SlideShare a Scribd company logo
1 of 35
SafeNet and NetApp Come Together
   Next Gen Encryption and Enterprise Key Management

                                         SafeNet and NetApp have teamed to
                                         provide an unparalleled combination
                                         of security and storage efficiency




   Ondrej Valent
   Regional Channel Sales Manager
   ondrej.valent@safenet-inc.com
   SafeNet, Inc. | www.safenet-inc.com
   14. 9. 2011
© SafeNet Confidential and Proprietary
Agenda
 I. Introduction
         Who is SafeNet
         Why are we here today
         NetApp + SafeNet relationship


         Overview of Products
           StorageSecure Overview
                 Real world customer deployments
           Understanding and Architecting a Unified Key Management Strategy
                 KeySecure Overview
                 8 Steps to Designing a Centralized Key Management Infrastructure




© SafeNet Confidential and Proprietary

                                                                                    2
Proven Leader. Trusted to Protect.
  SafeNet protects:
   > the most money that moves in the world. 80% of all electronic intrabanking
     transfers -- $1 trillion a day
   > the most digital identities in the world. Most PKI identities for governments
     and F-100 companies
   > the most high-value software in the world. 80 million hardware keys; more
     than any other vendor
   > the most classified information in the world. The largest deployment of
     government communications security

         Global Footprint with more than 25,000 customers in 100 countries




© SafeNet Confidential and Proprietary

                                                                                     3
Data Protection – It’s in the Lifecycle

 SafeNet persistently protects information at critical point
 in its lifecycle, empowering customers to efficiently adapt
 to change and act on opportunity.

                                         • Protecting the identities of users, applications, and
                                           servers

                                         • Securing the transactions they perform

                                         • Enabling data ownership and control by encrypting
                                           data when it is created, accessed, shared, stored,
                                           and moved

                                         • Encrypting the critical communication paths on
                                           which data travels



© SafeNet Confidential and Proprietary

                                                                                                   4
SafeNet Data Protection Portfolio Summary
                                                                      Data Encryption and Control   Communication Protection –
            Identity Protection -          Transaction and Identity
                                                                            – DataSecure,             High-Speed Network
               Authentication                 Protection - HSM
                                                                      StorageSecure, KeySecure             Encryption




      Offering the broadest range          The most secure, and          World’s first and only        SafeNet high-speed
        of authenticators, from              easiest to integrate        unified platform that          network encryptors
      smart cards and tokens to           application & transaction     delivers intelligent data      combine the highest
        mobile phone auth—all               security solution for      protection and control for      performance with the
        managed from a single            enterprise and government      ALL information assets        easiest integration and
                platform                                                                                  management.

      > The industry’s only              > Market leader in           > Data-centric, persistent    > Solutions for Ethernet,
        unified authentication             enterprise-grade HSMs        protection across data        SONET up to 10Gb
        platform offering                > Industry innovator in        centers, endpoints, and     > Best-in-class Security
        customers the freedom              payment HSMs                 into the cloud                Management Center
        to adapt to changing                                          > Centralized policy, key
        environments                     > Widest portfolio of                                      > Zero bandwidth loss,
                                           platforms and solutions      management, logging,          low- latency encryption
      > The market leader in                                            and auditing
        certificate-based token          > Delivered over 75,000                                    > Unparalleled leverage
                                           HSMs— the most in the      > Integrated perimeter          across classified and
        authentication                                                  data leakage prevention
                                           industry                                                   COTS communication
      > Unique technology                                             > Appliance-based,              protection (FIPS 140-2
        offerings with client-less       > Only leading HSM with
                                           the option of keys           proven scalability, and       Level 3)
        tokens, high-assurance                                          high performance
        solutions, and more                ALWAYS in Hardware




© SafeNet Confidential and Proprietary

                                                                                                                                 5
From the Data Center to the Edge, to the Cloud
Solutions that Extend Trust and Control into Virtualized Environments

                                                                                                          ProtectDB
                                                                              ProtectFile
                                                                                                                Database              ProtectApp
                                                                                   File Servers

                                                                                                                                            Application/
                                                                                                                                            Web Servers
                                                                                                                           HSM
                                                        ProtectZ
                                                  Mainframe                                         KeySecure
                                                                                                                                                    PKI Infrastructure
                                                                                                                                                    Certificate Authority


                                                                         DataSecure         StorageSecure       Brocade     NetApp (NSE)
                                                                                                                 (BES)         (FAS)
                                                                                                  Data Encryption
                ProtectFile
               ProtectDrive
                                                                                                  & Control
                                                            eSafe                                                     High Speed Encryption
            Endpoint
            Protection
                                                                                        1
                                                   Communication Protection                                           Communication Protection



                                                                                                                                           Cloud Solutions
                                                                                                                                     Protect VVolume             ProtectVInstance



                              Authentication & Access
                                   Management
                                                                                                                             Secure Cloud-based Storage       Secure Virtual Instance Control
                                            Identity Protection                                                                                                               HSM
                                                                                                                                 DataSecure, ProtectApp,
                                                                                                                                       ProtectDB,


                                                                                                                                                                      Secure Cloud Identities
                                                                                                                              Secure Cloud Application Data              and Transactions

                                                                                                                                                                                HSE
                                                                                                                                   Authentication & Access
                                                                                                                                        Management



                                                                                                                                                                            Secure Cloud
                                                                                                                                                                           Communications
                                                                                                                           Secure Authentication for Cloud Services

© SafeNet Confidential and Proprietary

                                                                                                                                                                                                6
…So Why Are We Here?
Why NetApp and SafeNet?


