NeoScale Systems, Inc. Integrating Storage Security into an Overall Security Architecture

Size: px
Start display at page:

Download "NeoScale Systems, Inc. Integrating Storage Security into an Overall Security Architecture"

Transcription

1 NeoScale Systems, Inc. Integrating Storage Security into an Overall Security Architecture Robert A. (Bob) Lockhart - Chief Systems Architect rlockhart@neoscale.com

2 Why Storage Security Now? Storage Drivers Consolidation Offsite Replication Outsourcing Insiders Information Attacks Lost Tapes Data Breaches Industry National Local Regulatory Compliance Vulnerable Data * Real Threats * Liability = HIGH RISK 12/15/2005 Slide 2

3 Data / Storage Vulnerability Points Unauthorized Data Access Uncontrolled Host Access Media Theft Host Spoofing MAN MAN WAN WAN Eavesdropping Gartner: By year-end 2006, 85% of Fortune 1000 enterprises will encrypt most critical "data at rest" (0.9). 12/15/2005 Slide 3

4 Unauthorized Data Access Problem: Controlling unauthorized access to data by users and applications Solutions: Centralized Directory Services Two Factor Authentication Application Level Access Control What s missing? Application to OS access controls so that only applications have access to specific files or volumes versus users User access directly to files versus User access via applications Best solved by adding additional appliances to the mix? NO! Worst case add agents to control access to data This really needs to be in the OS and Application itself New version of Database Applications are adding field level access control 12/15/2005 Slide 4

5 Uncontrolled Host Access to Storage Problem: Maintaining control over data in a Storage Network Solutions: Zoning (Fancy word for VLAN on steroids), LUN Masking and LUN Mapping Stateful SAN firewalls Goes beyond traditional Zoning and LUN Masking by mapping flows similar to traditional Firewalls found in IP based environments DH-CHAP Host to Switch Authentication New Standards for SAN Security T11.3 FC-SP DH-CHAP to support authenticated connectivity between a host and the network Authentication happens between the Host HBA and SAN Switch today Long term end to end authentication will resolve access control and host spoofing issues 12/15/2005 Slide 5

6 Host Spoofing Problem: Host re-addressing was built into the Fibre Channel standard on purpose Originally created for clustered high performance computing environments This threat usually means malicious intent that takes planning and forethought Solutions: A combination of Hard and Soft Zoning used with LUN Mapping features found in modern arrays DH-CHAP authentication resolves by verifying system identity New Standards for Security T11.3 FC-SP DH-CHAP to support authenticated connectivity between a host and the network Authentication happens between the Host HBA and SAN Switch today 12/15/2005 Slide 6

7 Media Replacement, Loss or Theft Problem: Loss or theft of removable media Failed disks still contain data Solutions: Media Wiping Media Destruction Encryption Standards in Development include T11.3 FC-SP, IEEE P1619 Work Group and T10 has created a study group for Key Exchange over SCSI There has been a lot of press attention here Depreciated/old array sold on ebay with data intact Tapes lost in transport Data that leaves a site should be considered data-in-flight How do you protect your remote data connections today? 12/15/2005 Slide 7

8 Eavesdropping Problem: Data capture and analysis is a well known technology Optical networks can be tapped with relatively little expense Devices that macrobend fiber are used to tap into signals Solutions: Optical Loss Detectors built into devices Sealed Conduits that are pressurized end to end Link Encryption Networks have used IPSec to protect traffic for a long time New Standards are in Development Optical Loss Measurement devices at all points in a link where a tap is possible T11.3 FC-SP is also tasked with development of the FCSec standard FCSec is based on IPSec including re-keying and encryption algorithms 12/15/2005 Slide 8

9 Distinct Requirements for Storage Primary Storage DAS, SAN & NAS SAN Response Time High Availability Secondary Storage Meeting Backup Windows Media Management SAN Extension Enterprise Security MAN & WAN Response Time High Availability Policy & key management Security certifications 12/15/2005 Slide 9

10 Storage Security Encryption Options

11 Data Encryption Alternatives Alternatives Performance Manageability Deployment Security Application / File System Server Impact? App Response Schema Per Application Per App Strong Per App Storage Management S/W Server Impact? App Response Keys on clients or Storage Management server Per Environment Varies Fibre Channel or iscsi Switch/Router Network Device Impact Vendor differences Replace Device Varies Storage Security Appliance Bump in Wire Centralized Immediate, Transparent Strong 12/15/2005 Slide 11

12 Disk Encryption Appliance Solutions Host Agent Encryption Security Appliance Proxy Appliance Security Appliance Inline Appliance Agent Server SAN Disk Server SAN Disk Server SAN Security Appliance Disk Advantages: Storage agnostic Considerations: Host agent integration Patch management Server overhead Single point of failure Latency delays Advantages Encryption offload Considerations: Storage re-mapping Limited redundancy Performance impact Integrity w/caching Latency delays Advantages: Encryption offload Application invisible Native redundancy Wire-speed performance End-end integrity Minimal latency 12/15/2005 Slide 12

