Channel FAQ: Smartcrypt Appliances

Size: px
Start display at page:

Download "Channel FAQ: Smartcrypt Appliances"

Transcription

1 Channel FAQ: Smartcrypt Appliances Q: When were Smartcrypt appliances announced? A: announced the release of our Smartcrypt virtual and physical appliances on September 19, Smartcrypt Enterprise Manager 200v: a virtual appliance for encryption and key management Smartcrypt Enterprise Manager 300h: a hardware appliance with a FIPS Level 3 hardware security module (HSM) Smartcrypt Enterprise Manager 300r: a hardware appliance with a full-entropy quantum random number generator (RNG) Smartcrypt Enterprise Manager 350: a hardware appliance with both the HSM and RNG Q: What do the Smartcrypt appliances do? A: The Smartcrypt appliances allow security managers to define encryption policies and monitor encryption and decryption activity across the organization. Smartcrypt automates key management, eliminating the complexity of key generation, exchange, synchronization, and rotation. It also applies security policy, provisions encryption functionality for users, devices, and servers, and controls the data discovery features. Both Smartcrypt Enterprise Manager 200v and 300 series contain the Smartcrypt Enterprise Manager software with a built-in key store and a hardened operating system. They offer automatic failover, high availability, support for agents in multiple geographies, and multitenancy. The 300h adds a FIPS Level 3 HSM, the 300r adds a full-entropy quantum RNG, and the 350 adds both the HSM and RNG. The 300 series also provide the ability to store, create, and manage third party keys that conform to the KMIP standard. These are plug-andplay offerings for companies who don t want to spend the time or effort to connect their key management software to their own app and database infrastructures. Q: What is the value proposition for an HSM? A: A Hardware Security Module (HSM) stores master keys for designated encryption keys that Smartcrypt uses for its encryption. Each HSM has multiple secure cryptoprocessor chips to prevent tampering, and the HSM will also delete the key upon detecting tampering. The HSM provides not assurance that keys will remain safe, but also is FIPS Level 3 validated, which is required by many financial and government organizations to protect their data, and has the ability to store, create, and manage third party keys that conform to the KMIP standard.

2 Q: What is FIPS Level 3? A: FIPS 140 is a standard published by NIST to apply requirements for cryptographic modules for use by the U.S. federal government. FIPS Level 3 requires physical tamper resistance, authentication, and separation between the different interfaces in the cryptographic modules. Cryptographic modules must meet Level 3 requirements in order to be authorized for purchase by many government agencies (and other commercial organizations, especially in finance). Also, be aware that FIPS Level 3 certifications are for the HSMs, not for the entire appliance. Q: Does virtual appliance have any FIPS rating? A: The virtual appliance has not yet been submitted for FIPS Level 1 compliance. Please let your Channel Account Manager know if/when customers are asking for this. Q: Do the software clients (Smartcrypt Agent or clients) have any FIPS rating? A: Smartcrypt for Windows does have a FIPS mode option that when enabled will cause the agent to use FIPS certified algorithms and modules. Find more information on meeting FIPS Requirements with Smartcrypt here: Q: Are there any regulations for data protection that require FIPS that customers might not be aware of? A: Many government entities require encryption to be performed in accordance with FIPS. Many financial services institutions that take their queues from the US federal government have adopted the use of FIPS as well. That said, PCI-DSS, HIPAA/HiTech, DFS-500, GDPR, etc. do not specifically mandate encryption be performed in accordance with FIPS. Q: Can a virtual and physical appliance work together? A: This configuration is not supported, although there are no known technical limitations. If you get requests for this, please reach out to your Channel Account Manager. Q: Can someone migrate from a hardware appliance to a virtual appliance in the future? A: This is supported and the process to migrate is as simple as adding additional nodes to the existing cluster and then promoting them to master while disconnecting the original (hardwarebased) nodes. Q: Is there any way to share keys between physical and virtual? E.g. if a customer wants a physical appliance on premise but wants a virtual appliance in the cloud or in a remote data center, is this possible? A: All keys are shared between all appliances in the same cluster, regardless of whether or not they are physical or virtual. For hybrid environments where customers wish to run an Appliance in a cloud like AWS or Azure, please consult with your Channel Account Manager before discussing.

3 Q: Should I lead with hardware? A: does not have a preference to lead with hardware. Provide customers with the hardware and virtual options first and then software as the last option. 1. Lead with hardware security mandates / actual value and perceived value by customer 2. Virtual appliance if hardware isn t required what type of VM environment is required? 3. Software version mention if customers have issue with 1 and 2 Q: What is the value proposition for an RNG? A: Almost all random number generators (RNGs) use algorithms to produce strings of data that appear to be random. However, all these strings of data can be determined from much shorter initial values, known as a seed. Therefore, if the seed is compromised, so too are all the random numbers. In contrast, Smartcrypt Enterprise Manager 300r and 350 appliances uses quantum measurements of an internal laser. The strings of data not appear to be random, but don t come from a seed that could be compromised. This is often called true RNG or full-entropy RNG. In practice, seed-based RNGs (often called pseudo-random RNGs ) are generally considered sufficient, even for high-security applications. However, some government and financial customers may desire the extra security of not having seeds. Q: If customers don t use an HSM or qrng, does that mean their virtual or software solution is less secure? A: If they don t have a hardware root of trust, or a full-entropy random number generator, it is decidedly less secure. Specifically, if the Smartcrypt Manager s master password is not stored in an HSM, it must be stored on the file system. While this can be encrypted on the file system with a key that the application server can access, this process can be reversed by an administrator with sufficient privileges. An HSM allows for separation of duties and adds an additional layer of security that must be compromised during an attack. Q: If hardware fails what is the RMA/Support process? A: DOA units will be immediately replaced from inventory. Post deployment failures will be handled by /Q-Labs support staff. All servers are on 24x7 w/ 4hr response time for parts replacement. To date, Q-Labs has not experienced a single HSM (Thales) failure or a qrng card failure. Q: Can a secure back-up be easily restored to new appliance? A: Smartcrypt Appliances have 1-click restore functionality for database/system backups that have been stored offline.

