National Data Store 2 Secure Storage Cloud with efficient and easy data access

Size: px
Start display at page:

Download "National Data Store 2 Secure Storage Cloud with efficient and easy data access"

Transcription

1 National Data Store 2 Secure Storage Cloud with efficient and easy data access Michał Jankowski, Maciej Brzeźniak Supercomputing Dept. of PSNC, Authors: NDS2 team at PSNC and partners full list of credits at the end of presentation Project funded by: NCBiR for under KMD2 project (no. NR /2011) FullPolishnameof theproject: System bezpiecznego przechowywania i współdzielenia danych oraz składowania kopii zapasowych i archiwalnych w Krajowym Magazynie Danych Project partners 10 Polish universities and supercomputing centres:

2 NDS2: Presentationplan Requirements: Secure, reliable and efficient data storage with easy and transparent interface Problem: Requirements are contradictory Our solution: Client side on-the fly encryption Key echange hierarchy for data sharing Demonstration: Software client screenshots End-user devices Discussion

3 NDS2: usecasesand requirements 3

4 NDS2: usecases 1. Individual user(scientist, researcher, student): Individual account on the remote storage Data to be available, persistent and safe Easyand efficientaccessto data fromvariousoss Transparent safety and security mechanisms Shareand publishthedata Data storage and access DATA REMOTE STORAGE Data sharing and publication DATA SECURED and REPLICATED DATA

5 NDS2: usecases 2. Institution, workgroup (digital library, scientific project) Use local, possibly existing accounts The data must be available, persistent and safe Local working space with simple and efficient access through typical LAN protocols(cifs, NFS) Local space should be extended by a remote space remotespaceisa backup of local,localiscacheof remote, etc. Local storage and access Remote backup and retrieval DATA CIFS/samba LOCAL STORAGE SFTP REMOTE STORAGE DATA SECURED and REPLICATED DATA

6 NDS2: problem definition 6

7 NDS2:secure, efficient and easy to use To provide in the same time: Data safety and security Efficiency of data storage and access Transparency of safety and security mechanisms Sharing support Support for data publication These are contradictory!

8 NDS1 and PLATON Archiving Services NDS project( ): User National Data Store Distributed, replicated storage Server side Virtual Filesystem in user space (Linux) Standard access protocols Metadata DB Users DB DB Node Accounting & limits DB Access Methods Servers (SSH, HTTPs, WebDAV...) VFS for data and meta-data NDS system logic Replica access methods servers (NFS, GridFTP) Replication Storage Node Access Node Storage Node Automatic replication FS with data migration (HSM) HSM system (NFS) NAS appliance PLATON ( ) PLATON Archiving Service Production deployment of NDS foracademicsin Poland connected to NREN 10 sites in Poland Tapes: 12+ PB in 5 sites Disks: 2+ PB in 10 sites

9 NDS2 a secure and extended NDS NDS and PLATON experience: Replication, data persistency etc. OK! Encryption (privacy) and integrity control needed! Manual implementation too complicated Existing tools not good enough System shoud better integrate with user s system (Win, Linux, mobiles ) and institution/ workgroup environment NDS2( ): National Data Store 2: End-to-end encryption& integrity control Easy and efficient data exchange Virtualdisksfor Windows, Linux Appliance for institutions Portable GUI client for individuals Mobile clients

10 NDS2 cryptography: encryption, integrity control and keys management 10

11 NDS2 cryptography: algorithms Overall concept: Data encrypted with AES-256 CTR AES - Strong and high performance algorithm for bulk data, resistant to brute force attacks Hardware supported: Intel Westmere and ARMv8 Performance: 1-2,5 GB/s on modern workstations CTR mode enables parallelism Integrity controlled using SHA-512: Resistant to collisions and attacks Calculated: User-side (per 64kB logical block) in order to enable users to detect manipulations or corruption on data or their digest System-side (per file) for replica integrity control

12 NDS2 cryptography: keysmanagement Proper key granulation is the clue! Separatekey for eachfile vsone key for the whole system Key hierarchies for easy and efficient sharing Separate key per file but: Exchange keys on directory or user group level The exchange is transparently done while managing dir access or group Small-scale sharing keys hierarchy Large-scale sharing keys hierarchy

13 NDS2 cryptography: moredetails More details: NDS2 paper submitted to TNC2013

14 NDS2 cryptographicclients: Features& concept: Implementation, 14

15 File system likeclients easy! Windows users CryptoFS 4Windows FS-like access (.net CallbackFS) Encryption & digests (.net crypto API) SFTP client (Rebex SFT library) Linux users CryptoFS 4Linux SSHFS extension FS-like access (FUSE/SSHS) Encryption & digests (OpenSSL) SFTP client (Built-into SSHFS) Workgroups Appliance LAN access through CIFS (Samba server) FS-like access (CryptoFS 4 Linux) Admin. interface (php+ perl) Local disk storage WAN (SFTP) NDS filesystem (extended with versioning, ACLs) SECURED and REPLICATED DATA

