NeoScale Systems, Inc. Integrating Storage Security into an Overall Security Architecture
|
|
- Randolph Pope
- 5 years ago
- Views:
Transcription
1 NeoScale Systems, Inc. Integrating Storage Security into an Overall Security Architecture Robert A. (Bob) Lockhart - Chief Systems Architect rlockhart@neoscale.com
2 Why Storage Security Now? Storage Drivers Consolidation Offsite Replication Outsourcing Insiders Information Attacks Lost Tapes Data Breaches Industry National Local Regulatory Compliance Vulnerable Data * Real Threats * Liability = HIGH RISK 12/15/2005 Slide 2
3 Data / Storage Vulnerability Points Unauthorized Data Access Uncontrolled Host Access Media Theft Host Spoofing MAN MAN WAN WAN Eavesdropping Gartner: By year-end 2006, 85% of Fortune 1000 enterprises will encrypt most critical "data at rest" (0.9). 12/15/2005 Slide 3
4 Unauthorized Data Access Problem: Controlling unauthorized access to data by users and applications Solutions: Centralized Directory Services Two Factor Authentication Application Level Access Control What s missing? Application to OS access controls so that only applications have access to specific files or volumes versus users User access directly to files versus User access via applications Best solved by adding additional appliances to the mix? NO! Worst case add agents to control access to data This really needs to be in the OS and Application itself New version of Database Applications are adding field level access control 12/15/2005 Slide 4
5 Uncontrolled Host Access to Storage Problem: Maintaining control over data in a Storage Network Solutions: Zoning (Fancy word for VLAN on steroids), LUN Masking and LUN Mapping Stateful SAN firewalls Goes beyond traditional Zoning and LUN Masking by mapping flows similar to traditional Firewalls found in IP based environments DH-CHAP Host to Switch Authentication New Standards for SAN Security T11.3 FC-SP DH-CHAP to support authenticated connectivity between a host and the network Authentication happens between the Host HBA and SAN Switch today Long term end to end authentication will resolve access control and host spoofing issues 12/15/2005 Slide 5
6 Host Spoofing Problem: Host re-addressing was built into the Fibre Channel standard on purpose Originally created for clustered high performance computing environments This threat usually means malicious intent that takes planning and forethought Solutions: A combination of Hard and Soft Zoning used with LUN Mapping features found in modern arrays DH-CHAP authentication resolves by verifying system identity New Standards for Security T11.3 FC-SP DH-CHAP to support authenticated connectivity between a host and the network Authentication happens between the Host HBA and SAN Switch today 12/15/2005 Slide 6
7 Media Replacement, Loss or Theft Problem: Loss or theft of removable media Failed disks still contain data Solutions: Media Wiping Media Destruction Encryption Standards in Development include T11.3 FC-SP, IEEE P1619 Work Group and T10 has created a study group for Key Exchange over SCSI There has been a lot of press attention here Depreciated/old array sold on ebay with data intact Tapes lost in transport Data that leaves a site should be considered data-in-flight How do you protect your remote data connections today? 12/15/2005 Slide 7
8 Eavesdropping Problem: Data capture and analysis is a well known technology Optical networks can be tapped with relatively little expense Devices that macrobend fiber are used to tap into signals Solutions: Optical Loss Detectors built into devices Sealed Conduits that are pressurized end to end Link Encryption Networks have used IPSec to protect traffic for a long time New Standards are in Development Optical Loss Measurement devices at all points in a link where a tap is possible T11.3 FC-SP is also tasked with development of the FCSec standard FCSec is based on IPSec including re-keying and encryption algorithms 12/15/2005 Slide 8
9 Distinct Requirements for Storage Primary Storage DAS, SAN & NAS SAN Response Time High Availability Secondary Storage Meeting Backup Windows Media Management SAN Extension Enterprise Security MAN & WAN Response Time High Availability Policy & key management Security certifications 12/15/2005 Slide 9
10 Storage Security Encryption Options
11 Data Encryption Alternatives Alternatives Performance Manageability Deployment Security Application / File System Server Impact? App Response Schema Per Application Per App Strong Per App Storage Management S/W Server Impact? App Response Keys on clients or Storage Management server Per Environment Varies Fibre Channel or iscsi Switch/Router Network Device Impact Vendor differences Replace Device Varies Storage Security Appliance Bump in Wire Centralized Immediate, Transparent Strong 12/15/2005 Slide 11