13 Primary Storage Encryption/Decryption of Payload Only FCP Command Frame No Encryption FC SoF FC Header SCSI Command CRC FC EoF 28+ Byte FCP Command 4 Bytes 24 Bytes Up to 2112 Byte Payload 4 Bytes 4 Bytes Fibre Channel Data Frame No Encryption Encryption of Payload Only Modified CRC FC SoF FC Header Data Block Data Block Data Block Data Block CRC FC EoF 512 Byte Block 512 Byte Block 512 Byte Block 512 Byte Block 4 Bytes 24 Bytes Up to 2112 Byte Payload 4 Bytes 4 Bytes 12/15/2005 Slide 13

14 Tape Security Alternatives Server-Based Encryption Encrypt in backup application Disk-Based Encryption Encrypt data-at-rest and backup to tape Storage Security Appliance Encrypt in network-based security appliance Disk Backup Server Tape Pros: Software add-on to backup application Cons: No compression Server CPU overhead Reduced throughput Insecure key mgmt Backup Server Tape Pros: Invisible to backup apps Cons: No compression More complex recovery Requires encrypting all sensitive data on primary storage Backup Server Security Appliance Tape Pros: Invisible to backup apps Native backup performance Secure key management Appliance simplifies security Cons: Additional hardware device 12/15/2005 Slide 14

15 NeoScale Tape Format Similar to Proposed GCM tape format NeoScale Tape Label 1024 Bytes NeoScale Block Header 32 Bytes Tape Header or Data Block NeoScale Block Trailer 32 Bytes NeoScale Block Header 32 Bytes Data Block Size Varies by Application and Compression NeoScale Block Trailer 32 Bytes NeoScale Block Header 32 Bytes Data Block Size Varies by Application and Compression NeoScale Block Trailer 32 Bytes NeoScale Block Header 32 Bytes Data Block Size Varies by Application and Compression NeoScale Block Trailer 32 Bytes NeoScale Labels NeoScale 1K Byte Tape Label 32 Byte per block prepend and append Label is encrypted using Pool Key Legacy Tape Support NeoScale Data Normal Tape Data File Mark Existing unencrypted tapes will pass data through CryptoStor without requiring additional configuration 12/15/2005 Slide 15

16 Fibre Channel Link Security - FCSec Deployment: Looks like traditional link encryption Acts like traditional link encryption Except it uses Fibre Channel instead of IP Replication Protocol Primary Remote 12/15/2005 Slide 16

17 Native SAN Encryption Optional compression, Encapsulation, and encryption of entire Fibre Channel frame Equivalent of IPSec Tunnel Mode Referred to as FCSec Tunnel Mode No conversion to IP required to provide encryption Lower latency for real time applications such as synchronous mirroring and remote storage Recommended encryption modes are CBC or potentially GCM Support for Fibre Channel Layer 4 Protocols Proprietary and Interoperability Modes FC SoF FCSec FC Header E S P FC Header Upper Level Protocols SCSI, FiCON, IP, VI, HiPPI FC CRC FCSec CRC FC EOF Tunnel Mode (FC Frame Encapsulation) 12/15/2005 Slide 17

18 Encryption Modes Being Proposed for Data at Rest

19 Modes of Operation LRW Proposed for Primary Storage Tweaked Narrow Block Mode TK TK TK Encryption Operation Encryption Operation Encryption Operation TK = Tweak Key Based on 2 nd Disk Key and Physical Block Number 12/15/2005 Slide 19

20 Modes of Operation GCM Proposed for Tape Based Storage Galois/Counter Mode Header Sequence Clear Text Block of Data GCM Encryption Header Sequence Encrypted Block of Data ICV ICV is the Cryptographic Authentication Information about the block 12/15/2005 Slide 20

21 Key Management The Real Problem to Resolve

22 Key Management Objectives Key Repository Must be capable of storing Keys for an indefinite period of time A lot of problems were discovered with the advent of PKI Security Access to Keying material is paramount in any Key Management scheme Transport and use of the keys must be properly maintained Types of Keys Public or Private? Which is best for Application? File? Disk? Tape? Link? Building a key management architecture that scales from single device to enterprise wide architectures for storage security is critical! 12/15/2005 Slide 22

23 Distributed Configuration System Backup and Tape Recovery Site A Site B Backup Server Backup Server CS Tape IP IP Network Network Tape Library Cluster CS Tape Tape Library Key management Dynamic Key Catalog updates across all cluster members across locations Backup System Key to Smart Card(s) CryptoStor recovery Execute recovery script Restore System Key from Smart Card(s) Obtain policies and import Key Catalog from cluster Tape recovery Automatic via any clustered appliance at either location 12/15/2005 Slide 23