16 Dedicatedclients -evenmorefromnds2! Any platform Java GUI, CLI and API Browser-like access Drag & dropp Encryption & digests (Bouncy Castle) SFTP client (JSCH sftp) Metadata search Mobile platform mmm Android client Browser-like access Encryption & digests (Java API) SFTP client (Java API) Integration with Android shell WAN (SFTP) SECURED and REPLICATED DATA

17 NDS2 appliance concept LAN NDS2appliance Local disk space Users Data access & sharing (CIFS) SMB/CIFS server MGMT interface (web) Remote storage/ backup space Backup/ restore Data access + encryption WAN LDAP/ Active Directory server Appliance admin Private cloud Public cloud

18 NDS2: appliance implementation Physical appliance: Box for small groups/ instiutions Small and silent, green; fits below the desk! CPUs with AES-NI support Up to 2TB internal storage (2.5 HDDs) or green SSDs Cheap! up to 500EUR including storage Low power! Rack server for bigger institutions Rack server (1U, 19 ) with more disk capacity: CPUs with AES-NI Up 16 TB of RAW storage (4x 4TB HDD) Intermediate costs - ~2000EUR SC and SD cards for keys storage Virtual appliance: VM running on clients s hardware Hardware aid for keys protection Smart cards and SD cards for keys storage / backup SC and SD readers built into appliance Key backup/restore wizards / feature in appliance Virtual machine: Runnable on client virtualisation platform or workstation, no assumptions on hardware Need some local storage and CPU cores for encryption

19 NDS2 cryptographicclients: Demonstration 19

20 NDS2: Demonstration Here we show screenshots Full demonstration available at PSNC/PIONIER booth: Demonstration: Windows and Linux clients Android clients Appliance based on compact ASRock Vision HT box Location and time: PSNC boothbox nr. 14 During coffee breaks ontuesday15:30-16:00 and Wednesday 10:30-11:00 Please contact me at PSNC booth or by: You are welcome to try out our demo and discuss solution

21 NDS2: ndscryptofs4windows Login screen: Login name Login certificate containing a private key for authentication Server connection details Certificatecontaining4kB-long RSA key pair for data encryption Remote storage space visible and accessible as a local drive

22 NDS2: ndscryptofs4linux (1) Original directory content (user view) Encrypted directory content (server view)

23 NDS2: ndscryptofs4linux (2) Original file content (user view) Encrypted file content(server view)

24 NDS2: GUI(1) NDS2/SFTP Server connection details: Server name Server port Login screen: Login name Private RSA key for authentication Server connection details 4kB-long RSA keys pair for data encryption Needs localisation

25 NDS2: GUI (2) GUI client: supports Drag & Drop builds the upload jobs database if many files are dropped enables to monitor status of these jobs, pausing/resuming them etc. Metadata search XATTR, ACL support

26 NDS2: GUI (3) GUI client: Data are encrypted and integrity-controlled in the encrypted directory Remaining data are stored unencrypted Progress bars monitor upload/download status

27 NDS2: Android client

28 NDS2: Appliance (1) Appliance administration interface NDS2 (or SFTP server) connection configuration Network settings configuration Internal appliance disks/ RAIDs configuration

29 NDS2: Appliance (2) Appliance: end-user experience Data storedinnds2/sftp server Accessible through appliance and CIFS protocol Network share defined in appliance Access to data fromtheend-userworkstation remotestoragespaceaccessiblethroughcifs and NDS2 appliance

30 Discussion 30

31 NDS2: cryptographic filesystems &clients POSIX-like, local drive-like access: Natural interface for users Compatible with many applications Works on most popular OSs All versions of Windows Linux most distributions GUI clients: All NDS2 features Portable (Java, Android) Achieved High data security(persistency and privacy) Transparency and easy of use Efficiency(localspace, CPU) Possible improvements: Client-side caching Integration with sync & share applications (e.g. Dropbox)

32 NDS2: cryptographic appliance Network share interface Natural interface for regular users, workgroups etc. Compatible with many applications Different spaces: local/remote encrypted/unencrypted Achieved High data security(persistency and privacy) Transparency and easy of use Efficiency: lowoverhead on enduser resources Easy integration with existing customer infrastructure Possibility to offer the solution in various sizes and models (small-big appliance, virtual machine) Possible improvements: Intelligent caching HSM-like

33 National Data Store 2 crypto-clients - demonstration Thank you! Project funded by: NCBiR for under KMD2 project(no. NR /2011) Project partners 10 Polish universities and supercomputing centres:

34 National Data Store 2 crypto-clients - demonstration PSNC team: Maciej Brzeźniak, Gracjan Jankowski, MichałJankowski, Staszek Jankowski, Tomasz Jankowski Adam Zawada Sławomir Zdanowski Rafał Mikołajczak Credits: Partners: Tomasz Chmiel, Łukasz Kuczyński, Michał Major, Łukasz Redynk, Kamil Guryn, and others Project funded by: NCBiR for under KMD2 project(no. NR /2011) Project partners 10 Polish universities and supercomputing centres:

35 NDS2 crypto filesystems vs EncFS, Boxcryptor etc. Boxcryptor& EncFS similarities Boxcryptor(Win, ios, Android) supports EncFS data format Data in the cloud protected on-the-fly, local disk-like access Differences: Functionality: BC and EncFSstoredata inthelocalfilesystem, transfer to cloudout of scope EncFS+ SSHFS wouldrequirei/o to traversetwovfss, similarproblem for BC Security and sharing: Feature NDS2 Box cryptor/ EncFS File encryption algorithm / keytype Symmetric (AES 256 CTR) Symmetric (AES 256) Key usage Generated per-file Common for all files File name encryption Shared data encryption Symmetric(AES 256) keyderived from dir s asymmetric private key Per-directory asymmetric key,encrypted with private users key or group key Common for data and names Common key for every user no fine-grained keys management

36 National Data Store 2 crypto-clients - demonstration Backup slides Project funded by: NCBiR for under KMD2 project(no. NR /2011) Project partners 10 Polish universities and supercomputing centres:

37 Safe data sharing & publishing Secure sharing Sharing with other NDS2 users Very high level of security: symm. and asymm. Key handling combination (more elaboration elsewhere) Secure publishing and import/export from/to World Similar to get file link on Dropbox Works in both directions It s safer than with Dropbox Trust Safe key exchange Safe key exchange NO Trust Data access NO Trust Data access & storage Data access import/ export publication NDS2 sandbox

38 Requirements addressed in NDS and by PLATON Archiving Services Features Comments Data availability& persistency Replication, consistency checks Basic security Data sharing within a group Easy and efficient access Safery mechanisms transparent & scalable Transfer encryption, access control at rest, policies(media degaussing) Server-side Linux filesystems mechanisms for access control Access to data through number of protocols: SFTP, WebDAV, Web GUI, GridFTP First replica created by user using a convenientprotocol; then replicas created async. using GridFTP for efficiency in WAN

39 NDS2 Features End-to-end security: privacy & integrity Easy access, safety mechanisms transparency Rollback and versioning Easy, efficient and secure data exchange Mobile access Efficient & easy local storage & access + remote backup Comments AES-256 for data, RSA for key exchange, SHA digests Client-side cryptograpghy provided by easy to use clients: virtual filesystems, Java GUI Server-side versioning + support in clients Symm. and assym. key hierarchy, key exchange mechanisms Android application Appliance for institutions

40 NDS2 cryptography: encryption, integrity control and keys mgmt (2) Client-side encryption and integrity control: AES 256 CTRgenerated per file for data privacy Stored in the file header on the system side Protected with user s private RSA key => User takes care of only 1 pair of keys SHA-512 digests calculated per logical 64-byte block Stored with each block on the system side Protected by encryption using files symetric key => User application may access digest information using file s AES key

41 Clients for NDS2(3) Dropbox-like functionality Experimental data sync client 4 Windows: Based on CryptoFS4Win components MS Synchronisation Framework for synchronisation WAN (SFTP) SECURED and REPLICATED DATA

Update for TF-Storage. TF-Storage September 22nd, 2014

Update for TF-Storage. TF-Storage September 22nd, 2014 Update for TF-Storage TF-Storage meeting @Uppsala, September 22nd, 2014 National Data Storage 2 Short reminder what is this about: Security in Cloud? April 1, 2014 The Heartbleed bug Feb 26, 2014 Is catastrophic

More information

Maciej Brzeźniak, Stanisław Jankowski, Sławomir Zdanowski HPC Department, PSNC, Poznan

Maciej Brzeźniak, Stanisław Jankowski, Sławomir Zdanowski HPC Department, PSNC, Poznan BOX@PSNC Maciej Brzeźniak, Stanisław Jankowski, Sławomir Zdanowski HPC Department, PSNC, Poznan BOX@PSNC - OVERVIEW Where we are and why Seafile - features, motivation Seafile operations and usage experience

More information

Synchronisation solutions,

Synchronisation solutions, Synchronisation solutions, NDS2 Cryptobox Kamil Guryn, BIAMAN, www.pb.edu.pl Maciej Brzeźniak, PSNC, www.psnc.pl & NDS2 project partners: Presentation agenda Background Features of good synchronisation

More information

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof Dyadic Enterprise Unbound Key Control For Azure Marketplace The Secure-As-Hardware Software With a Mathematical Proof Unbound Key Control (UKC) is the first software-only key management and key protection

More information

XtreemStore A SCALABLE STORAGE MANAGEMENT SOFTWARE WITHOUT LIMITS YOUR DATA. YOUR CONTROL

XtreemStore A SCALABLE STORAGE MANAGEMENT SOFTWARE WITHOUT LIMITS YOUR DATA. YOUR CONTROL XtreemStore A SCALABLE STORAGE MANAGEMENT SOFTWARE WITHOUT LIMITS YOUR DATA. YOUR CONTROL Software Produkt Portfolio New Products Product Family Scalable sync & share solution for secure data exchange