12 Disk Encryption Appliance Solutions Host Agent Encryption Security Appliance Proxy Appliance Security Appliance Inline Appliance Agent Server SAN Disk Server SAN Disk Server SAN Security Appliance Disk Advantages: Storage agnostic Considerations: Host agent integration Patch management Server overhead Single point of failure Latency delays Advantages Encryption offload Considerations: Storage re-mapping Limited redundancy Performance impact Integrity w/caching Latency delays Advantages: Encryption offload Application invisible Native redundancy Wire-speed performance End-end integrity Minimal latency 12/15/2005 Slide 12
13 Primary Storage Encryption/Decryption of Payload Only FCP Command Frame No Encryption FC SoF FC Header SCSI Command CRC FC EoF 28+ Byte FCP Command 4 Bytes 24 Bytes Up to 2112 Byte Payload 4 Bytes 4 Bytes Fibre Channel Data Frame No Encryption Encryption of Payload Only Modified CRC FC SoF FC Header Data Block Data Block Data Block Data Block CRC FC EoF 512 Byte Block 512 Byte Block 512 Byte Block 512 Byte Block 4 Bytes 24 Bytes Up to 2112 Byte Payload 4 Bytes 4 Bytes 12/15/2005 Slide 13
14 Tape Security Alternatives Server-Based Encryption Encrypt in backup application Disk-Based Encryption Encrypt data-at-rest and backup to tape Storage Security Appliance Encrypt in network-based security appliance Disk Backup Server Tape Pros: Software add-on to backup application Cons: No compression Server CPU overhead Reduced throughput Insecure key mgmt Backup Server Tape Pros: Invisible to backup apps Cons: No compression More complex recovery Requires encrypting all sensitive data on primary storage Backup Server Security Appliance Tape Pros: Invisible to backup apps Native backup performance Secure key management Appliance simplifies security Cons: Additional hardware device 12/15/2005 Slide 14
15 NeoScale Tape Format Similar to Proposed GCM tape format NeoScale Tape Label 1024 Bytes NeoScale Block Header 32 Bytes Tape Header or Data Block NeoScale Block Trailer 32 Bytes NeoScale Block Header 32 Bytes Data Block Size Varies by Application and Compression NeoScale Block Trailer 32 Bytes NeoScale Block Header 32 Bytes Data Block Size Varies by Application and Compression NeoScale Block Trailer 32 Bytes NeoScale Block Header 32 Bytes Data Block Size Varies by Application and Compression NeoScale Block Trailer 32 Bytes NeoScale Labels NeoScale 1K Byte Tape Label 32 Byte per block prepend and append Label is encrypted using Pool Key Legacy Tape Support NeoScale Data Normal Tape Data File Mark Existing unencrypted tapes will pass data through CryptoStor without requiring additional configuration 12/15/2005 Slide 15
16 Fibre Channel Link Security - FCSec Deployment: Looks like traditional link encryption Acts like traditional link encryption Except it uses Fibre Channel instead of IP Replication Protocol Primary Remote 12/15/2005 Slide 16
17 Native SAN Encryption Optional compression, Encapsulation, and encryption of entire Fibre Channel frame Equivalent of IPSec Tunnel Mode Referred to as FCSec Tunnel Mode No conversion to IP required to provide encryption Lower latency for real time applications such as synchronous mirroring and remote storage Recommended encryption modes are CBC or potentially GCM Support for Fibre Channel Layer 4 Protocols Proprietary and Interoperability Modes FC SoF FCSec FC Header E S P FC Header Upper Level Protocols SCSI, FiCON, IP, VI, HiPPI FC CRC FCSec CRC FC EOF Tunnel Mode (FC Frame Encapsulation) 12/15/2005 Slide 17
18 Encryption Modes Being Proposed for Data at Rest
19 Modes of Operation LRW Proposed for Primary Storage Tweaked Narrow Block Mode TK TK TK Encryption Operation Encryption Operation Encryption Operation TK = Tweak Key Based on 2 nd Disk Key and Physical Block Number 12/15/2005 Slide 19
20 Modes of Operation GCM Proposed for Tape Based Storage Galois/Counter Mode Header Sequence Clear Text Block of Data GCM Encryption Header Sequence Encrypted Block of Data ICV ICV is the Cryptographic Authentication Information about the block 12/15/2005 Slide 20
21 Key Management The Real Problem to Resolve
22 Key Management Objectives Key Repository Must be capable of storing Keys for an indefinite period of time A lot of problems were discovered with the advent of PKI Security Access to Keying material is paramount in any Key Management scheme Transport and use of the keys must be properly maintained Types of Keys Public or Private? Which is best for Application? File? Disk? Tape? Link? Building a key management architecture that scales from single device to enterprise wide architectures for storage security is critical! 12/15/2005 Slide 22