24 Disaster Site System Backup and Tape Recovery CS Tape Recovery Site n Key Repository IP IP Network Network 3rd CS Tape party Disaster Site Site 1 Tape Library Key management Automatic periodic backup of Encrypted Key Catalogs to Key Repository Backup System Key to Smartcard(s) at each Site CryptoStor Recovery Site Execute recovery script Restore System Key from Smartcard(s) Import Key Catalog from Key Repository Tape recovery Fully Automated Solutions make this business as usual for DR. CS Tape Tape Library 12/15/2005 Slide 24

25 Customer Solutions Examples of Storage Security

26 University of Texas HIPAA Compliance File/Print Server MS Exchange Cluster Brocade Switches CryptoStor FC (clustered) Compaq EVA Disk Array (with multipath) Demonstrates reasonable and accepted due diligence for HIPAA compliance Operational Impact Minimized operational impact on day to day operations Database Cluster Cost Savings CryptoStor Tape (clustered) Greatly reduced backend PHI data classification and management costs StorageTek L700 12/15/2005 Slide 26

27 Customer Architecture: Corporate Payments Company Event Processor Server HIPAA, GLBA and SOX Compliance Controller Master Admin Server CryptoStor FC (clustered via dedicated out-of-band IP connection) Dell / EMC CX GB Monitor Server ISL to form single fabric SQL Server McData Switches CryptoStor Tape Dell Servers SQL Server 12/15/2005 Slide 27 Dell Fibre-Channel Tape Library

28 Transend Business Services Storage Security Encrypts each customers data individually Shares array between multiple customers with dedicated encryption One appliance per customer Multiple keys per customer Cost savings for Transend Reduced costs by purchasing single array for short term cost savings and long term operations savings Customer can control keys or have Transend provide key management Removed a final hurdle in the Financial Service Provider model where shared storage is involved Reduced liability from $1,000,000 to $100,000 per incident for one customer Customer 1 Customer 2 Customer n IP IP LAN LAN IP IP LAN LAN IP IP LAN LAN & & VPN VPN & & VPN VPN & & VPN VPN WAN WAN WAN WAN WAN WAN 12/15/2005 Slide 28 Shared Array

29 Global ISP Backup Security Data Backup Application Server Disk Array Multiple Privacy Laws in Multiple Countries Tapes need to be ship between multiple sites including Russia, Japan, Switzerland and the U.S. Backup Server 1 SAN Switch Backup Server 2 Backup/Recovery via CryptoStor for Tape Redundancy for Backups provided by Primary and Secondary Backup Server Each with it s own CryptoStor Tape CryptoStor Tapes (clustered) 12/15/2005 Slide 29 Tape Library w/4 LTO2 Drives

30 NeoScale Storage Security Solutions Secure primary storage - Host access control - Secure data partitioning - Storage behind NAS head Vaulting Services Secure tape backup -Lost/stolen media -Data manipulation Data Center Arrays Servers Tape MAN Remote Locations NAS SAN Secure SAN extension -Eavesdropping -Data manipulation 12/15/2005 Slide 30

Securing Data-at-Rest

Securing Data-at-Rest Securing Data-at-Rest Robert A. (Bob) Lockhart NeoScale Systems, Inc. 1655 McCarthy Blvd, Milpitas, CA 95035-7415 Phone:+1-408-473-1300 FAX: +1-408-473-1307 E-mail: rlockhart@neoscale.com Presented at

More information

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in

More information

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in

More information

S S SNIA Storage Networking Foundations

S S SNIA Storage Networking Foundations S10-110 Number: S10-110 Passing Score: 800 Time Limit: 120 min S10-110 SNIA Storage Networking Foundations Exam A QUESTION 1 What are two NAS file access protocols? (Choose two.) A. SMB B. iscsi C. NFS

More information

iscsi Technology: A Convergence of Networking and Storage

iscsi Technology: A Convergence of Networking and Storage HP Industry Standard Servers April 2003 iscsi Technology: A Convergence of Networking and Storage technology brief TC030402TB Table of Contents Abstract... 2 Introduction... 2 The Changing Storage Environment...