More information

FIRST EXPERIENCE WITH SEAFILE SYNC & SHARE SOLUTION

FIRST EXPERIENCE WITH SEAFILE SYNC & SHARE SOLUTION FIRST EXPERIENCE WITH SEAFILE SYNC & SHARE SOLUTION Maciej Brzeźniak, Stanisław Jankowski, Sławomir Zdanowski, Krzysztof Wadówka box.psnc.pl PSNC, Poznań, Poland AGENDA NRENs in sync & share business:

More information

Dyadic Security Enterprise Key Management

Dyadic Security Enterprise Key Management Dyadic Security Enterprise Key Management The Secure-as-Hardware Software with a Mathematical Proof Dyadic Enterprise Key Management (EKM) is the first software-only key management and key protection system

More information

Zadara Enterprise Storage in

Zadara Enterprise Storage in Zadara Enterprise Storage in Google Cloud Platform (GCP) Deployment Guide March 2017 Revision A 2011 2017 ZADARA Storage, Inc. All rights reserved. Zadara Storage / GCP - Deployment Guide Page 1 Contents

More information

CyberStore DSS. Multi Award Winning. Broadberry. CyberStore DSS. Open-E DSS v7 based Storage Appliances. Powering these organisations

CyberStore DSS. Multi Award Winning. Broadberry. CyberStore DSS. Open-E DSS v7 based Storage Appliances. Powering these organisations Multi Award Winning CyberStore DSS CyberStore DSS CyberStore DSS Storage Appliances: Open-E DSS v7 based Storage Appliances The CyberStore DSS range of iscsi SAN / NAS storage appliances include 1U-4U

More information

Storage and File Hierarchy

Storage and File Hierarchy COS 318: Operating Systems Storage and File Hierarchy Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics Storage hierarchy File system

More information

COS 318: Operating Systems

COS 318: Operating Systems COS 318: Operating Systems File Systems: Abstractions and Protection Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics What s behind

More information

A Simple Mass Storage System for the SRB Data Grid

A Simple Mass Storage System for the SRB Data Grid A Simple Mass Storage System for the SRB Data Grid Michael Wan, Arcot Rajasekar, Reagan Moore, Phil Andrews San Diego Supercomputer Center SDSC/UCSD/NPACI Outline Motivations for implementing a Mass Storage

More information

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material

More information

The role of PIONIER network in long term preservation services for cultural heritage institutions in Poland

The role of PIONIER network in long term preservation services for cultural heritage institutions in Poland The role of PIONIER network in long term preservation services for cultural heritage institutions in Poland Marcin Werla (mwerla@man.poznan.pl) Poznań Supercomputing and Networking Center Poznań, POLAND

More information

Managing the Cisco APIC-EM and Applications

Managing the Cisco APIC-EM and Applications Managing Cisco APIC-EM Using the GUI, page 1 Cisco APIC-EM Application Separation, page 1 Information about Backing Up and Restoring the Cisco APIC-EM, page 4 Updating the Cisco APIC-EM Software, page

More information

Xcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5

Xcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5 TECHNOLOGY BRIEF Xcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5 ABSTRACT Xcellis represents the culmination of over 15 years of file system and data management

More information

CloudTurbine Security White Paper

CloudTurbine Security White Paper CloudTurbine provides unique opportunities for secure data streaming between computers over local and wide area networks. CloudTurbine leverages data security provided by file storage and networking layers

More information

Encrypted Local, NAS iscsi/fcoe Storage with ZFS

Encrypted Local, NAS iscsi/fcoe Storage with ZFS Encrypted Local, NAS iscsi/fcoe Storage with ZFS OpenSolaris ZFS Crypto Project Darren Moffat James Hughes Anthony Scarpino Sun Microsystems Inc. ZFS Elevator Pitch To create a reliable storage system

More information

Dell EMC CIFS-ECS Tool

Dell EMC CIFS-ECS Tool Dell EMC CIFS-ECS Tool Architecture Overview, Performance and Best Practices March 2018 A Dell EMC Technical Whitepaper Revisions Date May 2016 September 2016 Description Initial release Renaming of tool

More information

UNIVERSITY OF CYPRUS Computer Science Department

UNIVERSITY OF CYPRUS Computer Science Department UNIVERSITY OF CYPRUS Computer Science Department ΕΠΛ 660 Information Retrieval and Search Engines A guide for connecting to LInC 1 -powered cloud-based Virtual Machines Lab instructor: Pavlos Antoniou

More information

Backup Solution. User Guide. Issue 01 Date

Backup Solution. User Guide. Issue 01 Date Issue 01 Date 2017-08-30 Contents Contents 1 Introduction... 1 1.1 What Is the Backup Solution?... 1 1.2 Why Choose the Backup Solution?... 2 1.3 Concepts and Principles...3 1.3.1 Basic OBS Concepts...3

More information

IOPStor: Storage Made Easy. Key Business Features. Key Business Solutions. IOPStor IOP5BI50T Network Attached Storage (NAS) Page 1 of 5

IOPStor: Storage Made Easy. Key Business Features. Key Business Solutions. IOPStor IOP5BI50T Network Attached Storage (NAS) Page 1 of 5 IOPStor: Storage Made Easy Application data, virtual images, client files, email, the types of data central to running a successful business can seem endless. With IOPStor you finally have an advanced