       Storage Leadership                           Security Leadership
        Established market for DataFort and          Introduce replacements for the EOA
         LKM, licensed Decru technology to             DataFort E-series and Lifetime Key
         SafeNet to build continued next-gen           Manager (LKM) appliances
         products
        Largest installed base of storage
         encryption appliances
                                               +      Global security leader, proven data
                                                       protection expertise
                                                      Standards-based KMIP KM
        Established channel and sales                 platform—supports BES, NSE,
         organizations                                 heterogeneous environments
                                                      Universal Storage encryption

   NetApp and SafeNet – The leaders in storage and security have joined forces to introduce the
   next generation of storage security and key management solutions.




© SafeNet Confidential and Proprietary

                                                                                                  7
NetApp Security Offering




© SafeNet Confidential and Proprietary

                                         8
© SafeNet Confidential and Proprietary

                                         9
Now for the fun part…let’s get into the technology

       Storage Encryption and Key Management




© SafeNet Confidential and Proprietary
Network-Based Storage Encryption
  Compliant, Fast, Transparent, Cost Effective
                                         • FIPS 140-2 Level 3 validation meets PCI, HIPAA,
            Meet Regulatory
                                           and government data security requirements for
             Requirements                  data at rest

                                         • Encrypt data at wire speeds
            No Performance               • No impact to existing applications
                Impact                   • Have no requirement for additional CPU
                                           overhead
                                         • Plug seamlessly into current IT environment
          Ease of Installation           • Realize zero downtime or disruption to
                                           workflow
                                         • No need for modifications to hosts, servers,
                                           applications, or forklift upgrades to storage
                   Scalability           • As data grows, scale cost-effectively

© SafeNet Confidential and Proprietary

                                                                                             11
SafeNet Next Generation, Drop-in Upgrade for
 NetApp E-Series DataFort and LKM
 StorageSecure is the industry’s only unified
 platform for securing data across the entire enterprise

 StorageSecure integrates transparently into network-based file and block
 Encryption (NAS and IP-SAN) environments, and protects
 stored data with high-speed encryption, strong access
 controls, authentication, and tamper-proof auditing:
       1 to 10Gbps throughput
       Industry standard protocols
       Multiple 10GE interfaces
       Low latency, wire-speed encryption and decryption engine
       Clustering for high reliability and availability


 KeySecure delivers enterprise wide key management



© SafeNet Confidential and Proprietary

                                                                            12
StorageSecure—Typical Data Flow

                                         StorageSecure

                                                         Encrypted Data




   Cleartext Data                        StorageSecure




© SafeNet Confidential and Proprietary

                                                                          13
StorageSecure Storage Encryption

                                                                               Storage Encryption
                                    Data written
                                    to storage
                                                                                                Cryptainer1
                                                                                                Storage
                                                                                                Cryptainer2
                                                                                                Cryptainer3
                                                    StorageSecure

                                                                                                 Data read
                                                                                                 from storage
               Clients/
               Hosts



               Authentication/Storage VPN                             AES-256 Encrypted

                      ACL Enforcement                               Compartmentalization
                      IPSec*/SSL (NAS)                              Mitigates insider threats
                      Supports AD/NIS/LDAP                          Information sharing
                      Crypto-signed logging*                        Secure Key Management

                      *deferred until release 1.1

© SafeNet Confidential and Proprietary

                                                                                                                14
StorageSecure Advantages
          Transparent Deployment
                  No agents or application/database changes
                  Native support for NFS, CIFS, iSCSI
                  Transparent rekeying* enables zero downtime deployment
          Negligible Performance Impact
                  Supports multi-gigabit line rate speeds
                  Minimal latency (~150 microsecond) with ‘Cut-through Crypto’
                  Tape: Hardware-based compression before encryption
          Hardware-based Security
                  Clear-text keys never leave secure hardware
                  Stringent certification: FIPS 140-2 Level 3 compliant (validation in process)
                  Trusted by sensitive military, intelligence, banking customers
          Secure Enterprise-wide Key Management
                  Simple, yet secure key sharing for availability and information sharing
                  KeySecure for automated enterprise-wide mgmt


© SafeNet Confidential and Proprietary     *Deferred to release 1.1
                                                                                                  15
StorageSecure
for NAS environments




© SafeNet Confidential and Proprietary
               © 2008 NetApp. All rights reserved.   16
                                                      16
NAS Infrastructure Without StorageSecure
                                                              • Data accessible by default – need
                 `                                              appropriate ACLs to deny access
                                                              • Replicas, backups represent additional
                                                                exposure points
              
            
            ACLs
                                                             • Single factor admin authentication,
                                                                inconsistent role separation (e.g., root,
                                                          ?     domain admin, super-user can access data)

                      Cleartext
                                                              • Audit logs susceptible to tampering
                                              Cleartext
                      Cleartext
                                              Cleartext

                                                              • Data ‘mixing’ concerns on consolidated
                      Cleartext
                                              Cleartext
                      Cleartext
                                              Cleartext


                                                                storage
                                                              • Data on old disks is easily accessible
                                                               without sanitization
                                              Cleartext


                                         
                                              Cleartext
                                              Cleartext
                                              Cleartext




