SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
www.t hales-esecurity.com
Thales e-Security
Bloombase and Thales Deliver
Storage Encryption Solution for
Security Compliance
	 Solution Benefits
•	Protects sensitive data at rest no matter where it resides
•	Enables transparent encryption for business
software applications
•	Provides a FIPS 140-2 Level 3 platform for cryptographic
acceleration and key management
•	Scales from physical and virtual on-premises data
center to cloud-based environments
•	Facilitates compliance with data privacy and
security regulations
NEXT-GENERATION DATA-AT-REST
SECURITY FOR BIG DATA AND CLOUD APPLICATIONS
The Problem: Need to protect an increasing volume of
security-sensitive data in storage
 	Organizations capture and store increasing volumes of data,
including private and sensitive data, for advanced analytics and
business intelligence purposes. This trend, combined with the
growing volume of sensitive data generated by smart devices in
the new Internet of things (IoT), makes data storage infrastructure
a prime target for attack. Encryption protects data privacy,
however the techniques used to encrypt data can vary among
business applications. With diverse applications deployed across
an increasingly decentralized environment, effectively protecting
the growing volume of sensitive data is critical to ensure the
security of these systems.
The Challenge: Securing complex heterogeneous data
storage environments with a comprehensive encryption
solution
 	Enterprises are migrating from on-premises to cloud-based
storage services to better manage increasing data volumes. The
trend has been accompanied by a shift from selective encryption
of data classified as sensitive, to a policy that encrypts everything
in storage. The degree to which organizations can trust this
approach depends directly on the protection of cryptographic keys.
Encryption keys underpin security, and safeguarding and managing
them is critically important. As more data gets encrypted, more
keys need to be secured and managed to protect data in storage
and to ensure it can be decrypted when needed.
Thales nShield Connect and keyAuthority integrate with
Bloombase StoreSafe to enhance cryptographic capabilities and
to facilitate compliance with regulatory requirements.
Big Data Host
Applications
Big Data Host
Applications
Storage
System
Storage
System
Thales
nShield HSM
Write
Read
Write
Read
KMIP
PKCS#11
Write 
Encrypt
Read 
Decrypt
Write 
Encrypt
Read 
Decrypt
Thales
keyAuthority
Bloombase
StoreSafe
Thales
Thales nShield Connect delivers high performance cryptographic
services for mission critical storage security applications. The
network-attached HSM:
•	 Provides a FIPS 140-2 Level 3 certified, tightly controlled tamper
resistant environment for safekeeping and managing encryption
keys
•	 Performs encryption/decryption on behalf of the storage security
applications
•	 Interfaces with applications using industry-standard APIs
(PKCS#11, OpenSSL, JCE, CAPI, and CNG)
Thales keyAuthority offers best-in-class centralized key management
services for storage security applications. The market-leading key
manager appliance:
•	 Safeguards and manages encryption keys in a FIPS 140-2 Level 3
designed, tamper resistant chassis external to the storage security
applications
•	 Provides enterprise-wide key management services for diverse
storage security applications
•	 Interfaces with applications using an industry-standard key
management protocol (OASIS KMIP)
Bloombase
Bloombase StoreSafe delivers turnkey, non-disruptive, encryption for