More information

Outline. ASP 2012 Grid School

Outline. ASP 2012 Grid School Distributed Storage Rob Quick Indiana University Slides courtesy of Derek Weitzel University of Nebraska Lincoln Outline Storage Patterns in Grid Applications Storage

More information

Object storage platform How it can help? Martin Lenk, Specialist Senior Systems Engineer Unstructured Data Solution, Dell EMC

Object storage platform How it can help? Martin Lenk, Specialist Senior Systems Engineer Unstructured Data Solution, Dell EMC Object storage platform How it can help? Martin Lenk, Specialist Senior Systems Engineer Unstructured Data Solution, Dell EMC Files vs. Object File Metadata: Name: Picture.jpg Path: /mnt/pictures Owner:

More information

FIPS Non-Proprietary Security Policy

FIPS Non-Proprietary Security Policy Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely

More information

Compatibility and Support Information Nasuni Corporation Boston, MA

Compatibility and Support Information Nasuni Corporation Boston, MA Information Nasuni Corporation Boston, MA Contents 1. Introduction... 1 2.... 1 2.1. Virtualization platforms... 1 3. Filers... 2 3.1. Filer properties... 2 3.2. Clients... 4 3.3. VSS... 7 3.4. Security...

More information

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity

More information

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public Data Protection for Cisco HyperFlex with Veeam Availability Suite 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. Highlights Is Cisco compatible

More information

Availability for the modern datacentre Veeam Availability Suite v9.5

Availability for the modern datacentre Veeam Availability Suite v9.5 Availability for the modern datacentre Veeam Availability Suite v9.5 Jan van Leuken System Engineer Benelux, Veeam Software jan.vanleuken@veeam.com +31 (0)615 83 50 64 Robin van der Steenhoven Territory

More information

GlusterFS and RHS for SysAdmins

GlusterFS and RHS for SysAdmins GlusterFS and RHS for SysAdmins An In-Depth Look with Demos Sr. Software Maintenance Engineer Red Hat Global Support Services FISL 7 May 2014 Introduction Name: Company: Red Hat Department: Global Support

More information

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this

More information

Comparison of SSL/TLS libraries based on Algorithms/languages supported, Platform, Protocols and Performance. By Akshay Thorat

Comparison of SSL/TLS libraries based on Algorithms/languages supported, Platform, Protocols and Performance. By Akshay Thorat Comparison of SSL/TLS libraries based on Algorithms/languages supported, Platform, Protocols and Performance By Akshay Thorat Table of Contents TLS - Why is it needed? Introduction- SSL/TLS evolution Libraries

More information

Network Storage Appliance

Network Storage Appliance Enterprise File System HyperFS integrates high-performance SAN, NAS and data protection under one namespace. No Per Seat Client Cost Based on concurrent RAID performance, connectivity, bandwidth, drive

More information

DX-2104 / 2112 series NAS Affordable, Simple, and Reliable Enterprise-class NAS

DX-2104 / 2112 series NAS Affordable, Simple, and Reliable Enterprise-class NAS DX-2104 / 2112 series NAS Affordable, Simple, and Reliable Enterprise-class NAS Dax DX2104/ 2112 NAS series aims to bring the enterprise-class features into SMB market at competitive price, helps organizations

More information

Qsync. Cross-device File Sync for Optimal Teamwork. Share your life and work

Qsync. Cross-device File Sync for Optimal Teamwork. Share your life and work Qsync Cross-device File Sync for Optimal Teamwork Share your life and work Agenda Users' common issues QNAP NAS specifications recommended by various types of users Usage scenarios and Qsync application

More information

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information

More information

A User-level Secure Grid File System

A User-level Secure Grid File System A User-level Secure Grid File System Ming Zhao, Renato J. Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida {ming, renato}@acis.ufl.edu

More information

SGI Overview. HPC User Forum Dearborn, Michigan September 17 th, 2012

SGI Overview. HPC User Forum Dearborn, Michigan September 17 th, 2012 SGI Overview HPC User Forum Dearborn, Michigan September 17 th, 2012 SGI Market Strategy HPC Commercial Scientific Modeling & Simulation Big Data Hadoop In-memory Analytics Archive Cloud Public Private

More information

jetnexus Virtual Load Balancer

jetnexus Virtual Load Balancer jetnexus Virtual Load Balancer Mitigate the Risk of Downtime and Optimise Application Delivery We were looking for a robust yet easy to use solution that would fit in with our virtualisation policy and

More information

Storage for HPC, HPDA and Machine Learning (ML)

Storage for HPC, HPDA and Machine Learning (ML) for HPC, HPDA and Machine Learning (ML) Frank Kraemer, IBM Systems Architect mailto:kraemerf@de.ibm.com IBM Data Management for Autonomous Driving (AD) significantly increase development efficiency by

More information

IME (Infinite Memory Engine) Extreme Application Acceleration & Highly Efficient I/O Provisioning