23 Distributed Configuration System Backup and Tape Recovery Site A Site B Backup Server Backup Server CS Tape IP IP Network Network Tape Library Cluster CS Tape Tape Library Key management Dynamic Key Catalog updates across all cluster members across locations Backup System Key to Smart Card(s) CryptoStor recovery Execute recovery script Restore System Key from Smart Card(s) Obtain policies and import Key Catalog from cluster Tape recovery Automatic via any clustered appliance at either location 12/15/2005 Slide 23
24 Disaster Site System Backup and Tape Recovery CS Tape Recovery Site n Key Repository IP IP Network Network 3rd CS Tape party Disaster Site Site 1 Tape Library Key management Automatic periodic backup of Encrypted Key Catalogs to Key Repository Backup System Key to Smartcard(s) at each Site CryptoStor Recovery Site Execute recovery script Restore System Key from Smartcard(s) Import Key Catalog from Key Repository Tape recovery Fully Automated Solutions make this business as usual for DR. CS Tape Tape Library 12/15/2005 Slide 24
25 Customer Solutions Examples of Storage Security
26 University of Texas HIPAA Compliance File/Print Server MS Exchange Cluster Brocade Switches CryptoStor FC (clustered) Compaq EVA Disk Array (with multipath) Demonstrates reasonable and accepted due diligence for HIPAA compliance Operational Impact Minimized operational impact on day to day operations Database Cluster Cost Savings CryptoStor Tape (clustered) Greatly reduced backend PHI data classification and management costs StorageTek L700 12/15/2005 Slide 26
27 Customer Architecture: Corporate Payments Company Event Processor Server HIPAA, GLBA and SOX Compliance Controller Master Admin Server CryptoStor FC (clustered via dedicated out-of-band IP connection) Dell / EMC CX GB Monitor Server ISL to form single fabric SQL Server McData Switches CryptoStor Tape Dell Servers SQL Server 12/15/2005 Slide 27 Dell Fibre-Channel Tape Library
28 Transend Business Services Storage Security Encrypts each customers data individually Shares array between multiple customers with dedicated encryption One appliance per customer Multiple keys per customer Cost savings for Transend Reduced costs by purchasing single array for short term cost savings and long term operations savings Customer can control keys or have Transend provide key management Removed a final hurdle in the Financial Service Provider model where shared storage is involved Reduced liability from $1,000,000 to $100,000 per incident for one customer Customer 1 Customer 2 Customer n IP IP LAN LAN IP IP LAN LAN IP IP LAN LAN & & VPN VPN & & VPN VPN & & VPN VPN WAN WAN WAN WAN WAN WAN 12/15/2005 Slide 28 Shared Array
29 Global ISP Backup Security Data Backup Application Server Disk Array Multiple Privacy Laws in Multiple Countries Tapes need to be ship between multiple sites including Russia, Japan, Switzerland and the U.S. Backup Server 1 SAN Switch Backup Server 2 Backup/Recovery via CryptoStor for Tape Redundancy for Backups provided by Primary and Secondary Backup Server Each with it s own CryptoStor Tape CryptoStor Tapes (clustered) 12/15/2005 Slide 29 Tape Library w/4 LTO2 Drives
30 NeoScale Storage Security Solutions Secure primary storage - Host access control - Secure data partitioning - Storage behind NAS head Vaulting Services Secure tape backup -Lost/stolen media -Data manipulation Data Center Arrays Servers Tape MAN Remote Locations NAS SAN Secure SAN extension -Eavesdropping -Data manipulation 12/15/2005 Slide 30
Securing Data-at-Rest
Securing Data-at-Rest Robert A. (Bob) Lockhart NeoScale Systems, Inc. 1655 McCarthy Blvd, Milpitas, CA 95035-7415 Phone:+1-408-473-1300 FAX: +1-408-473-1307 E-mail: rlockhart@neoscale.com Presented at
More informationSTORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp
STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in
More informationSTORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp
STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in
More informationS S SNIA Storage Networking Foundations
S10-110 Number: S10-110 Passing Score: 800 Time Limit: 120 min S10-110 SNIA Storage Networking Foundations Exam A QUESTION 1 What are two NAS file access protocols? (Choose two.) A. SMB B. iscsi C. NFS
More informationiscsi Technology: A Convergence of Networking and Storage
HP Industry Standard Servers April 2003 iscsi Technology: A Convergence of Networking and Storage technology brief TC030402TB Table of Contents Abstract... 2 Introduction... 2 The Changing Storage Environment...