More information

Introduction to iscsi

Introduction to iscsi Introduction to iscsi As Ethernet begins to enter into the Storage world a new protocol has been getting a lot of attention. The Internet Small Computer Systems Interface or iscsi, is an end-to-end protocol

More information

iscsi Target Usage Guide December 15, 2017

iscsi Target Usage Guide December 15, 2017 December 15, 2017 1 Table of Contents 1. Native VMware Availability Options for vsan 1.1.Native VMware Availability Options for vsan 1.2.Application Clustering Solutions 1.3.Third party solutions 2. Security

More information

COSC6376 Cloud Computing Lecture 17: Storage Systems

COSC6376 Cloud Computing Lecture 17: Storage Systems COSC6376 Cloud Computing Lecture 17: Storage Systems Instructor: Weidong Shi (Larry), PhD Computer Science Department University of Houston Storage Area Network and Storage Virtualization Single Disk Drive

More information

Data-at-Rest Encryption Addresses SAN Security Requirements

Data-at-Rest Encryption Addresses SAN Security Requirements Data-at-Rest Encryption Addresses SAN QLogic 2500 Series Fibre Channel Adapters Meet Enterprise Security Needs QLogic Fibre Channel Adapters from Cavium provide a secure solution that works well with SEDs

More information

HP NonStop Volume Level Encryption with DataFort

HP NonStop Volume Level Encryption with DataFort HP NonStop Volume Level Encryption with DataFort Agenda About NetApp Storage Security Background Introduction to DataFort Focus on Key Management About NetApp Delivering Customer Success $3.0B $2.0B $1B

More information

1 Quantum Corporation 1

1 Quantum Corporation 1 1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual

More information

Advanced iscsi Management April, 2008

Advanced iscsi Management April, 2008 April, 2008 Gene Nagle, istor Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and

More information

Module 2 Storage Network Architecture

Module 2 Storage Network Architecture Module 2 Storage Network Architecture 1. SCSI 2. FC Protocol Stack 3. SAN:FC SAN 4. IP Storage 5. Infiniband and Virtual Interfaces FIBRE CHANNEL SAN 1. First consider the three FC topologies pointto-point,

More information

Tape Sucks for Long-Term Retention Time to Move to the Cloud. How Cloud is Transforming Legacy Data Strategies

Tape Sucks for Long-Term Retention Time to Move to the Cloud. How Cloud is Transforming Legacy Data Strategies Tape Sucks for Long-Term Retention Time to Move to the Cloud How Cloud is Transforming Legacy Data Strategies INTRODUCTION Tapes suck for long term retention (LTR) Unknown content Locked in proprietary

More information

access addresses/addressing advantages agents allocation analysis

access addresses/addressing advantages agents allocation analysis INDEX A access control of multipath port fanout, LUN issues, 122 of SAN devices, 154 virtualization server reliance on, 173 DAS characteristics (table), 19 conversion to SAN fabric storage access, 105

More information

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7 IP storage: A review of iscsi, FCIP, ifcp SNIA IP Storage Forum With the advent of new IP storage products and transport protocol standards iscsi, FCIP,

More information

Exam : S Title : Snia Storage Network Management/Administration. Version : Demo

Exam : S Title : Snia Storage Network Management/Administration. Version : Demo Exam : S10-200 Title : Snia Storage Network Management/Administration Version : Demo 1. A SAN architect is asked to implement an infrastructure for a production and a test environment using Fibre Channel

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : E20-329 Title : Technology Architect Backup and Recovery Solutions Design Exam Vendor : EMC Version : DEMO Get Latest

More information

VMware vsphere with ESX 4.1 and vcenter 4.1

VMware vsphere with ESX 4.1 and vcenter 4.1 QWERTYUIOP{ Overview VMware vsphere with ESX 4.1 and vcenter 4.1 This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter.

More information

Symantec Backup Exec Blueprints

Symantec Backup Exec Blueprints Symantec Backup Exec Blueprints Blueprint for Large Installations Backup Exec Technical Services Backup & Recovery Technical Education Services Symantec Backup Exec Blueprints 1 Symantec Backup Exec Blueprints

More information

Exam Name: Midrange Storage Technical Support V2

Exam Name: Midrange Storage Technical Support V2 Vendor: IBM Exam Code: 000-118 Exam Name: Midrange Storage Technical Support V2 Version: 12.39 QUESTION 1 A customer has an IBM System Storage DS5000 and needs to add more disk drives to the unit. There

More information

A Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer

A Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer A Crash Course In Wide Area Data Replication Jacob Farmer, CTO, Cambridge Computer SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

SECURE CLOUD BACKUP AND RECOVERY

SECURE CLOUD BACKUP AND RECOVERY SECURE CLOUD BACKUP AND RECOVERY Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile data protection, and

More information

Storage Area Network (SAN)

Storage Area Network (SAN) Storage Area Network (SAN) 1 Outline Shared Storage Architecture Direct Access Storage (DAS) SCSI RAID Network Attached Storage (NAS) Storage Area Network (SAN) Fiber Channel and Fiber Channel Switch 2

More information

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion CONTENTS 1. Introduction 2. How To Store Data 3. How To Access Data 4. Manage Data Storage 5. Benefits Of SAN 6. Conclusion 1. Introduction: A Storage Area Network (SAN) is a dedicated network that carries

More information

iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard

iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard On February 11 th 2003, the Internet Engineering Task Force (IETF) ratified the iscsi standard. The IETF was made up of

More information

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION WHITE PAPER Maximize Storage Networks with iscsi USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION For use with Windows 2000 VERITAS Software Corporation 03/05/2003

More information

Snia S Storage Networking Management/Administration.