IME (Infinite Memory Engine) Extreme Application Acceleration & Highly Efficient I/O Provisioning IME (Infinite Memory Engine) Extreme Application Acceleration & Highly Efficient I/O Provisioning September 22 nd 2015 Tommaso Cecchi 2 What is IME? This breakthrough, software defined storage application

More information

Alliance Key Manager A Solution Brief for Partners & Integrators

Alliance Key Manager A Solution Brief for Partners & Integrators Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers

More information

Construct a High Efficiency VM Disaster Recovery Solution. Best choice for protecting virtual environments

Construct a High Efficiency VM Disaster Recovery Solution. Best choice for protecting virtual environments Construct a High Efficiency VM Disaster Recovery Solution Best choice for protecting virtual environments About NAKIVO Established in the USA since 2012 Provides data protection solutions for VMware, Hyper-V

More information

Backup and Restore Operations

Backup and Restore Operations Backup Data Type, page 1 Backup and Restore Repositories, page 2 On-Demand and Scheduled Backups, page 3 Cisco ISE Restore Operation, page 8 Export Authentication and Authorization Policy Configuration,

More information

Interoperability of Bloombase StoreSafe and Thales payshield for Data-at-Rest Encryption

Interoperability of Bloombase StoreSafe and Thales payshield for Data-at-Rest Encryption Bloombase Interoperability Program P1 2015 Bloombase, Inc. Interoperability of Bloombase StoreSafe and Thales payshield for Data-at-Rest Encryption December 2015 Executive Summary Thales payshield enterprise

More information

Storage and File System

Storage and File System COS 318: Operating Systems Storage and File System Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics Storage hierarchy File

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide June, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the

More information

Distributed Systems 16. Distributed File Systems II

Distributed Systems 16. Distributed File Systems II Distributed Systems 16. Distributed File Systems II Paul Krzyzanowski pxk@cs.rutgers.edu 1 Review NFS RPC-based access AFS Long-term caching CODA Read/write replication & disconnected operation DFS AFS

More information

SnapServer Family (XSD & XSR)

SnapServer Family (XSD & XSR) SnapServer Family (XSD & XSR) Simple, expandable enterprise storage for high-performing resilient environments SnapServer family offers enterprise class unified block and file storage that is workload

More information

Hitachi Data Ingestor

Hitachi Data Ingestor Hitachi Data Ingestor Cluster Getting Started Guide Product Version Getting Help Contents MK-90HDICOM001-02 2010-2016 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud?

DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud? DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing Slide 1 Slide 3 ➀ What is Cloud Computing? ➁ X as a Service ➂ Key Challenges ➃ Developing for the Cloud Why is it called Cloud? services provided

More information

ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding

ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding THOMAS SAMANT thomas@terainsights.com Tera Insights, LLC Feb 15th 2018 ALIN DOBRA alin@terainsights.com

More information

Lustre overview and roadmap to Exascale computing

Lustre overview and roadmap to Exascale computing HPC Advisory Council China Workshop Jinan China, October 26th 2011 Lustre overview and roadmap to Exascale computing Liang Zhen Whamcloud, Inc liang@whamcloud.com Agenda Lustre technology overview Lustre

More information

Storage Virtualization. Eric Yen Academia Sinica Grid Computing Centre (ASGC) Taiwan

Storage Virtualization. Eric Yen Academia Sinica Grid Computing Centre (ASGC) Taiwan Storage Virtualization Eric Yen Academia Sinica Grid Computing Centre (ASGC) Taiwan Storage Virtualization In computer science, storage virtualization uses virtualization to enable better functionality

More information

Discover the all-new CacheMount

Discover the all-new CacheMount Discover the all-new CacheMount 1 2 3 4 5 Why CacheMount and what are its problem solving abilities Cache function makes the hybrid cloud more efficient The key of CacheMount: Cache Volume User manual

More information

File Services. File Services at a Glance

File Services. File Services at a Glance File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using

More information

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 What Could It Cost You? Average of $0.58 a record According to the Verizon

More information

jetnexus Virtual Load Balancer

jetnexus Virtual Load Balancer jetnexus Virtual Load Balancer Mitigate the Risk of Downtime and Optimise Application Delivery We were looking for a robust yet easy to use solution that would fit in with our virtualisation policy and

More information

Veritas NetBackup on Cisco UCS S3260 Storage Server

Veritas NetBackup on Cisco UCS S3260 Storage Server Veritas NetBackup on Cisco UCS S3260 Storage Server This document provides an introduction to the process for deploying the Veritas NetBackup master server and media server on the Cisco UCS S3260 Storage

More information

StratusLab Cloud Distribution Installation. Charles Loomis (CNRS/LAL) 3 July 2014

StratusLab Cloud Distribution Installation. Charles Loomis (CNRS/LAL) 3 July 2014 StratusLab Cloud Distribution Installation Charles Loomis (CNRS/LAL) 3 July 2014 StratusLab What is it? Complete IaaS cloud distribution Open source (Apache 2 license) Works well for production private

More information

Storage Made Easy. SoftLayer

Storage Made Easy. SoftLayer Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on