More informationIntroduction to iscsi
Introduction to iscsi As Ethernet begins to enter into the Storage world a new protocol has been getting a lot of attention. The Internet Small Computer Systems Interface or iscsi, is an end-to-end protocol
More informationiscsi Target Usage Guide December 15, 2017
December 15, 2017 1 Table of Contents 1. Native VMware Availability Options for vsan 1.1.Native VMware Availability Options for vsan 1.2.Application Clustering Solutions 1.3.Third party solutions 2. Security
More informationCOSC6376 Cloud Computing Lecture 17: Storage Systems
COSC6376 Cloud Computing Lecture 17: Storage Systems Instructor: Weidong Shi (Larry), PhD Computer Science Department University of Houston Storage Area Network and Storage Virtualization Single Disk Drive
More informationData-at-Rest Encryption Addresses SAN Security Requirements
Data-at-Rest Encryption Addresses SAN QLogic 2500 Series Fibre Channel Adapters Meet Enterprise Security Needs QLogic Fibre Channel Adapters from Cavium provide a secure solution that works well with SEDs
More informationHP NonStop Volume Level Encryption with DataFort
HP NonStop Volume Level Encryption with DataFort Agenda About NetApp Storage Security Background Introduction to DataFort Focus on Key Management About NetApp Delivering Customer Success $3.0B $2.0B $1B
More information1 Quantum Corporation 1
1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual
More informationAdvanced iscsi Management April, 2008
April, 2008 Gene Nagle, istor Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and
More informationModule 2 Storage Network Architecture
Module 2 Storage Network Architecture 1. SCSI 2. FC Protocol Stack 3. SAN:FC SAN 4. IP Storage 5. Infiniband and Virtual Interfaces FIBRE CHANNEL SAN 1. First consider the three FC topologies pointto-point,
More informationTape Sucks for Long-Term Retention Time to Move to the Cloud. How Cloud is Transforming Legacy Data Strategies
Tape Sucks for Long-Term Retention Time to Move to the Cloud How Cloud is Transforming Legacy Data Strategies INTRODUCTION Tapes suck for long term retention (LTR) Unknown content Locked in proprietary
More informationaccess addresses/addressing advantages agents allocation analysis
INDEX A access control of multipath port fanout, LUN issues, 122 of SAN devices, 154 virtualization server reliance on, 173 DAS characteristics (table), 19 conversion to SAN fabric storage access, 105
More informationSNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp
SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7 IP storage: A review of iscsi, FCIP, ifcp SNIA IP Storage Forum With the advent of new IP storage products and transport protocol standards iscsi, FCIP,
More informationExam : S Title : Snia Storage Network Management/Administration. Version : Demo
Exam : S10-200 Title : Snia Storage Network Management/Administration Version : Demo 1. A SAN architect is asked to implement an infrastructure for a production and a test environment using Fibre Channel
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : E20-329 Title : Technology Architect Backup and Recovery Solutions Design Exam Vendor : EMC Version : DEMO Get Latest
More informationVMware vsphere with ESX 4.1 and vcenter 4.1
QWERTYUIOP{ Overview VMware vsphere with ESX 4.1 and vcenter 4.1 This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter.