data at rest. The purpose built scalable architecture:
•	 Protects both on and off-premises at-rest data systems from SAN,
NAS, DAS, tape library to virtual tape library (VTL), regardless of the
complexity of the heterogeneous storage infrastructure or medium
•	 Secures data in content addressable storage (CAS), object
stores, virtual hypervisor datastores, and RESTful cloud storage
service endpoints
•	 Enables enterprises to mitigate data leakage threats
For more detailed technical specifications, please visit
www.thales-esecurity.com or www.bloombase.com
BLOOMBASE AND THALES DELIVER STORAGE ENCRYPTION
SOLUTION FOR SECURITY COMPLIANCE
©Thalese-Security•June2015•PLB5126
Follow us on:
The Solution: Bloombase and Thales together deliver
high performance and enhanced security to heterogeneous
storage infrastructures
Bloombase StoreSafe is an agentless software-appliance encryption
solution for data at rest applications. Its application-transparent
and protocol-preserving features enable it to protect the entire
spectrum of storage infrastructures from on-premises, to virtualized,
and big data cloud-based storage services. Bloombase StoreSafe
operates as a storage proxy, transparently encrypting data before
it is physically stored. Decryption is performed on the fly as data is
requested from storage by the application. The schema guarantees
operational transparency and maximum interoperability, while
ensuring that unauthorized clients cannot access decrypted data.
Bloombase customers can leverage trusted cryptography solutions
from Thales to facilitate compliance with regulatory requirements.
Depending on the deployment environment, customers can integrate
Bloombase StoreSafe with either the Thales nShield Connect
hardware security module (HSM) or with the Thales keyAuthority
centralized key manager. These devices provide a FIPS 140-2 Level 3
environment for protecting and managing critical cryptographic keys
and enable compliance with regulatory requirements for public sector,
financial services, and large enterprises.
When to use nShield Connect?
Deployments using a storage security application that seek to
offload cryptographic capabilities to a dedicated hardware
appliance can use Thales nShield Connect. The HSM is typically
deployed in the data center alongside the Bloombase StoreSafe
encryption solution. Thales nShield Connect delivers low latency
hardware-accelerated encryption and key management services for
traditional enterprise data storage and archival applications.
When to use keyAuthority?
Deployments using diverse storage security applications that seek to
externalize key management use Thales keyAuthority. The centralized
key manager interfaces with multiple storage security applications
using an industry-standard protocol (KMIP). keyAuthority scales to
protect millions of keys, provides enterprise-wide enforcement of
encryption controls, and partitions users and keys for compliance
with mixed security policies.
Americas – Thales e-Security Inc. 900 South Pine Island Road, Suite 710, Plantation, FL 33324 USA • Tel:+1 888 744 4976 or +1 954 888 6200 • Fax:+1 954 888 6211 • E-mail: sales@thalesesec.com
AsiaPacific– ThalesTransportSecurity(HK)Lt,Unit4101-3,41/F,SunlightTower,248Queen’sRoadEast,Wanchai,HongKong•Tel:+85228158633•Fax:+85228158141•E-mail:asia.sales@thales-esecurity.com
Europe, Middle East, Africa – Meadow View House, Long Crendon, Aylesbury, Buckinghamshire HP18 9EQ • Tel:+44 (0)1844 201800 • Fax:+44 (0)1844 208550 • E-mail: emea.sales@thales-esecurity.com