Snia S Storage Networking Management/Administration. Snia S10-200 Storage Networking Management/Administration http://killexams.com/exam-detail/s10-200 QUESTION: 85 What are two advantages of over-subscription? (Choose two.) A. saves on ISL links B. decreases

More information

Table of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup

Table of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Server Setup Module 1 / Unit 1 Servers and Racks Server Hardware and Software

More information

Brocade Technology Conference Call: Data Center Infrastructure Business Unit Breakthrough Capabilities for the Evolving Data Center Network

Brocade Technology Conference Call: Data Center Infrastructure Business Unit Breakthrough Capabilities for the Evolving Data Center Network Brocade Technology Conference Call: Data Center Infrastructure Business Unit Breakthrough Capabilities for the Evolving Data Center Network Ian Whiting, Vice President and General Manager, DCI Business

More information

Fabric Security (Securing the SAN Infrastructure) Daniel Cohen Solutioneer Brocade Communications Systems, Inc

Fabric Security (Securing the SAN Infrastructure) Daniel Cohen Solutioneer Brocade Communications Systems, Inc Fabric Security (Securing the SAN Infrastructure) Daniel Cohen Solutioneer Brocade Communications Systems, Inc Agenda Why Secure a SAN? SAN Security Threats Weaknesses Fabric Security Controls Security

More information

Symantec Reference Architecture for Business Critical Virtualization

Symantec Reference Architecture for Business Critical Virtualization Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization

More information

3.1. Storage. Direct Attached Storage (DAS)

3.1. Storage. Direct Attached Storage (DAS) 3.1. Storage Data storage and access is a primary function of a network and selection of the right storage strategy is critical. The following table describes the options for server and network storage.

More information

Cisco MDS 9000 Series Switches

Cisco MDS 9000 Series Switches Cisco MDS 9000 Series Switches Overview of Cisco Storage Networking Solutions Cisco MDS 9000 Series Directors Cisco MDS 9718 Cisco MDS 9710 Cisco MDS 9706 Configuration Chassis, dual Supervisor-1E Module,

More information

Introducing VMware Validated Designs for Software-Defined Data Center

Introducing VMware Validated Designs for Software-Defined Data Center Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design for Software-Defined Data Center 3.0 This document supports the version of each product listed and supports

More information

White Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft

White Paper. A System for  Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft White Paper Mimosa Systems, Inc. November 2007 A System for Email Archiving, Recovery, and Storage Optimization Mimosa NearPoint for Microsoft Exchange Server and EqualLogic PS Series Storage Arrays CONTENTS

More information

DELL EMC DATA DOMAIN ENCRYPTION

DELL EMC DATA DOMAIN ENCRYPTION WHITEPAPER DELL EMC DATA DOMAIN ENCRYPTION A Detailed Review ABSTRACT The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers

More information

Hands-On Wide Area Storage & Network Design WAN: Design - Deployment - Performance - Troubleshooting

Hands-On Wide Area Storage & Network Design WAN: Design - Deployment - Performance - Troubleshooting Hands-On WAN: Design - Deployment - Performance - Troubleshooting Course Description This highly intense, vendor neutral, Hands-On 5-day course provides an in depth exploration of Wide Area Networking

More information

IBM Europe Announcement ZG , dated February 13, 2007

IBM Europe Announcement ZG , dated February 13, 2007 IBM Europe Announcement ZG07-0221, dated February 13, 2007 Cisco MDS 9200 for IBM System Storage switches, models 9216i and 9216A, offer enhanced performance, scalability, multiprotocol capabilities, and

More information

IBM IBM Storage Sales, Version 7. Download Full Version :

IBM IBM Storage Sales, Version 7. Download Full Version : IBM 000-743 IBM Storage Sales, Version 7 Download Full Version : https://killexams.com/pass4sure/exam-detail/000-743 QUESTION: 146 Which of the following is the ADIC Scalar i2000 Tape Library's major advantage

More information

Encryption on IBM i. Mark Flora Ciber MRMUG 2/2014

Encryption on IBM i. Mark Flora Ciber MRMUG 2/2014 Mark Flora Ciber MRMUG 2/2014 Threats Credit card information Inside and outside your organization Personnel data like SSN or phone number Inside and outside your organization Key business information

More information

Traditional SAN environments allow block

Traditional SAN environments allow block Chapter 8 SAN Traditional SAN environments allow block KEY CONCEPTS I/O over Fibre Channel, whereas NAS iscsi Protocol environments allow file I/O over -based networks. Organizations need the performance

More information

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, five-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including