        STORAGE                      BACKUP
        ADMIN                        ADMIN

© SafeNet Confidential and Proprietary

                                                                                                         17
NAS Infrastructure With StorageSecure
                                                                • ACL enforcement –second level ACLs on
                     `
                                                                  StorageSecure needed to allow access
                                                                • Replicas, backups automatically secured –
                                                                  encryption keys provide single point of control
                ACLs 
                                                             • Dual factor DF admin authentication, fine
                                                                  grained role separation
                  StorageSecure                             
                                                                • Cryptographically signed audit logs capture
                         F2>:P;
                         <F3><B                    F2>:P;
                                                                  admin actions, user access
                         1><9F>                    <F3><B
                         <97>^Q                    1><9F>
                         <BA><E                    <97>^Q
                                                   <BA><E       • Cryptographic data separation, even on
                                                                  shared physical disks
                                                                • Data on old disks is secure without
AUDIT                                             F2>:P;
                                                                  encryption keys
LOGS                                               <F3><B
                                                   1><9F>

                                                  <97>^Q
                                                   <BA><E




            STORAGE                       BACKUP
            ADMIN                         ADMIN

 © SafeNet Confidential and Proprietary

                                                                                                                18
Deployment Use Cases
      StorageSecure on the Road




© SafeNet Confidential and Proprietary

                                         19
StorageSecure Use Case Snapshot
  Conversation Mapping

                                                                     Encryption-enabled separation
                                            Isolate Data in Multi-
                                   1        tenant Environments
                                                                        of data in shared virtual
                                                                             environments



                                          Protect Compliant Data     Encrypt Data in Real-Time at
                                   2      (Maintain PCI Posture)     the Point of Capture/Creation
World Leading
    Bank
                                                                       Encrypt Data in Primary &
                                            Protect Offline Data
                                   3                                   Secondary Storage Before
                                                in Archives
                                                                            Writing to Tape



                                          Destroy Data Securely or    Destroy Encryption Keys at
                                   4        Repurpose Storage        Any Point of the Data Lifecycle




 © SafeNet Confidential and Proprietary

                                                                                                       20
StorageSecure Use Case #1:
  Data Isolation and Separation of Duties
      Customer 1:


     web        app         db

      Customer 2:                                              Cryptainer1


                                                               Cryptainer2
              and/or
   Bank Office 1:                                        NAS   Cryptainer3
   Customer Support                      StorageSecure

                                                               Cryptainer4


    Bank Office 2:
    Headquarters




© SafeNet Confidential and Proprietary

                                                                         21
StorageSecure Use Case #2:
  Protect Compliant Data
          Networked
          Applications



     web           app           db

      Mobile Workers
                                                                          Storage
                                                                          (Disk and Tape) Encrypted

                                                                                        Encrypted


    Corporate Offices
                                         StorageSecure                     NAS


                                                         Address global data
  Military Applications                                  protection mandates:
                                                         PCI-DSS, GLBA, SB1386,
                                                         Basel II, DoD 5015.2,
                                                         HIPAA, SEPA, SOX, etc.
© SafeNet Confidential and Proprietary

                                                                                                22
StorageSecure Use Case #3:
  Archival Protection
          Networked
          Applications



     web           app           db

      Mobile Workers
                                                         Primary Storage         Secondary Storage




    Corporate Offices
                                         StorageSecure
                                                               NAS


  Military Applications                                                                      NAS


                                                             Encrypted Encrypted Encrypted

© SafeNet Confidential and Proprietary

                                                                                                   23
StorageSecure Use Case #4:
  Secure Data Destruction
          Networked
          Applications



     web           app           db

      Mobile Workers
                                                         Storage
                                                         (Disk and Tape) Encrypted

                                                                       Encrypted


    Corporate Offices
                                         StorageSecure     NAS



      “Data in Danger “




© SafeNet Confidential and Proprietary

                                                                                   24
Understanding and Architecting a
     Unified Key Management Strategy




© SafeNet Confidential and Proprietary
Customer Problem
                                                       Web/Application
                                                       Servers
                                                                                      “Pockets” of Encryption Domains
                                                                  Database
                                                                  Servers                 Multi-vendor silo-ed systems
                                                                                          Platform-specific solutions
                                                                                          Fragmented policy and key
                                                                         Mainframes       management

                                                                             File
                                                                                      Operational Inefficiencies
                                                                             Shares
                                                                                          “Spreadsheet” key management
                                                                                          Manual audit reviews
                                                                                      Audit Deficiencies & Failures
                                         Storage

                                                                                          Regular key rotation
                                                                                          Standards adherence (NIST 800-57,
                                                                                          PCI-DSS, etc.)
                                         Cloud/Virtualization

                                               “Open” Clients




                                                                                            Laptop/Desktops

© SafeNet Confidential and Proprietary

                                                                                                                              32
Requirements that Drive Key Management
    Regulations
                                           •   PCI, Privacy Regulations impose financial penalties
                                           •   Proactive security measures have compelling ROI

   IP Protection                           • Protect IP, digital assets from insider threat
                                           • Strengthen access controls


                                           • Consolidation and central management of keys across
Security Best Practices
                                             security silos
                                           • Strong authentication and admin role separation
                                           • Non-repudiable auditing
                                           • Secure data disposal
  Business Trends
                                           • Controlled data access with outsourced IT, offshore
                                             development centers


  © SafeNet Confidential and Proprietary

                                                                                                     33
An Ideal Enterprise Key Manager


                                                                     Application and
                                                                      web servers       Databases
                                                     File Servers


                                                    Hardware


                                                                                                          Mainframes


                                         Laptop/mobile
                                           Handset


                                                                    SafeNet KeySecure                         Backup
                                                                                                              Media




                                              > Secure, Centralized Key Management
                                              > Data-centric Policy Management                      Storage
                                              > Identity & Access Management
                                              > Visibility via Logging, Auditing,
                                                Reporting

© SafeNet Confidential and Proprietary

                                                                                                                       34
Best Practices for Enterprise Key Lifecycle
  Management
           Create                        Attribute          Secure              Modify           Distribute            Expire