More informationSymantec Backup Exec Blueprints
Symantec Backup Exec Blueprints Blueprint for Large Installations Backup Exec Technical Services Backup & Recovery Technical Education Services Symantec Backup Exec Blueprints 1 Symantec Backup Exec Blueprints
More informationExam Name: Midrange Storage Technical Support V2
Vendor: IBM Exam Code: 000-118 Exam Name: Midrange Storage Technical Support V2 Version: 12.39 QUESTION 1 A customer has an IBM System Storage DS5000 and needs to add more disk drives to the unit. There
More informationA Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer
A Crash Course In Wide Area Data Replication Jacob Farmer, CTO, Cambridge Computer SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
More informationSECURE CLOUD BACKUP AND RECOVERY
SECURE CLOUD BACKUP AND RECOVERY Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile data protection, and
More informationStorage Area Network (SAN)
Storage Area Network (SAN) 1 Outline Shared Storage Architecture Direct Access Storage (DAS) SCSI RAID Network Attached Storage (NAS) Storage Area Network (SAN) Fiber Channel and Fiber Channel Switch 2
More informationCONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion
CONTENTS 1. Introduction 2. How To Store Data 3. How To Access Data 4. Manage Data Storage 5. Benefits Of SAN 6. Conclusion 1. Introduction: A Storage Area Network (SAN) is a dedicated network that carries
More informationiscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard
iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard On February 11 th 2003, the Internet Engineering Task Force (IETF) ratified the iscsi standard. The IETF was made up of
More informationUSING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION
WHITE PAPER Maximize Storage Networks with iscsi USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION For use with Windows 2000 VERITAS Software Corporation 03/05/2003
More informationSnia S Storage Networking Management/Administration.
Snia S10-200 Storage Networking Management/Administration http://killexams.com/exam-detail/s10-200 QUESTION: 85 What are two advantages of over-subscription? (Choose two.) A. saves on ISL links B. decreases
More informationTable of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup
Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Server Setup Module 1 / Unit 1 Servers and Racks Server Hardware and Software
More informationBrocade Technology Conference Call: Data Center Infrastructure Business Unit Breakthrough Capabilities for the Evolving Data Center Network
Brocade Technology Conference Call: Data Center Infrastructure Business Unit Breakthrough Capabilities for the Evolving Data Center Network Ian Whiting, Vice President and General Manager, DCI Business
More informationFabric Security (Securing the SAN Infrastructure) Daniel Cohen Solutioneer Brocade Communications Systems, Inc
Fabric Security (Securing the SAN Infrastructure) Daniel Cohen Solutioneer Brocade Communications Systems, Inc Agenda Why Secure a SAN? SAN Security Threats Weaknesses Fabric Security Controls Security
More informationSymantec Reference Architecture for Business Critical Virtualization
Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization
More information3.1. Storage. Direct Attached Storage (DAS)
3.1. Storage Data storage and access is a primary function of a network and selection of the right storage strategy is critical. The following table describes the options for server and network storage.
More informationCisco MDS 9000 Series Switches
Cisco MDS 9000 Series Switches Overview of Cisco Storage Networking Solutions Cisco MDS 9000 Series Directors Cisco MDS 9718 Cisco MDS 9710 Cisco MDS 9706 Configuration Chassis, dual Supervisor-1E Module,
More informationIntroducing VMware Validated Designs for Software-Defined Data Center
Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design for Software-Defined Data Center 3.0 This document supports the version of each product listed and supports
More informationWhite Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft
White Paper Mimosa Systems, Inc. November 2007 A System for Email Archiving, Recovery, and Storage Optimization Mimosa NearPoint for Microsoft Exchange Server and EqualLogic PS Series Storage Arrays CONTENTS
More informationDELL EMC DATA DOMAIN ENCRYPTION
WHITEPAPER DELL EMC DATA DOMAIN ENCRYPTION A Detailed Review ABSTRACT The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers
More informationHands-On Wide Area Storage & Network Design WAN: Design - Deployment - Performance - Troubleshooting
