content Platform (HCP) and Bloombase StoreSafe (see Figure 1). Bloombase StoreSafe: Maximum Storage Security, Minimum Effort Required Bloombase StoreSafe is an agentless, turnkey encryption solution for data- at-rest applications. Its nondisruptive, application-transparent and protocol- preserving features make it ideally suited to protecting a plethora of storage infra- structures. It secures infrastructures from on-premises storage systems [including SAN, NAS, DAS, disk storage systems, tape library, virtual tape library (VTL) and object stores, for instance] to virtualization (hypervisor data stores), big data (Hadoop) and even off-premises cloud storage (AWS S3 and EBS, OpenStack Swift and Cinder, Google Cloud Storage, and Microsoft® Azure™ Storage, for example). Bloombase StoreSafe operates as a stor- age proxy over heterogeneous networked storage environments. To the network, the solution looks like a virtual LUN, a network share, VTL storage target or even a RESTful storage service endpoint. As applications make data storage requests, Bloombase StoreSafe automatically and transparently encrypts the plain text before it is physically persisted in the storage medium. Likewise, decryption of cipher text is performed on the fly as data is requested from the per- sistent storage, presenting the clear text to the requesting application as if it were Figure 1. The new Hitachi Data Systems and Bloombase application-transparent security solution safeguards data with industry- standard cryptography.
  • 2. DATASHEET © Hitachi Data Systems Corporation 2014. All rights reserved. HITACHI is a trademark or registered trademark of Hitachi, Ltd. Microsoft and Azure are trademarks or registered trademarks of Microsoft Corporation. All other trademarks, service marks, and company names are properties of their respective owners. DS-354-A DG October 2014 Corporate Headquarters 2845 Lafayette Street Santa Clara, CA 95050-2639 USA www.HDS.com community.HDS.com Regional Contact Information Americas: +1 408 970 1000 or info@hds.com Europe, Middle East and Africa: +44 (0) 1753 618000 or info.emea@hds.com Asia Pacific: +852 3189 7900 or hds.marketing.apac@hds.com never encrypted. This schema guarantees operational transparency and maximum interoperability. Unauthorized clients accessing data from a StoreSafe protected persistent storage will be unable to interpret the protected cipher text. Supporting a host of industry-standard pro- tocols, StoreSafe is application transparent, operating-system agnostic, portable across storage technologies and vendor neutral. Purpose-built, StoreSafe is a software appli- ance adapted for deployment on commodity hardware servers in both physical data centers and virtual data centers. It can be deployed on hypervisors and private clouds, or as compute instances on cloud infrastructures. Hitachi Content Platform: Enterprise-Class Cloud Storage Hitachi Content Platform is an unstructured content object store that facilitates access and retention of data in a multitenant envi- ronment. Through HCP, applications interact with content over standard network storage protocols. Organizations can quickly provision storage across different on- and off-premises data center topologies while retaining the free- dom to move data quickly and automatically. An intelligent, object storage system, HCP supports multiple tiers of storage for a wide range of structured and unstructured con- tent. It also offers a multitenant architecture and object versioning, all in a single platform. Other features include: ■■ Content immutability via “write once, read many” (WORM) capabilities. ■■ Content retention at the storage layer. ■■ Encryption of data against unauthorized access. ■■ Deduplication capabilities: compression; built-in data protection, verification and repair; bi-directional tier to cloud. ■■ Replication services for disaster recovery. ■■ High scalability, up to 80PB. Data Protection Services Hitachi Data Systems offers various data protection and replication services that sim- plify and accelerate local and remote data replication and disaster recovery solutions. These solutions enable normal business operations to resume in minutes, rather than hours or days, following a primary site outage. They help you meet your service levels quicker and with lower risk. HCP and StoreSafe: Security, Flexibility and Performance The Bloombase StoreSafe solution integrates with anything from traditional storage systems to next-generation object storage solutions like Hitachi Content Platform. StoreSafe pro- vides robust and reliable privacy protection for content management, retention, backup and archival applications with HCP. StoreSafe supports transparent encryption protection of HCP data content over network storage pro- tocols including NFS, CIFS, HTTP, WebDAV, AWS S3 and other RESTful storage services. This allows existing HCP applications to auto- matically encrypt business-sensitive data as they write through StoreSafe. Likewise, by retrieving secure HCP content via StoreSafe, encrypted information is automatically deciphered and presented to trusted HCP applications as plain text. Without needing to modify the business logic of HCP applica- tions, organizations can immediately ensure that their business-sensitive information is managed by HCP securely and meets data privacy regulatory compliance requirements. StoreSafe realizes true separation of duties (SoD) without impacting storage administra- tors and operators. Data is stored in standard volumes, shares, files and objects and are encrypted or decrypted on the fly without supervision and transparently. StoreSafe seamlessly protects both on- and off- premises at-rest data, regardless of the complexity of the heterogeneous storage infrastructure or storage medium. It can just as easily protect data in content addressed storage (CAS) such as object stores, tape libraries, VTLs and various cloud storage ser- vices. Enterprises can mitigate data leakage threats and still meet data privacy and regula- tory compliance requirements cost effectively. Because of its transparent, agentless storage proxy schema, the solution is futureproof and ensures easy integration with any storage technology. Highly scalable, StoreSafe is built for high availability and mission-critical applications. It offers high-speed AES encryption and indus- try standard IEEE 1619 compliant storage security. StoreSafe leverages Intel’s AES-NI cryptographic accelerator to dynamically even out encryption workloads. There is a built-in pluggable cipher algorithm architecture that facilitates adaptation and enables compliance with specific national and vertical market security requirements. Other supported standards include built-in NIST FIPS 140-2 certified key management and support for PKCS#11 hardware security modules (HSM) and OASIS KMIP compliant key managers. Together, Hitachi Data Systems and Bloombase deliver unique transparent encryption protection. They enable business applications to secure unstructured data contents seamlessly with validated cryptographic technologies at zero operational change. These capabilities give applications a trusted data environment for day-to-day storage and long-term archival. To learn more, contact your HDS or Bloombase representative or visit www.HDS.com. LEARN MORE HDS and Bloombase