Generate high                Assign                  Secure keys by      Automate key       Provide a secure   Enable purge
entropy keys                 permissions and         wrapping with       rotation and       method to          and delete key
                             key ownership to        secure keys         other critical     distribute keys    upon pre-set
                             privileged users                            functions          for high           expiration
                             based on roles          Cannot store                           availability and   policies
                                                     clear text key in   Allow key          usage
                             Enable                  external memory     attributes to be
                             authenticated                               modified
                             clients to set and                          (create/delete/
                             modify key                                  rotate) by
                             attributes                                  authenticated
                                                                         key owners




© SafeNet Confidential and Proprietary

                                                                                                                                35
A Storage Infrastructure With and Without
     Secure Key Management and Encryption


                                                                 AUDIT
                                                                 LOGS
                                           ACLs
                                                                               F2>:P;          F2>:P;
                       
                                           
                                                                               <F3><B
                                                                               Cleartext       <F3><B
                                                                                               Cleartext
         `                                                                     1><9F>          1><9F>

                                           ?
                                                                               Cleartext       Cleartext
                                                                               <97>^Q
                                                                               Cleartext       <97>^Q
                                                                                               Cleartext
                                                                               <BA><E
                                                                               Cleartext       <BA><E
                                                                                               Cleartext




                                          
                                           ?
                                          
                                           ?
                                                     
                                                                               
                                                                               ?                ?
                                                                                                
                                                     SECURITY                       NETWORKING/DOMAIN      STORAGE
                                                     ADMIN                          ADMIN                  ADMIN




Gaps in
Strong                             Inconsistent
                                 Cryptographic      Insiders (admin)
                                                     Insider manage      Backup/replica
                                                                         All data copies       Data exposed
                                                                                              Data separation,
authentication                     ACLs
                                 ACLs, audit logs    access
                                                    but can’t read       exposure
                                                                         protected             on old disks
                                                                                              Secure disposal

  © SafeNet Confidential and Proprietary

                                                                                                                 36
Introducing SafeNet KeySecure k460
Enterprise Key Management

     Enterprise Key Management
             Centrally managed, consolidation of keys
             Up to 1 million keys per cluster
                                                        •Secure key replication to multiple appliances
             High Assurance Level                       •Active-Active mode of clustering
                                                        •Redundant, hot-swappable hard drives & power
     Standard based approach – OASIS KMIP (Key          •Heterogeneous solutions: SFNT and non-SFNT
                                                        devices, applications, databases, storage devices, SAN
Management Interoperability Protocol)                   switches, tape libraries, HSM, network and endpoint
                                                        devices, etc.
     Broadest Coverage in Industry
             NAS - StorageSecure
             SAN - Brocade Encryption Solutions (BES and FS8/18)
             KMIP support (NSE/FDE, Quantum Tape Library and other 3rd Party Support)
             Cloud-enabled



 © SafeNet Confidential and Proprietary

                                                                                                                 37
8 Steps to Designing a Centralized
                       Key Management Infrastructure




© SafeNet Confidential and Proprietary
Key Management Design Flow Chart


                                                                                Define Admin
        Define Security                    Discover         Classify Data
                                                                                  Roles &
             Goals                       Sensitive Data       Locations
                                                                               Responsibilities




          Map Data                         Define Data     Align Policies to   Document and
        Movement and                     Restoration Use       Business           Automate
         Use Cases                            Cases           Processes        Lifecycle Mgmt




© SafeNet Confidential and Proprietary

                                                                                                  39
In Summary…
  Next Generation Encryption and Key Management
              KeySecure acts as a “Glue” for an effective data protection strategy
              Wide coverage in Storage Encryption – NAS, SAN, DAS & Tape


                     Unified Key
                                         Robust, Standards-            Streamlined,
                    Manager for
                                            based Key                 Simplified Key
                   Storage, HSMs,
                                           Management                 Lifecycle Mgmt
                      ProtectV




                     Enterprise
                    Key Mgmt for
                                          KMIP Compliant            Centralized Platform
                   Heterogeneous
                   Environments




© SafeNet Confidential and Proprietary

                                                                                           47
Ondrej Valent
   Regional Channel Sales Manager CEE
   ondrej.valent@safenet-inc.com
   SafeNet, Inc. | www.safenet-inc.com
   15. 9. 2011
© SafeNet Confidential and Proprietary

More Related Content

What's hot

CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecurecnnetwork
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Securing Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUESecuring Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUEWSO2
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudSafeNet
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Lancope, Inc.
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfYounesChafi1
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1Lancope, Inc.
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Sean Xie
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudAmazon Web Services
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseRobb Boyd
 

What's hot (20)

CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Cloud security
Cloud securityCloud security
Cloud security
 
Securing Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUESecuring Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUE
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the Cloud
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Data center webinar_v2_1
Data center webinar_v2_1Data center webinar_v2_1
Data center webinar_v2_1
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the Cloud
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 

Viewers also liked

2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress NycBob Maley
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
Gemalto SafeNet solutions distributed by TESSIS
Gemalto SafeNet solutions distributed by TESSISGemalto SafeNet solutions distributed by TESSIS
Gemalto SafeNet solutions distributed by TESSISMikhail Rozhnov
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
Abol Software Introduction
Abol Software Introduction Abol Software Introduction
Abol Software Introduction Kyle O'Neill
 
Вестник Союза франчайзинга
Вестник Союза франчайзингаВестник Союза франчайзинга
Вестник Союза франчайзингаAndrey Kryvonos
 
Alamat kedutaan besar
Alamat kedutaan besarAlamat kedutaan besar
Alamat kedutaan besarAhmed Asrofi
 