Hands-On WAN: Design - Deployment - Performance - Troubleshooting Course Description This highly intense, vendor neutral, Hands-On 5-day course provides an in depth exploration of Wide Area Networking
More informationIBM Europe Announcement ZG , dated February 13, 2007
IBM Europe Announcement ZG07-0221, dated February 13, 2007 Cisco MDS 9200 for IBM System Storage switches, models 9216i and 9216A, offer enhanced performance, scalability, multiprotocol capabilities, and
More informationIBM IBM Storage Sales, Version 7. Download Full Version :
IBM 000-743 IBM Storage Sales, Version 7 Download Full Version : https://killexams.com/pass4sure/exam-detail/000-743 QUESTION: 146 Which of the following is the ADIC Scalar i2000 Tape Library's major advantage
More informationEncryption on IBM i. Mark Flora Ciber MRMUG 2/2014
Mark Flora Ciber MRMUG 2/2014 Threats Credit card information Inside and outside your organization Personnel data like SSN or phone number Inside and outside your organization Key business information
More informationTraditional SAN environments allow block
Chapter 8 SAN Traditional SAN environments allow block KEY CONCEPTS I/O over Fibre Channel, whereas NAS iscsi Protocol environments allow file I/O over -based networks. Organizations need the performance
More informationVirtualization with VMware ESX and VirtualCenter SMB to Enterprise
Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, five-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including
More informationGet More Out of Storage with Data Domain Deduplication Storage Systems
1 Get More Out of Storage with Data Domain Deduplication Storage Systems David M. Auslander Sales Director, New England / Eastern Canada 2 EMC Data Domain Dedupe everything without changing anything Simplify
More informationIBM Spectrum Protect Version Introduction to Data Protection Solutions IBM
IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information
More informationCisco Storage Media Encryption Design Guide for Cisco MDS 9000 NX-OS Software Release 5.2(6)
Design Guide Cisco Storage Media Encryption Design Guide for Cisco MDS 9000 NX-OS Software Release 5.2(6) Design Guide June, 2012 For further information, questions and comments please contact ccbu-pricing@cisco.com
More informationBy the end of the class, attendees will have learned the skills, and best practices of virtualization. Attendees
Course Name Format Course Books 5-day instructor led training 735 pg Study Guide fully annotated with slide notes 244 pg Lab Guide with detailed steps for completing all labs vsphere Version Covers uses
More informationAn Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation
An Introduction to Key Management for Secure Storage Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
More informationEMC Exam E Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ]
s@lm@n EMC Exam E05-001 Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ] EMC E05-001 : Practice Test Question No : 1 Which type of storage device does the X represent
More informationCopyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.
1 Using patented high-speed inline deduplication technology, Data Domain systems identify redundant data as they are being stored, creating a storage foot print that is 10X 30X smaller on average than
More informationCisco MDS 9000 Enhancements Fabric Manager Server Package Bundle, Mainframe Package Bundle, and 4 Port IP Storage Services Module
Hardware Announcement April 27, 2004 Cisco MDS 9000 Enhancements Fabric Manager Server Package Bundle, Mainframe Package Bundle, and 4 Port IP Storage Services Module Overview The Cisco MDS 9000 family
More informationECE Enterprise Storage Architecture. Fall 2016
ECE590-03 Enterprise Storage Architecture Fall 2016 Storage Area Network (SAN) Tyler Bletsch Duke University Adapted from the course Information Storage and Management v2 (module 5-6), published by EMC
More informationIBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this
More informationCompTIA Network+ Study Guide Table of Contents
CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies
More informationCisco I/O Accelerator Deployment Guide
Cisco I/O Accelerator Deployment Guide Introduction This document provides design and configuration guidance for deploying the Cisco MDS 9000 Family I/O Accelerator (IOA) feature, which significantly improves
More information70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure
70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure Slide 1 Creating the Virtualization Infrastructure Slide 2 Introducing Microsoft System Center
More informationBalakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved.