More information

Get More Out of Storage with Data Domain Deduplication Storage Systems

Get More Out of Storage with Data Domain Deduplication Storage Systems 1 Get More Out of Storage with Data Domain Deduplication Storage Systems David M. Auslander Sales Director, New England / Eastern Canada 2 EMC Data Domain Dedupe everything without changing anything Simplify

More information

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information

More information

Cisco Storage Media Encryption Design Guide for Cisco MDS 9000 NX-OS Software Release 5.2(6)

Cisco Storage Media Encryption Design Guide for Cisco MDS 9000 NX-OS Software Release 5.2(6) Design Guide Cisco Storage Media Encryption Design Guide for Cisco MDS 9000 NX-OS Software Release 5.2(6) Design Guide June, 2012 For further information, questions and comments please contact ccbu-pricing@cisco.com

More information

By the end of the class, attendees will have learned the skills, and best practices of virtualization. Attendees

By the end of the class, attendees will have learned the skills, and best practices of virtualization. Attendees Course Name Format Course Books 5-day instructor led training 735 pg Study Guide fully annotated with slide notes 244 pg Lab Guide with detailed steps for completing all labs vsphere Version Covers uses

More information

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation An Introduction to Key Management for Secure Storage Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members

More information

EMC Exam E Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ]

EMC Exam E Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ] s@lm@n EMC Exam E05-001 Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ] EMC E05-001 : Practice Test Question No : 1 Which type of storage device does the X represent

More information

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved. 1 Using patented high-speed inline deduplication technology, Data Domain systems identify redundant data as they are being stored, creating a storage foot print that is 10X 30X smaller on average than

More information

Cisco MDS 9000 Enhancements Fabric Manager Server Package Bundle, Mainframe Package Bundle, and 4 Port IP Storage Services Module

Cisco MDS 9000 Enhancements Fabric Manager Server Package Bundle, Mainframe Package Bundle, and 4 Port IP Storage Services Module Hardware Announcement April 27, 2004 Cisco MDS 9000 Enhancements Fabric Manager Server Package Bundle, Mainframe Package Bundle, and 4 Port IP Storage Services Module Overview The Cisco MDS 9000 family

More information

ECE Enterprise Storage Architecture. Fall 2016

ECE Enterprise Storage Architecture. Fall 2016 ECE590-03 Enterprise Storage Architecture Fall 2016 Storage Area Network (SAN) Tyler Bletsch Duke University Adapted from the course Information Storage and Management v2 (module 5-6), published by EMC

More information

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this

More information

CompTIA Network+ Study Guide Table of Contents

CompTIA Network+ Study Guide Table of Contents CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies

More information

Cisco I/O Accelerator Deployment Guide

Cisco I/O Accelerator Deployment Guide Cisco I/O Accelerator Deployment Guide Introduction This document provides design and configuration guidance for deploying the Cisco MDS 9000 Family I/O Accelerator (IOA) feature, which significantly improves

More information

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure 70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure Slide 1 Creating the Virtualization Infrastructure Slide 2 Introducing Microsoft System Center

More information

Balakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved.

Balakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved. Balakrishnan Nair Senior Technology Consultant Back Up & Recovery Systems South Gulf 1 Thinking Fast: The World s Fastest Backup Now Does Archive Too Introducing the New EMC Backup and Recovery Solutions

More information

Title Month Year. IP Storage: iscsi and FC Extension. Introduction. IP Network Layers - In Practice. IP Network Layers

Title Month Year. IP Storage: iscsi and FC Extension. Introduction. IP Network Layers - In Practice. IP Network Layers Introduction Storage: and FC Extension David L. Black, Ph.D. What is Storage? Storage access over / networks SCSI and Fibre Channel over / Why is Storage interesting? Reuse existing infrastructure and

More information

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise

Virtualization with VMware ESX and VirtualCenter SMB to Enterprise Virtualization with VMware ESX and VirtualCenter SMB to Enterprise This class is an intense, four-day introduction to virtualization using VMware s immensely popular Virtual Infrastructure suite including

More information

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation An Introduction to Key Management for Secure Storage Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may

More information

Cisco MDS 9000 Series Switches

Cisco MDS 9000 Series Switches Cisco MDS 9000 Series Switches Overview of Cisco Storage Networking Solutions Cisco MDS 9000 Series 32-Gbps Directors Cisco MDS 9718 Cisco MDS 9710 Cisco MDS 9706 Configuration Chassis, dual Supervisor-1E

More information

Storage Area Networks SAN. Shane Healy

Storage Area Networks SAN. Shane Healy Storage Area Networks SAN Shane Healy Objective/Agenda Provide a basic overview of what Storage Area Networks (SAN) are, what the constituent components are, and how these components fit together to deliver

More information

Introducing VMware Validated Designs for Software-Defined Data Center

Introducing VMware Validated Designs for Software-Defined Data Center Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design 4.0 VMware Validated Design for Software-Defined Data Center 4.0 You can find the most up-to-date technical