Internet Resurs
Internet ResursInternet Resurs
Internet Resursbusujeva
 
Reisebericht Lehmann - Juni 2013 PL/HR
Reisebericht Lehmann - Juni 2013 PL/HRReisebericht Lehmann - Juni 2013 PL/HR
Reisebericht Lehmann - Juni 2013 PL/HRherbert1977
 
Brochure Produits Igubal®
Brochure Produits Igubal®Brochure Produits Igubal®
Brochure Produits Igubal®igus France
 
Éco actu n°19
Éco actu n°19Éco actu n°19
Éco actu n°19AudéLor
 
¿Qué es el RSS?
¿Qué es el RSS?¿Qué es el RSS?
¿Qué es el RSS?GuíaSalud
 
mesa metadosis
mesa metadosismesa metadosis
mesa metadosisALEKA
 

Viewers also liked (20)

2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Gemalto SafeNet solutions distributed by TESSIS
Gemalto SafeNet solutions distributed by TESSISGemalto SafeNet solutions distributed by TESSIS
Gemalto SafeNet solutions distributed by TESSIS
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Abol Software Introduction
Abol Software Introduction Abol Software Introduction
Abol Software Introduction
 
CASE Network Report 66 - Prospects for EU-Ukraine Economic Relations
CASE Network Report 66 - Prospects for EU-Ukraine Economic RelationsCASE Network Report 66 - Prospects for EU-Ukraine Economic Relations
CASE Network Report 66 - Prospects for EU-Ukraine Economic Relations
 
UgCS for Professionals
UgCS for ProfessionalsUgCS for Professionals
UgCS for Professionals
 
Вестник Союза франчайзинга
Вестник Союза франчайзингаВестник Союза франчайзинга
Вестник Союза франчайзинга
 
Alamat kedutaan besar
Alamat kedutaan besarAlamat kedutaan besar
Alamat kedutaan besar
 
Bc hc
Bc hcBc hc
Bc hc
 
Internet Resurs
Internet ResursInternet Resurs
Internet Resurs
 
Reisebericht Lehmann - Juni 2013 PL/HR
Reisebericht Lehmann - Juni 2013 PL/HRReisebericht Lehmann - Juni 2013 PL/HR
Reisebericht Lehmann - Juni 2013 PL/HR
 
Brochure Produits Igubal®
Brochure Produits Igubal®Brochure Produits Igubal®
Brochure Produits Igubal®
 
Éco actu n°19
Éco actu n°19Éco actu n°19
Éco actu n°19
 
0809023
08090230809023
0809023
 
¿Qué es el RSS?
¿Qué es el RSS?¿Qué es el RSS?
¿Qué es el RSS?
 
Nordite evaluation results, Henrik Stener Pedersen, Rambøll AS
Nordite evaluation results, Henrik Stener Pedersen, Rambøll AS Nordite evaluation results, Henrik Stener Pedersen, Rambøll AS
Nordite evaluation results, Henrik Stener Pedersen, Rambøll AS
 
mesa metadosis
mesa metadosismesa metadosis
mesa metadosis
 
France
FranceFrance
France
 

Similar to SafeNet - Data Protection Company

марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012Валерий Коржов
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sbBloombase
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITMarketingArrowECS_CZ
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesKim Bookout
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseSafeNet
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeSysfore Technologies
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMLuigi Perrone
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...Marcel Winandy
 
A New Trust Model for 5G Networks
A New Trust Model for 5G NetworksA New Trust Model for 5G Networks
A New Trust Model for 5G NetworksPaul Bradley
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetInternet Security Auditors
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 

Similar to SafeNet - Data Protection Company (20)

марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sb
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Achieving Data Privacy in the Enterprise
Achieving Data Privacy in the EnterpriseAchieving Data Privacy in the Enterprise
Achieving Data Privacy in the Enterprise
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data ...
 
A New Trust Model for 5G Networks
A New Trust Model for 5G NetworksA New Trust Model for 5G Networks
A New Trust Model for 5G Networks
 
Secure Cloud Reference Architecture
Secure Cloud Reference ArchitectureSecure Cloud Reference Architecture
Secure Cloud Reference Architecture
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Information Security
Information SecurityInformation Security
Information Security
 
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNetTecnologías para el Cumplimiento. Alexandre Bento. SafeNet
Tecnologías para el Cumplimiento. Alexandre Bento. SafeNet
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 

More from ASBIS SK

ICT služby ASBIS-u
ICT služby ASBIS-uICT služby ASBIS-u
ICT služby ASBIS-uASBIS SK
 
Dell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediachDell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediachASBIS SK
 
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.ASBIS SK
 
Evolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateEvolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateASBIS SK
 
VMware world news
VMware world newsVMware world news
VMware world newsASBIS SK
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorASBIS SK
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorASBIS SK
 
Veeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose VeeamVeeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose VeeamASBIS SK
 
Deduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediachDeduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediachASBIS SK
 
VMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZVMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZASBIS SK
 
Cisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience InfrastructureCisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience InfrastructureASBIS SK
 
IBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xIBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xASBIS SK
 
ATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouASBIS SK
 
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...ASBIS SK
 
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...ASBIS SK
 
Acronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloudAcronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloudASBIS SK
 
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...ASBIS SK
 
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...ASBIS SK
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudASBIS SK
 
VMware: Súčasnosť a trendy v cloud computingu
VMware: Súčasnosť a trendy v cloud computinguVMware: Súčasnosť a trendy v cloud computingu
VMware: Súčasnosť a trendy v cloud computinguASBIS SK
 