Balakrishnan Nair Senior Technology Consultant Back Up & Recovery Systems South Gulf 1 Thinking Fast: The World s Fastest Backup Now Does Archive Too Introducing the New EMC Backup and Recovery Solutions
More informationTitle Month Year. IP Storage: iscsi and FC Extension. Introduction. IP Network Layers - In Practice. IP Network Layers
Introduction Storage: and FC Extension David L. Black, Ph.D. What is Storage? Storage access over / networks SCSI and Fibre Channel over / Why is Storage interesting? Reuse existing infrastructure and
More informationVirtualization with VMware ESX and VirtualCenter SMB to Enterprise
Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, four-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including
More informationAn Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation
An Introduction to Key Management for Secure Storage Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may
More informationCisco MDS 9000 Series Switches
Cisco MDS 9000 Series Switches Overview of Cisco Storage Networking Solutions Cisco MDS 9000 Series 32-Gbps Directors Cisco MDS 9718 Cisco MDS 9710 Cisco MDS 9706 Configuration Chassis, dual Supervisor-1E
More informationStorage Area Networks SAN. Shane Healy
Storage Area Networks SAN Shane Healy Objective/Agenda Provide a basic overview of what Storage Area Networks (SAN) are, what the constituent components are, and how these components fit together to deliver
More informationIntroducing VMware Validated Designs for Software-Defined Data Center
Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design 4.0 VMware Validated Design for Software-Defined Data Center 4.0 You can find the most up-to-date technical
More informationTransport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are:
E Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are: Native support for all SAN protocols including ESCON, Fibre Channel and Gigabit
More informationRed Hat Enterprise Virtualization (RHEV) Backups by SEP
Red Hat Enterprise Virtualization (RHEV) Backups by SEP info@sepusa.com www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW AGENT BASED BACKUP IMAGE LEVEL BACKUP VIA RHEV API RHEV BACKUP WITH SEP
More informationIntroducing VMware Validated Designs for Software-Defined Data Center
Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design for Software-Defined Data Center 4.0 This document supports the version of each product listed and supports
More informationA Vendor Agnostic Overview. Walt Hubis Hubis Technical Associates
Practical PRESENTATION Secure TITLE GOES Storage: HERE A Vendor Agnostic Overview Walt Hubis Hubis Technical Associates SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA
More informationSECURITY PRACTICES OVERVIEW
SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim
More informationChange Management and Security for the Everyday SAN. AJ Casamento Solutioneer, Brocade Communications
Change Management and Security for the Everyday SAN AJ Casamento Solutioneer, Brocade Communications Who really needs change management or security? SAN and General Security Landscape Storage Security
More informationServer and Storage Consolidation with iscsi Arrays. David Dale, NetApp Suzanne Morgan, Microsoft
Server and Storage Consolidation with iscsi Arrays David Dale, NetApp Suzanne Morgan, Microsoft SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and
More informationVendor must indicate at what level its proposed solution will meet the College s requirements as delineated in the referenced sections of the RFP:
Vendor must indicate at what level its proposed solution will the College s requirements as delineated in the referenced sections of the RFP: 2.3 Solution Vision Requirement 2.3 Solution Vision CCAC will
More informationTrends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation
Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationAs enterprise organizations face the major
Deploying Flexible Brocade 5000 and 4900 SAN Switches By Nivetha Balakrishnan Aditya G. Brocade storage area network (SAN) switches are designed to meet the needs of rapidly growing enterprise IT environments.
More informationResilient & Ready. May 21 23, 2018
Resilient & Ready May 21 23, 2018 Making Hybrid IT Simple: Tips for Planning & Building Your Cloud Strategy Robert Wilcox Lead Architect HPE Complete 5/16/18 What is HPE Complete? The HPE Complete program
More informationHálózatok üzleti tervezése
Hálózatok üzleti tervezése hogyan tervezzünk, ha eddig is jó volt... Rab Gergely HP ESSN Technical Consultant gergely.rab@hp.com IT sprawl has business at the breaking point 70% captive in operations and
More informationIBM IBM Storage Networking Solutions Version 1.