More information

Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are:

Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are: E Transport is now key for extended SAN applications. Main factors required in SAN interconnect transport solutions are: Native support for all SAN protocols including ESCON, Fibre Channel and Gigabit

More information

Red Hat Enterprise Virtualization (RHEV) Backups by SEP

Red Hat Enterprise Virtualization (RHEV) Backups by SEP Red Hat Enterprise Virtualization (RHEV) Backups by SEP info@sepusa.com www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW AGENT BASED BACKUP IMAGE LEVEL BACKUP VIA RHEV API RHEV BACKUP WITH SEP

More information

Introducing VMware Validated Designs for Software-Defined Data Center

Introducing VMware Validated Designs for Software-Defined Data Center Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design for Software-Defined Data Center 4.0 This document supports the version of each product listed and supports

More information

A Vendor Agnostic Overview. Walt Hubis Hubis Technical Associates

A Vendor Agnostic Overview. Walt Hubis Hubis Technical Associates Practical PRESENTATION Secure TITLE GOES Storage: HERE A Vendor Agnostic Overview Walt Hubis Hubis Technical Associates SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA

More information

SECURITY PRACTICES OVERVIEW

SECURITY PRACTICES OVERVIEW SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim

More information

Change Management and Security for the Everyday SAN. AJ Casamento Solutioneer, Brocade Communications

Change Management and Security for the Everyday SAN. AJ Casamento Solutioneer, Brocade Communications Change Management and Security for the Everyday SAN AJ Casamento Solutioneer, Brocade Communications Who really needs change management or security? SAN and General Security Landscape Storage Security

More information

Server and Storage Consolidation with iscsi Arrays. David Dale, NetApp Suzanne Morgan, Microsoft

Server and Storage Consolidation with iscsi Arrays. David Dale, NetApp Suzanne Morgan, Microsoft Server and Storage Consolidation with iscsi Arrays David Dale, NetApp Suzanne Morgan, Microsoft SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and

More information

Vendor must indicate at what level its proposed solution will meet the College s requirements as delineated in the referenced sections of the RFP:

Vendor must indicate at what level its proposed solution will meet the College s requirements as delineated in the referenced sections of the RFP: Vendor must indicate at what level its proposed solution will the College s requirements as delineated in the referenced sections of the RFP: 2.3 Solution Vision Requirement 2.3 Solution Vision CCAC will

More information

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

As enterprise organizations face the major

As enterprise organizations face the major Deploying Flexible Brocade 5000 and 4900 SAN Switches By Nivetha Balakrishnan Aditya G. Brocade storage area network (SAN) switches are designed to meet the needs of rapidly growing enterprise IT environments.

More information

Resilient & Ready. May 21 23, 2018

Resilient & Ready. May 21 23, 2018 Resilient & Ready May 21 23, 2018 Making Hybrid IT Simple: Tips for Planning & Building Your Cloud Strategy Robert Wilcox Lead Architect HPE Complete 5/16/18 What is HPE Complete? The HPE Complete program

More information

Hálózatok üzleti tervezése

Hálózatok üzleti tervezése Hálózatok üzleti tervezése hogyan tervezzünk, ha eddig is jó volt... Rab Gergely HP ESSN Technical Consultant gergely.rab@hp.com IT sprawl has business at the breaking point 70% captive in operations and

More information

IBM IBM Storage Networking Solutions Version 1.

IBM IBM Storage Networking Solutions Version 1. IBM 000-740 IBM Storage Networking Solutions Version 1 http://killexams.com/exam-detail/000-740 - disk storage subsystem with four (4) total ports - two (2) LTO3 tape drives to be attached Assuming best

More information

Oracle Database Vault

Oracle Database Vault An Oracle White Paper July 2009 Oracle Database Vault Introduction... 3 Oracle Database Vault... 3 Oracle Database Vault and Regulations... 4 Oracle Database Vault Realms... 5 Oracle Database Vault Command

More information

VMware vsphere with ESX 4 and vcenter

VMware vsphere with ESX 4 and vcenter VMware vsphere with ESX 4 and vcenter This class is a 5-day intense introduction to virtualization using VMware s immensely popular vsphere suite including VMware ESX 4 and vcenter. Assuming no prior virtualization

More information

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 143-270 Title : Brocade Certified Fabric Designer 16 Gbps Vendor : Brocade Version

More information

EMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007

EMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007 Enterprise Solutions for Microsoft Exchange 2007 EMC CLARiiON CX3-40 Metropolitan Exchange Recovery (MER) for Exchange Server Enabled by MirrorView/S and Replication Manager Reference Architecture EMC

More information

Storage Area Networks: Performance and Security

Storage Area Networks: Performance and Security Storage Area Networks: Performance and Security Presented by Matthew Packard July 27, 2003 SAN Architecture - Definition & DAS Limitations Storage Area Network (SAN) universal storage connectivity free