More from ASBIS SK (20)

ICT služby ASBIS-u
ICT služby ASBIS-uICT služby ASBIS-u
ICT služby ASBIS-u
 
Dell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediachDell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediach
 
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
 
Evolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateEvolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 update
 
VMware world news
VMware world newsVMware world news
VMware world news
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
 
Veeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose VeeamVeeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose Veeam
 
Deduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediachDeduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediach
 
VMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZVMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZ
 
Cisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience InfrastructureCisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience Infrastructure
 
IBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xIBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System x
 
ATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkou
 
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
 
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
 
Acronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloudAcronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloud
 
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
 
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloud
 
VMware: Súčasnosť a trendy v cloud computingu
VMware: Súčasnosť a trendy v cloud computinguVMware: Súčasnosť a trendy v cloud computingu
VMware: Súčasnosť a trendy v cloud computingu
 

Recently uploaded

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

SafeNet - Data Protection Company

  • 1. SafeNet and NetApp Come Together Next Gen Encryption and Enterprise Key Management SafeNet and NetApp have teamed to provide an unparalleled combination of security and storage efficiency Ondrej Valent Regional Channel Sales Manager ondrej.valent@safenet-inc.com SafeNet, Inc. | www.safenet-inc.com 14. 9. 2011 © SafeNet Confidential and Proprietary
  • 2. Agenda I. Introduction Who is SafeNet Why are we here today NetApp + SafeNet relationship Overview of Products StorageSecure Overview Real world customer deployments Understanding and Architecting a Unified Key Management Strategy KeySecure Overview 8 Steps to Designing a Centralized Key Management Infrastructure © SafeNet Confidential and Proprietary 2
  • 3. Proven Leader. Trusted to Protect. SafeNet protects: > the most money that moves in the world. 80% of all electronic intrabanking transfers -- $1 trillion a day > the most digital identities in the world. Most PKI identities for governments and F-100 companies > the most high-value software in the world. 80 million hardware keys; more than any other vendor > the most classified information in the world. The largest deployment of government communications security Global Footprint with more than 25,000 customers in 100 countries © SafeNet Confidential and Proprietary 3
  • 4. Data Protection – It’s in the Lifecycle SafeNet persistently protects information at critical point in its lifecycle, empowering customers to efficiently adapt to change and act on opportunity. • Protecting the identities of users, applications, and servers • Securing the transactions they perform • Enabling data ownership and control by encrypting data when it is created, accessed, shared, stored, and moved • Encrypting the critical communication paths on which data travels © SafeNet Confidential and Proprietary 4
  • 5. SafeNet Data Protection Portfolio Summary Data Encryption and Control Communication Protection – Identity Protection - Transaction and Identity – DataSecure, High-Speed Network Authentication Protection - HSM StorageSecure, KeySecure Encryption Offering the broadest range The most secure, and World’s first and only SafeNet high-speed of authenticators, from easiest to integrate unified platform that network encryptors smart cards and tokens to application & transaction delivers intelligent data combine the highest mobile phone auth—all security solution for protection and control for performance with the managed from a single enterprise and government ALL information assets easiest integration and platform management. > The industry’s only > Market leader in > Data-centric, persistent > Solutions for Ethernet, unified authentication enterprise-grade HSMs protection across data SONET up to 10Gb platform offering > Industry innovator in centers, endpoints, and > Best-in-class Security customers the freedom payment HSMs into the cloud Management Center to adapt to changing > Centralized policy, key environments > Widest portfolio of > Zero bandwidth loss, platforms and solutions management, logging, low- latency encryption > The market leader in and auditing certificate-based token > Delivered over 75,000 > Unparalleled leverage HSMs— the most in the > Integrated perimeter across classified and authentication data leakage prevention industry COTS communication > Unique technology > Appliance-based, protection (FIPS 140-2 offerings with client-less > Only leading HSM with the option of keys proven scalability, and Level 3) tokens, high-assurance high performance solutions, and more ALWAYS in Hardware © SafeNet Confidential and Proprietary 5
  • 6. From the Data Center to the Edge, to the Cloud Solutions that Extend Trust and Control into Virtualized Environments ProtectDB ProtectFile Database ProtectApp File Servers Application/ Web Servers HSM ProtectZ Mainframe KeySecure PKI Infrastructure Certificate Authority DataSecure StorageSecure Brocade NetApp (NSE) (BES) (FAS) Data Encryption ProtectFile ProtectDrive & Control eSafe High Speed Encryption Endpoint Protection 1 Communication Protection Communication Protection Cloud Solutions Protect VVolume ProtectVInstance Authentication & Access Management Secure Cloud-based Storage Secure Virtual Instance Control Identity Protection HSM DataSecure, ProtectApp, ProtectDB, Secure Cloud Identities Secure Cloud Application Data and Transactions HSE Authentication & Access Management Secure Cloud Communications Secure Authentication for Cloud Services © SafeNet Confidential and Proprietary 6