Weitere ähnliche Inhalte

Was ist angesagt?

FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
Phillip Stalnaker
 
9i R2 Checklist
9i R2 Checklist9i R2 Checklist
9i R2 Checklist
LiquidHub
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
Evgeniya Shumakher
 

Was ist angesagt? (20)

Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
 
Data Security
Data SecurityData Security
Data Security
 
In data security
In data securityIn data security
In data security
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
 
PaaSword-Business Cases
PaaSword-Business CasesPaaSword-Business Cases
PaaSword-Business Cases
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
Bloombase store safe mf solution brief 2018 r0.91
Bloombase store safe   mf solution brief 2018 r0.91Bloombase store safe   mf solution brief 2018 r0.91
Bloombase store safe mf solution brief 2018 r0.91
 
FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
 
9i R2 Checklist
9i R2 Checklist9i R2 Checklist
9i R2 Checklist
 
Cloud Data Security
Cloud Data Security Cloud Data Security
Cloud Data Security
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | Seclore
 
Data Backup and Storage
Data Backup and StorageData Backup and Storage
Data Backup and Storage
 
Seclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore Advantage Channel Program
Seclore Advantage Channel Program
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
Securing Remote Workforce | Seclore
Securing Remote Workforce | SecloreSecuring Remote Workforce | Seclore
Securing Remote Workforce | Seclore
 
One click protection in microsoft office
One click protection in microsoft officeOne click protection in microsoft office
One click protection in microsoft office
 
IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
 
2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
 

Ähnlich wie Thales bloombase store_safe_sb

iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
Iaetsd Iaetsd
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
Erni Susanti
 
Zettaset Elastic Big Data Security for Greenplum Database
Zettaset Elastic Big Data Security for Greenplum DatabaseZettaset Elastic Big Data Security for Greenplum Database
Zettaset Elastic Big Data Security for Greenplum Database
PivotalOpenSourceHub
 

Ähnlich wie Thales bloombase store_safe_sb (20)

Bloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sbBloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sb
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
Thales e-Security corporate presentation
Thales e-Security corporate presentationThales e-Security corporate presentation
Thales e-Security corporate presentation
 
Crittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyCrittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economy
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 
Zettaset Elastic Big Data Security for Greenplum Database
Zettaset Elastic Big Data Security for Greenplum DatabaseZettaset Elastic Big Data Security for Greenplum Database
Zettaset Elastic Big Data Security for Greenplum Database
 

Mehr von Bloombase

Mehr von Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbooklet
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-edition
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyer
 
4aa5 2782
4aa5 27824aa5 2782
4aa5 2782
 
Additional license authorizations
Additional license authorizationsAdditional license authorizations
Additional license authorizations
 

Kürzlich hochgeladen

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Kürzlich hochgeladen (20)