More information

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients

More information

Cloud Computing and Hadoop Distributed File System. UCSB CS170, Spring 2018

Cloud Computing and Hadoop Distributed File System. UCSB CS170, Spring 2018 Cloud Computing and Hadoop Distributed File System UCSB CS70, Spring 08 Cluster Computing Motivations Large-scale data processing on clusters Scan 000 TB on node @ 00 MB/s = days Scan on 000-node cluster

More information

IBM Storwize V7000 Unified

IBM Storwize V7000 Unified IBM Storwize V7000 Unified Pavel Müller IBM Systems and Technology Group Storwize V7000 Position Enterprise Block DS8000 For clients requiring: Advanced disaster recovery with 3-way mirroring and System

More information

GFS: The Google File System

GFS: The Google File System GFS: The Google File System Brad Karp UCL Computer Science CS GZ03 / M030 24 th October 2014 Motivating Application: Google Crawl the whole web Store it all on one big disk Process users searches on one

More information

Upgrading the Cisco APIC-EM Deployment

Upgrading the Cisco APIC-EM Deployment Review the following sections in this chapter for information about upgrading to the latest Cisco APIC-EM version and verification. Using the GUI to Upgrade Cisco APIC-EM, page 1 Using the CLI to Upgrade

More information

CONFIGURING IBM STORWIZE. for Metadata Framework 6.3

CONFIGURING IBM STORWIZE. for Metadata Framework 6.3 CONFIGURING IBM STORWIZE for Metadata Framework 6.3 Publishing Information Software version 6.3.160 Document version 4 Publication date May 22, 2017 Copyright 2005-2017 Varonis Systems Inc. All rights

More information

Software-defined Storage: Fast, Safe and Efficient

Software-defined Storage: Fast, Safe and Efficient Software-defined Storage: Fast, Safe and Efficient TRY NOW Thanks to Blockchain and Intel Intelligent Storage Acceleration Library Every piece of data is required to be stored somewhere. We all know about

More information

SONAS Best Practices and options for CIFS Scalability

SONAS Best Practices and options for CIFS Scalability COMMON INTERNET FILE SYSTEM (CIFS) FILE SERVING...2 MAXIMUM NUMBER OF ACTIVE CONCURRENT CIFS CONNECTIONS...2 SONAS SYSTEM CONFIGURATION...4 SONAS Best Practices and options for CIFS Scalability A guide

More information

SQL Server on Linux and Containers

SQL Server on Linux and Containers http://aka.ms/bobwardms https://github.com/microsoft/sqllinuxlabs SQL Server on Linux and Containers A Brave New World Speaker Name Principal Architect Microsoft bobward@microsoft.com @bobwardms linkedin.com/in/bobwardms

More information

OS6 N2310 N4310 FWRN Build 870

OS6 N2310 N4310 FWRN Build 870 [Release Date] Apr 13, 2017 [Applicable Hardware] N2310 N4310 [Software Upgrade/Downgrade Note] 1. N2310 & N4310 come from 2 difference upgrade file. 2. We recommend backup the RAID data before firmware

More information

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Check Point SmartEndpoint Security

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Check Point SmartEndpoint Security RSA SECURID ACCESS Authenticator Implementation Guide Check Point SmartEndpoint Security Daniel R. Pintal, RSA Partner Engineering Last Modified: January 27, 2017 Solution

More information

OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems

OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems April 2017 215-12035_C0 doccomments@netapp.com Table of Contents 3 Contents Before you create ONTAP Cloud systems... 5 Logging in

More information

Backup and Restore Operations

Backup and Restore Operations Backup Data Type Backup Data Type, on page 1 Backup and Restore Repositories, on page 1 On-Demand and Scheduled Backups, on page 3 Cisco ISE Restore Operation, on page 8 Export Authentication and Authorization

More information

Providing an Enterprise File Share and Sync Solution for

Providing an Enterprise File Share and Sync Solution for Storage Made Easy Providing an Enterprise File Share and Sync Solution for Microsoft Azure Storage Storage Made Easy Enterprise File Share and Sync Solution for Microsoft Azure The Storage Made Easy (SME)

More information

NexentaStor VVOL

NexentaStor VVOL NexentaStor 5.1.1 VVOL Admin Guide Date: January, 2018 Software Version: NexentaStor 5.1.1 VVOL Part Number: 3000-VVOL-5.1.1-000065-A Table of Contents Preface... 3 Intended Audience 3 References 3 Document

More information

SECURE CLOUD BACKUP AND RECOVERY

SECURE CLOUD BACKUP AND RECOVERY SECURE CLOUD BACKUP AND RECOVERY Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile data protection, and

More information

Storage Made Easy Enterprise File Share and Sync Fabric Architecture

Storage Made Easy Enterprise File Share and Sync Fabric Architecture Storage Made Easy Enterprise File Share and Sync Fabric Architecture Software Stack The SME platform is built using open Internet technologies. The base operating system uses a hardened version of CentOS