  • 7. …So Why Are We Here? Why NetApp and SafeNet? Storage Leadership Security Leadership  Established market for DataFort and  Introduce replacements for the EOA LKM, licensed Decru technology to DataFort E-series and Lifetime Key SafeNet to build continued next-gen Manager (LKM) appliances products  Largest installed base of storage encryption appliances +  Global security leader, proven data protection expertise  Standards-based KMIP KM  Established channel and sales platform—supports BES, NSE, organizations heterogeneous environments  Universal Storage encryption NetApp and SafeNet – The leaders in storage and security have joined forces to introduce the next generation of storage security and key management solutions. © SafeNet Confidential and Proprietary 7
  • 8. NetApp Security Offering © SafeNet Confidential and Proprietary 8
  • 9. © SafeNet Confidential and Proprietary 9
  • 10. Now for the fun part…let’s get into the technology Storage Encryption and Key Management © SafeNet Confidential and Proprietary
  • 11. Network-Based Storage Encryption Compliant, Fast, Transparent, Cost Effective • FIPS 140-2 Level 3 validation meets PCI, HIPAA, Meet Regulatory and government data security requirements for Requirements data at rest • Encrypt data at wire speeds No Performance • No impact to existing applications Impact • Have no requirement for additional CPU overhead • Plug seamlessly into current IT environment Ease of Installation • Realize zero downtime or disruption to workflow • No need for modifications to hosts, servers, applications, or forklift upgrades to storage Scalability • As data grows, scale cost-effectively © SafeNet Confidential and Proprietary 11
  • 12. SafeNet Next Generation, Drop-in Upgrade for NetApp E-Series DataFort and LKM StorageSecure is the industry’s only unified platform for securing data across the entire enterprise StorageSecure integrates transparently into network-based file and block Encryption (NAS and IP-SAN) environments, and protects stored data with high-speed encryption, strong access controls, authentication, and tamper-proof auditing: 1 to 10Gbps throughput Industry standard protocols Multiple 10GE interfaces Low latency, wire-speed encryption and decryption engine Clustering for high reliability and availability KeySecure delivers enterprise wide key management © SafeNet Confidential and Proprietary 12
  • 13. StorageSecure—Typical Data Flow StorageSecure Encrypted Data Cleartext Data StorageSecure © SafeNet Confidential and Proprietary 13
  • 14. StorageSecure Storage Encryption Storage Encryption Data written to storage Cryptainer1 Storage Cryptainer2 Cryptainer3 StorageSecure Data read from storage Clients/ Hosts Authentication/Storage VPN AES-256 Encrypted ACL Enforcement Compartmentalization IPSec*/SSL (NAS) Mitigates insider threats Supports AD/NIS/LDAP Information sharing Crypto-signed logging* Secure Key Management *deferred until release 1.1 © SafeNet Confidential and Proprietary 14
  • 15. StorageSecure Advantages Transparent Deployment No agents or application/database changes Native support for NFS, CIFS, iSCSI Transparent rekeying* enables zero downtime deployment Negligible Performance Impact Supports multi-gigabit line rate speeds Minimal latency (~150 microsecond) with ‘Cut-through Crypto’ Tape: Hardware-based compression before encryption Hardware-based Security Clear-text keys never leave secure hardware Stringent certification: FIPS 140-2 Level 3 compliant (validation in process) Trusted by sensitive military, intelligence, banking customers Secure Enterprise-wide Key Management Simple, yet secure key sharing for availability and information sharing KeySecure for automated enterprise-wide mgmt © SafeNet Confidential and Proprietary *Deferred to release 1.1 15
  • 16. StorageSecure for NAS environments © SafeNet Confidential and Proprietary © 2008 NetApp. All rights reserved. 16 16
  • 17. NAS Infrastructure Without StorageSecure • Data accessible by default – need ` appropriate ACLs to deny access • Replicas, backups represent additional exposure points     ACLs  • Single factor admin authentication, inconsistent role separation (e.g., root, ? domain admin, super-user can access data) Cleartext • Audit logs susceptible to tampering Cleartext Cleartext Cleartext • Data ‘mixing’ concerns on consolidated Cleartext Cleartext Cleartext Cleartext storage • Data on old disks is easily accessible  without sanitization Cleartext  Cleartext Cleartext Cleartext STORAGE BACKUP ADMIN ADMIN © SafeNet Confidential and Proprietary 17
  • 18. NAS Infrastructure With StorageSecure • ACL enforcement –second level ACLs on ` StorageSecure needed to allow access • Replicas, backups automatically secured – encryption keys provide single point of control ACLs     • Dual factor DF admin authentication, fine grained role separation StorageSecure  • Cryptographically signed audit logs capture F2>:P; <F3><B F2>:P; admin actions, user access 1><9F> <F3><B <97>^Q 1><9F> <BA><E <97>^Q <BA><E • Cryptographic data separation, even on shared physical disks • Data on old disks is secure without AUDIT  F2>:P; encryption keys LOGS <F3><B 1><9F>  <97>^Q <BA><E STORAGE BACKUP ADMIN ADMIN © SafeNet Confidential and Proprietary 18
  • 19. Deployment Use Cases StorageSecure on the Road © SafeNet Confidential and Proprietary 19
  • 20. StorageSecure Use Case Snapshot Conversation Mapping Encryption-enabled separation Isolate Data in Multi- 1 tenant Environments of data in shared virtual environments Protect Compliant Data Encrypt Data in Real-Time at 2 (Maintain PCI Posture) the Point of Capture/Creation World Leading Bank Encrypt Data in Primary & Protect Offline Data 3 Secondary Storage Before in Archives Writing to Tape Destroy Data Securely or Destroy Encryption Keys at 4 Repurpose Storage Any Point of the Data Lifecycle © SafeNet Confidential and Proprietary 20