The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 

Thales bloombase store_safe_sb

  • 1. www.t hales-esecurity.com Thales e-Security Bloombase and Thales Deliver Storage Encryption Solution for Security Compliance Solution Benefits • Protects sensitive data at rest no matter where it resides • Enables transparent encryption for business software applications • Provides a FIPS 140-2 Level 3 platform for cryptographic acceleration and key management • Scales from physical and virtual on-premises data center to cloud-based environments • Facilitates compliance with data privacy and security regulations NEXT-GENERATION DATA-AT-REST SECURITY FOR BIG DATA AND CLOUD APPLICATIONS The Problem: Need to protect an increasing volume of security-sensitive data in storage Organizations capture and store increasing volumes of data, including private and sensitive data, for advanced analytics and business intelligence purposes. This trend, combined with the growing volume of sensitive data generated by smart devices in the new Internet of things (IoT), makes data storage infrastructure a prime target for attack. Encryption protects data privacy, however the techniques used to encrypt data can vary among business applications. With diverse applications deployed across an increasingly decentralized environment, effectively protecting the growing volume of sensitive data is critical to ensure the security of these systems. The Challenge: Securing complex heterogeneous data storage environments with a comprehensive encryption solution Enterprises are migrating from on-premises to cloud-based storage services to better manage increasing data volumes. The trend has been accompanied by a shift from selective encryption of data classified as sensitive, to a policy that encrypts everything in storage. The degree to which organizations can trust this approach depends directly on the protection of cryptographic keys. Encryption keys underpin security, and safeguarding and managing them is critically important. As more data gets encrypted, more keys need to be secured and managed to protect data in storage and to ensure it can be decrypted when needed. Thales nShield Connect and keyAuthority integrate with Bloombase StoreSafe to enhance cryptographic capabilities and to facilitate compliance with regulatory requirements. Big Data Host Applications Big Data Host Applications Storage System Storage System Thales nShield HSM Write Read Write Read KMIP PKCS#11 Write Encrypt Read Decrypt Write Encrypt Read Decrypt Thales keyAuthority Bloombase StoreSafe
  • 2. Thales Thales nShield Connect delivers high performance cryptographic services for mission critical storage security applications. The network-attached HSM: • Provides a FIPS 140-2 Level 3 certified, tightly controlled tamper resistant environment for safekeeping and managing encryption keys • Performs encryption/decryption on behalf of the storage security applications • Interfaces with applications using industry-standard APIs (PKCS#11, OpenSSL, JCE, CAPI, and CNG) Thales keyAuthority offers best-in-class centralized key management services for storage security applications. The market-leading key manager appliance: • Safeguards and manages encryption keys in a FIPS 140-2 Level 3 designed, tamper resistant chassis external to the storage security applications • Provides enterprise-wide key management services for diverse storage security applications • Interfaces with applications using an industry-standard key management protocol (OASIS KMIP) Bloombase Bloombase StoreSafe delivers turnkey, non-disruptive, encryption for data at rest. The purpose built scalable architecture: • Protects both on and off-premises at-rest data systems from SAN, NAS, DAS, tape library to virtual tape library (VTL), regardless of the complexity of the heterogeneous storage infrastructure or medium • Secures data in content addressable storage (CAS), object stores, virtual hypervisor datastores, and RESTful cloud storage service endpoints • Enables enterprises to mitigate data leakage threats For more detailed technical specifications, please visit www.thales-esecurity.com or www.bloombase.com BLOOMBASE AND THALES DELIVER STORAGE ENCRYPTION SOLUTION FOR SECURITY COMPLIANCE ©Thalese-Security•June2015•PLB5126 Follow us on: The Solution: Bloombase and Thales together deliver high performance and enhanced security to heterogeneous storage infrastructures Bloombase StoreSafe is an agentless software-appliance encryption solution for data at rest applications. Its application-transparent and protocol-preserving features enable it to protect the entire spectrum of storage infrastructures from on-premises, to virtualized, and big data cloud-based storage services. Bloombase StoreSafe operates as a storage proxy, transparently encrypting data before it is physically stored. Decryption is performed on the fly as data is requested from storage by the application. The schema guarantees operational transparency and maximum interoperability, while ensuring that unauthorized clients cannot access decrypted data. Bloombase customers can leverage trusted cryptography solutions from Thales to facilitate compliance with regulatory requirements. Depending on the deployment environment, customers can integrate Bloombase StoreSafe with either the Thales nShield Connect hardware security module (HSM) or with the Thales keyAuthority centralized key manager. These devices provide a FIPS 140-2 Level 3 environment for protecting and managing critical cryptographic keys and enable compliance with regulatory requirements for public sector, financial services, and large enterprises. When to use nShield Connect? Deployments using a storage security application that seek to offload cryptographic capabilities to a dedicated hardware appliance can use Thales nShield Connect. The HSM is typically deployed in the data center alongside the Bloombase StoreSafe encryption solution. Thales nShield Connect delivers low latency hardware-accelerated encryption and key management services for traditional enterprise data storage and archival applications. When to use keyAuthority? Deployments using diverse storage security applications that seek to externalize key management use Thales keyAuthority. The centralized key manager interfaces with multiple storage security applications using an industry-standard protocol (KMIP). keyAuthority scales to protect millions of keys, provides enterprise-wide enforcement of encryption controls, and partitions users and keys for compliance with mixed security policies. Americas – Thales e-Security Inc. 900 South Pine Island Road, Suite 710, Plantation, FL 33324 USA • Tel:+1 888 744 4976 or +1 954 888 6200 • Fax:+1 954 888 6211 • E-mail: sales@thalesesec.com AsiaPacific– ThalesTransportSecurity(HK)Lt,Unit4101-3,41/F,SunlightTower,248Queen’sRoadEast,Wanchai,HongKong•Tel:+85228158633•Fax:+85228158141•E-mail:asia.sales@thales-esecurity.com Europe, Middle East, Africa – Meadow View House, Long Crendon, Aylesbury, Buckinghamshire HP18 9EQ • Tel:+44 (0)1844 201800 • Fax:+44 (0)1844 208550 • E-mail: emea.sales@thales-esecurity.com