IBM 000-740 IBM Storage Networking Solutions Version 1 http://killexams.com/exam-detail/000-740 - disk storage subsystem with four (4) total ports - two (2) LTO3 tape drives to be attached Assuming best
More informationOracle Database Vault
An Oracle White Paper July 2009 Oracle Database Vault Introduction... 3 Oracle Database Vault... 3 Oracle Database Vault and Regulations... 4 Oracle Database Vault Realms... 5 Oracle Database Vault Command
More informationVMware vsphere with ESX 4 and vcenter
VMware vsphere with ESX 4 and vcenter This class is a 5-day intense introduction to virtualization using VMware s immensely popular vsphere suite including VMware ESX 4 and vcenter. Assuming no prior virtualization
More informationExecutive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration
Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules
More informationPrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps
PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 143-270 Title : Brocade Certified Fabric Designer 16 Gbps Vendor : Brocade Version
More informationEMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007
Enterprise Solutions for Microsoft Exchange 2007 EMC CLARiiON CX3-40 Metropolitan Exchange Recovery (MER) for Exchange Server Enabled by MirrorView/S and Replication Manager Reference Architecture EMC
More informationStorage Area Networks: Performance and Security
Storage Area Networks: Performance and Security Presented by Matthew Packard July 27, 2003 SAN Architecture - Definition & DAS Limitations Storage Area Network (SAN) universal storage connectivity free
More informationStorage Media Encryption Overview
CHAPTER 1 Encrypting storage media in the data center has become a critical issue. Numerous high profile incidents of lost or stolen tape and disk devices have underscored the risk and exposure companies
More informationVMware vsphere Clusters in Security Zones
SOLUTION OVERVIEW VMware vsan VMware vsphere Clusters in Security Zones A security zone, also referred to as a DMZ," is a sub-network that is designed to provide tightly controlled connectivity to an organization
More informationRio-2 Hybrid Backup Server
A Revolution in Data Storage for Today s Enterprise March 2018 Notices This white paper provides information about the as of the date of issue of the white paper. Processes and general practices are subject
More informationNutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure
Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.
More informationDell Fluid Data solutions. Powerful self-optimized enterprise storage. Dell Compellent Storage Center: Designed for business results
Dell Fluid Data solutions Powerful self-optimized enterprise storage Dell Compellent Storage Center: Designed for business results The Dell difference: Efficiency designed to drive down your total cost
More informationSecurity Assessment Checklist
Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment
More informationExploring Options for Virtualized Disaster Recovery
Exploring Options for Virtualized Disaster Recovery Ong, Kok Leong Senior Systems Consultant, VMware ASEAN Email: klong@vmware.com Mobile: +60-12-4706070 16 th October 2008 Recovery Time Objective Building
More informationModernize Your Backup and DR Using Actifio in AWS
FOR AWS Modernize Your Backup and DR Using Actifio in AWS 150105H FOR AWS Modernize Your Backup and DR Using Actifio in AWS What is Actifio? Actifio virtualizes the data that s the lifeblood of business.
More informationiscsi Unified Network Storage
iscsi Unified Network Storage Steve Rogers Adaptec, Inc. 691 S Milpitas Blvd, Milpitas, CA 95035-5473 Phone:+1-510-957-1631 E-mail: steve_rogers@adaptec.com Presented at the THIC Meeting at the Sony Auditorium,
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationvsan Security Zone Deployment First Published On: Last Updated On:
First Published On: 06-14-2017 Last Updated On: 11-20-2017 1 1. vsan Security Zone Deployment 1.1.Solution Overview Table of Contents 2 1. vsan Security Zone Deployment 3 1.1 Solution Overview VMware vsphere
More informationTitle: Planning AWS Platform Security Assessment?
Title: Planning AWS Platform Security Assessment? Name: Rajib Das IOU: Cyber Security Practices TCS Emp ID: 231462 Introduction Now-a-days most of the customers are working in AWS platform or planning
More informationExploring Options for Virtualized Disaster Recovery. Ranganath GK Solution Architect 6 th Nov 2008
Exploring Options for Virtualized Disaster Recovery Ranganath GK Solution Architect 6 th Nov 2008 Defining Disaster Recovery What is a disaster? Extended outage that requires an organization to recover
More informationHPE SimpliVity 380. Simplyfying Hybrid IT with HPE Wolfgang Privas Storage Category Manager
HPE SimpliVity 380 Simplyfying Hybrid IT with HPE Wolfgang Privas Storage Category Manager We ve seen flash evolve at a record pace 61% Have already deployed all-flash in some level and are increasing
More informationVMware vsphere 6.5 Boot Camp
Course Name Format Course Books 5-day, 10 hour/day instructor led training 724 pg Study Guide fully annotated with slide notes 243 pg Lab Guide with detailed steps for completing all labs 145 pg Boot Camp
More informationIT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://
IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com Exam : 000-115 Title : Storage Sales V2 Version : Demo 1 / 5 1.The IBM TS7680 ProtecTIER Deduplication Gateway
More informationExam Name: XIV Replication and Migration V1
Vendor: IBM Exam Code: 000-967 Exam Name: XIV Replication and Migration V1 Version: DEMO 1.When migrating a volume from a DS8100 to an XIV system, which of the following best describes considerations for
More information