  • 21. StorageSecure Use Case #1: Data Isolation and Separation of Duties Customer 1: web app db Customer 2: Cryptainer1 Cryptainer2 and/or Bank Office 1: NAS Cryptainer3 Customer Support StorageSecure Cryptainer4 Bank Office 2: Headquarters © SafeNet Confidential and Proprietary 21
  • 22. StorageSecure Use Case #2: Protect Compliant Data Networked Applications web app db Mobile Workers Storage (Disk and Tape) Encrypted Encrypted Corporate Offices StorageSecure NAS Address global data Military Applications protection mandates: PCI-DSS, GLBA, SB1386, Basel II, DoD 5015.2, HIPAA, SEPA, SOX, etc. © SafeNet Confidential and Proprietary 22
  • 23. StorageSecure Use Case #3: Archival Protection Networked Applications web app db Mobile Workers Primary Storage Secondary Storage Corporate Offices StorageSecure NAS Military Applications NAS Encrypted Encrypted Encrypted © SafeNet Confidential and Proprietary 23
  • 24. StorageSecure Use Case #4: Secure Data Destruction Networked Applications web app db Mobile Workers Storage (Disk and Tape) Encrypted Encrypted Corporate Offices StorageSecure NAS “Data in Danger “ © SafeNet Confidential and Proprietary 24
  • 25. Understanding and Architecting a Unified Key Management Strategy © SafeNet Confidential and Proprietary
  • 26. Customer Problem Web/Application Servers “Pockets” of Encryption Domains Database Servers Multi-vendor silo-ed systems Platform-specific solutions Fragmented policy and key Mainframes management File Operational Inefficiencies Shares “Spreadsheet” key management Manual audit reviews Audit Deficiencies & Failures Storage Regular key rotation Standards adherence (NIST 800-57, PCI-DSS, etc.) Cloud/Virtualization “Open” Clients Laptop/Desktops © SafeNet Confidential and Proprietary 32
  • 27. Requirements that Drive Key Management Regulations • PCI, Privacy Regulations impose financial penalties • Proactive security measures have compelling ROI IP Protection • Protect IP, digital assets from insider threat • Strengthen access controls • Consolidation and central management of keys across Security Best Practices security silos • Strong authentication and admin role separation • Non-repudiable auditing • Secure data disposal Business Trends • Controlled data access with outsourced IT, offshore development centers © SafeNet Confidential and Proprietary 33
  • 28. An Ideal Enterprise Key Manager Application and web servers Databases File Servers Hardware Mainframes Laptop/mobile Handset SafeNet KeySecure Backup Media > Secure, Centralized Key Management > Data-centric Policy Management Storage > Identity & Access Management > Visibility via Logging, Auditing, Reporting © SafeNet Confidential and Proprietary 34
  • 29. Best Practices for Enterprise Key Lifecycle Management Create Attribute Secure Modify Distribute Expire Generate high Assign Secure keys by Automate key Provide a secure Enable purge entropy keys permissions and wrapping with rotation and method to and delete key key ownership to secure keys other critical distribute keys upon pre-set privileged users functions for high expiration based on roles Cannot store availability and policies clear text key in Allow key usage Enable external memory attributes to be authenticated modified clients to set and (create/delete/ modify key rotate) by attributes authenticated key owners © SafeNet Confidential and Proprietary 35
  • 30. A Storage Infrastructure With and Without Secure Key Management and Encryption AUDIT LOGS ACLs F2>:P; F2>:P;   <F3><B Cleartext <F3><B Cleartext ` 1><9F> 1><9F> ? Cleartext Cleartext <97>^Q Cleartext <97>^Q Cleartext <BA><E Cleartext <BA><E Cleartext   ?   ?   ? ?  SECURITY NETWORKING/DOMAIN STORAGE ADMIN ADMIN ADMIN Gaps in Strong Inconsistent Cryptographic Insiders (admin) Insider manage Backup/replica All data copies Data exposed Data separation, authentication ACLs ACLs, audit logs access but can’t read exposure protected on old disks Secure disposal © SafeNet Confidential and Proprietary 36
  • 31. Introducing SafeNet KeySecure k460 Enterprise Key Management Enterprise Key Management Centrally managed, consolidation of keys Up to 1 million keys per cluster •Secure key replication to multiple appliances High Assurance Level •Active-Active mode of clustering •Redundant, hot-swappable hard drives & power Standard based approach – OASIS KMIP (Key •Heterogeneous solutions: SFNT and non-SFNT devices, applications, databases, storage devices, SAN Management Interoperability Protocol) switches, tape libraries, HSM, network and endpoint devices, etc. Broadest Coverage in Industry NAS - StorageSecure SAN - Brocade Encryption Solutions (BES and FS8/18) KMIP support (NSE/FDE, Quantum Tape Library and other 3rd Party Support) Cloud-enabled © SafeNet Confidential and Proprietary 37
  • 32. 8 Steps to Designing a Centralized Key Management Infrastructure © SafeNet Confidential and Proprietary
  • 33. Key Management Design Flow Chart Define Admin Define Security Discover Classify Data Roles & Goals Sensitive Data Locations Responsibilities Map Data Define Data Align Policies to Document and Movement and Restoration Use Business Automate Use Cases Cases Processes Lifecycle Mgmt © SafeNet Confidential and Proprietary 39
  • 34. In Summary… Next Generation Encryption and Key Management KeySecure acts as a “Glue” for an effective data protection strategy Wide coverage in Storage Encryption – NAS, SAN, DAS & Tape Unified Key Robust, Standards- Streamlined, Manager for based Key Simplified Key Storage, HSMs, Management Lifecycle Mgmt ProtectV Enterprise Key Mgmt for KMIP Compliant Centralized Platform Heterogeneous Environments © SafeNet Confidential and Proprietary 47
  • 35. Ondrej Valent Regional Channel Sales Manager CEE ondrej.valent@safenet-inc.com SafeNet, Inc. | www.safenet-inc.com 15. 9. 2011 © SafeNet Confidential and Proprietary