More information

Storage Media Encryption Overview

Storage Media Encryption Overview CHAPTER 1 Encrypting storage media in the data center has become a critical issue. Numerous high profile incidents of lost or stolen tape and disk devices have underscored the risk and exposure companies

More information

VMware vsphere Clusters in Security Zones

VMware vsphere Clusters in Security Zones SOLUTION OVERVIEW VMware vsan VMware vsphere Clusters in Security Zones A security zone, also referred to as a DMZ," is a sub-network that is designed to provide tightly controlled connectivity to an organization

More information

Rio-2 Hybrid Backup Server

Rio-2 Hybrid Backup Server A Revolution in Data Storage for Today s Enterprise March 2018 Notices This white paper provides information about the as of the date of issue of the white paper. Processes and general practices are subject

More information

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.

More information

Dell Fluid Data solutions. Powerful self-optimized enterprise storage. Dell Compellent Storage Center: Designed for business results

Dell Fluid Data solutions. Powerful self-optimized enterprise storage. Dell Compellent Storage Center: Designed for business results Dell Fluid Data solutions Powerful self-optimized enterprise storage Dell Compellent Storage Center: Designed for business results The Dell difference: Efficiency designed to drive down your total cost

More information

Security Assessment Checklist

Security Assessment Checklist Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment

More information

Exploring Options for Virtualized Disaster Recovery

Exploring Options for Virtualized Disaster Recovery Exploring Options for Virtualized Disaster Recovery Ong, Kok Leong Senior Systems Consultant, VMware ASEAN Email: klong@vmware.com Mobile: +60-12-4706070 16 th October 2008 Recovery Time Objective Building

More information

Modernize Your Backup and DR Using Actifio in AWS

Modernize Your Backup and DR Using Actifio in AWS FOR AWS Modernize Your Backup and DR Using Actifio in AWS 150105H FOR AWS Modernize Your Backup and DR Using Actifio in AWS What is Actifio? Actifio virtualizes the data that s the lifeblood of business.

More information

iscsi Unified Network Storage

iscsi Unified Network Storage iscsi Unified Network Storage Steve Rogers Adaptec, Inc. 691 S Milpitas Blvd, Milpitas, CA 95035-5473 Phone:+1-510-957-1631 E-mail: steve_rogers@adaptec.com Presented at the THIC Meeting at the Sony Auditorium,

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

vsan Security Zone Deployment First Published On: Last Updated On:

vsan Security Zone Deployment First Published On: Last Updated On: First Published On: 06-14-2017 Last Updated On: 11-20-2017 1 1. vsan Security Zone Deployment 1.1.Solution Overview Table of Contents 2 1. vsan Security Zone Deployment 3 1.1 Solution Overview VMware vsphere

More information

Title: Planning AWS Platform Security Assessment?

Title: Planning AWS Platform Security Assessment? Title: Planning AWS Platform Security Assessment? Name: Rajib Das IOU: Cyber Security Practices TCS Emp ID: 231462 Introduction Now-a-days most of the customers are working in AWS platform or planning

More information

Exploring Options for Virtualized Disaster Recovery. Ranganath GK Solution Architect 6 th Nov 2008

Exploring Options for Virtualized Disaster Recovery. Ranganath GK Solution Architect 6 th Nov 2008 Exploring Options for Virtualized Disaster Recovery Ranganath GK Solution Architect 6 th Nov 2008 Defining Disaster Recovery What is a disaster? Extended outage that requires an organization to recover

More information

HPE SimpliVity 380. Simplyfying Hybrid IT with HPE Wolfgang Privas Storage Category Manager

HPE SimpliVity 380. Simplyfying Hybrid IT with HPE Wolfgang Privas Storage Category Manager HPE SimpliVity 380 Simplyfying Hybrid IT with HPE Wolfgang Privas Storage Category Manager We ve seen flash evolve at a record pace 61% Have already deployed all-flash in some level and are increasing

More information

VMware vsphere 6.5 Boot Camp

VMware vsphere 6.5 Boot Camp Course Name Format Course Books 5-day, 10 hour/day instructor led training 724 pg Study Guide fully annotated with slide notes 243 pg Lab Guide with detailed steps for completing all labs 145 pg Boot Camp

More information

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps:// IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://www.certqueen.com Exam : 000-115 Title : Storage Sales V2 Version : Demo 1 / 5 1.The IBM TS7680 ProtecTIER Deduplication Gateway

More information

Exam Name: XIV Replication and Migration V1

Exam Name: XIV Replication and Migration V1 Vendor: IBM Exam Code: 000-967 Exam Name: XIV Replication and Migration V1 Version: DEMO 1.When migrating a volume from a DS8100 to an XIV system, which of the following best describes considerations for

More information