More information

TCC, so your business continues

TCC, so your business continues TCC, so your business continues 1 Whitepaper Executive summary The TCC (Tuxis Cloud Concept) is a smart way to build hosting infrastructures for your private cloud and virtual datacenter. It natively integrates

More information

Dell Active Fabric Manager for Microsoft Cloud Platform System 2.2(0.0)

Dell Active Fabric Manager for Microsoft Cloud Platform System 2.2(0.0) Rev. A06 2017-04 Dell Active Fabric Manager for Microsoft Cloud Platform System 2.2(0.0) This document describes the new features, enhancements, and fixed issues for Active Fabric Manager for Microsoft

More information

Data Management. Parallel Filesystems. Dr David Henty HPC Training and Support

Data Management. Parallel Filesystems. Dr David Henty HPC Training and Support Data Management Dr David Henty HPC Training and Support d.henty@epcc.ed.ac.uk +44 131 650 5960 Overview Lecture will cover Why is IO difficult Why is parallel IO even worse Lustre GPFS Performance on ARCHER

More information

Testing storage and metadata backends

Testing storage and metadata backends Testing storage and metadata backends Hugo González Labrador, Arno Formella LIA2, University of Vigo CS3: Cloud Storage Services for Novel Applications and Workflows Zürich, January 2016 Outline Origin

More information

Security context. Technology. Solution highlights

Security context. Technology. Solution highlights Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for

More information

Creating Trust in a Highly Mobile World

Creating Trust in a Highly Mobile World Creating Trust in a Highly Mobile World Technical White Paper Oct, 2014 MobileCrypt with Hardware Strength Security MobileCrypt s solution leverages an Android based mobile application and a Hardware Security

More information

Ceph Intro & Architectural Overview. Abbas Bangash Intercloud Systems

Ceph Intro & Architectural Overview. Abbas Bangash Intercloud Systems Ceph Intro & Architectural Overview Abbas Bangash Intercloud Systems About Me Abbas Bangash Systems Team Lead, Intercloud Systems abangash@intercloudsys.com intercloudsys.com 2 CLOUD SERVICES COMPUTE NETWORK

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

CA485 Ray Walshe Google File System

CA485 Ray Walshe Google File System Google File System Overview Google File System is scalable, distributed file system on inexpensive commodity hardware that provides: Fault Tolerance File system runs on hundreds or thousands of storage

More information

Using EUDAT services to replicate, store, share, and find cultural heritage data

Using EUDAT services to replicate, store, share, and find cultural heritage data Using EUDAT services to replicate, store, share, and find cultural heritage data in PSNC and beyond Maciej Brzeźniak, Norbert Meyer, PSNC Damien Lecarpentier, CSC 3 October 203 DIGITAL PRESERVATION OF

More information

Distributed File Systems II

Distributed File Systems II Distributed File Systems II To do q Very-large scale: Google FS, Hadoop FS, BigTable q Next time: Naming things GFS A radically new environment NFS, etc. Independence Small Scale Variety of workloads Cooperation

More information

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business #1 Enterprise File Share, Sync, Backup and Mobile Access for Business Top 10 Benefits 1 Best ROI in the Industry Lower cost, higher value, free unlimited partner accounts 2 4 Site Sandbox 7 The Best Return

More information

SUREedge DR Installation Guide for Windows Hyper-V

SUREedge DR Installation Guide for Windows Hyper-V SUREedge DR Installation Guide for Windows Hyper-V Contents 1. Introduction... 2 1.1 SUREedge DR Deployment Scenarios... 2 1.2 Installation Overview... 3 2. Obtaining SUREedge Software and Documentation...

More information

Storage Made Easy. Mirantis

Storage Made Easy. Mirantis Storage Made Easy Providing an Enterprise File Fabric for Mirantis STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR MIRANTIS The File Fabric is a comprehensive multi-cloud data security solution built on top

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

ExamTorrent. Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you

ExamTorrent.   Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you ExamTorrent http://www.examtorrent.com Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you Exam : 400-251 Title : CCIE Security Written Exam (v5.0) Vendor : Cisco Version

More information

Effizientes Speichern von Cold-Data

Effizientes Speichern von Cold-Data Effizientes Speichern von Cold-Data Dr. Dirk Gebh Storage Sales Consultant Oracle Deutschland Program Agenda 1 2 3 4 5 Cold-Data OHSM Introduction Use Case Removing Cold Data from Primary Storage OHSM

More information

irods and Objectstorage UGM 2016, Chapel Hill / Othmar Weber, Bayer Business Services / v0.2

irods and Objectstorage UGM 2016, Chapel Hill / Othmar Weber, Bayer Business Services / v0.2 irods and Objectstorage UGM 2016, Chapel Hill 2016-06-08 / Othmar Weber, Bayer Business Services / v0.2 Agenda irods at Bayer Situation and call for action Object Storage PoC Pillow talks Page 2 Overview

More information

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations

More information

Microsoft Windows Embedded Server Overview

Microsoft Windows Embedded Server Overview Microsoft Windows Embedded Server Overview Comprehensive cloud platform Complete, built-in virtualization platform Industry-leading scalability and performance, so you can virtualize every application

More information