4 Q: What type of network ports and configurations have to be done with hardware? A: See Support Site: Q: Is it 2U or 1U power consumption, hardware specs A: Units are currently 2U. Next year s chassis will be 2U. Sizing guides for the 200v and Software Only manager can be found in the sizing guide: Q: How do I sell the Smartcrypt appliances? A: Ask your Channel Account Manager for the current price list. On the price list, you ll see the following: Smartcrypt Enterprise Manager 200v virtual appliance Smartcrypt Enterprise Manager 300h appliance Smartcrypt Enterprise Manager 300r appliance Smartcrypt Enterprise Manager 350 appliance For customers who will be installing these in production environments, you must sell at least two of the same appliance (for automatic failover; we will not sell companies a single point of failure in their production environments). Usually a separate appliance will be needed for lab or disaster recovery (and installed in a different location). Therefore, we expect customers to need a minimum of three appliances to be ordered in most cases. Customers cannot cluster physical appliances with virtual appliances. Q: What are our channel discounts for hardware? A: The Smartcrypt Enterprise Manager 200v is software, so channel partners can get their existing software discounts on the 200v. Please contact your Channel Account Manager to get details of channel discounts on the Smartcrypt hardware appliances. Q: Are there volume discounts for multiple appliances? A: No, we will not publish volume discount pricing for these appliances. If you have an opportunity to sell more than 50 appliances to a single customer, contact your Channel Account Manager and we ll work on the pricing with you. Q: What kind of customers should we target? A: The Smartcrypt Enterprise Manager 200v is suited for any customer that wants to take advantage of a turnkey virtual appliance (saving time and effort on setup and deployment), and who don t need the rigor of an HSM or a true RNG. The Smartcrypt Enterprise Manager 300 series is suited for organizations that need or desire the higher rigor of an FIPS Level 3-validated HSM or a true RNG. This includes many financial services organizations and most government agencies. The 300 series also

5 include the ability to store, create, and manage third party keys that conform to the KMIP standard. Of course, each customer is different and may have more or less stringent requirements. Q: Do I need to be certified to sell the Smartcrypt appliances? A: No. But you will need to have a services organization that can properly prepare the customer s infrastructure. We encourage channel partners to charge for assessments and setup where appropriate. Q: How should we help a customer choose between the Smartcrypt Enterprise Manager as a Software Application vs a Virtual Appliance vs a Hardware Appliance? A1: Use this flash card: SEM as Software Application vs Virtual Appliance Windows Software Version Preferred by customers that have significantly invested in their application and database infrastructure. They typically: Have dedicated resources for PKI, networking, app/database management and system recovery. Have standardized on application delivery via IIS and SQL Server Have existing solutions for high availability and load balancing Are using SQL clustering / Always on Technology (AOT) Are comfortable being responsible for service availability and recovery Need to manage 10K to 100K+ Agents that connect to centralized infrastructure Hardware/Virtual Appliance Preferred by customers that prefer to push availability and recovery closer to the vendor. They typically: Prefer to deploy solutions that are selfcontained and turnkey. Have overlapping resources for PKI, networking, app/database management and recovery. Have made a significant investment in vsphere or Hyper-V as part of their business application delivery strategy Prefer to use vendor provided high availability and failover Prefer to have vendor provided replication and backup Need to manage < 50K Agents or support Agents connected to highly decentralized locations (e.g. 7K users in Japan, 7K in UK, 7K in US, etc.) Need an HSM or TRNG

6 Q: How do Smartcrypt appliances compare to the competition in terms of features? A: /, and Thales/Vormetric, and Micro Focus/Voltage all have appliances. Their high-end hardware appliances all have FIPS Level 3 HSMs. When used with Smartcrypt agents, the Smartcrypt Appliances are the key management appliances that: Support true persistent encryption: the protection stays with the data wherever it travels, not just when it resides on a particular drive or server Can manage endpoint (desktop, laptop, and mobile device) and encryption Can manage both discovery of sensitive data and the remediation of it Of our biggest competitors, we also offer the appliance with a true, full-entropy quantum RNG /, Thales/Vormetric, and Micro Focus/Voltage don t offer this. Our reporting and policy management capabilities are also superior: much more can be controlled through the dashboard than our competitors (who often require CLI work for some basic functionality), and our dashboard is easier to use and more intuitive. Virtual Offerings Smartcrypt Enterprise Mgr 200v k150v k170v k450v Vormetric DSM Voltage SecureData virtual appliance Keys supported 1,000,000 25,000 25,000 1,000,000 10,000+ Not specified FIPS support No Level 1 Level 3 (AWS) Level 3 (AWS) Level 1 Level 3 (HPE HSM) Cloud marketplaces AWS AWS AWS, Azure AWS AWS, Azure No KMIP support Coming soon Yes No Price Contact $12,500 Unknown $28,500 $25,000 Unknown

7 Hardware Offering Smartcrypt Ent Mgr 300h / 300r Smartcrypt Enterprise Mgr 350 k250 k460 Vormetric DSM 6000 Vormetric DSM 6100 Keys supported 1,000,000 1,000,000 25,000 1,000,000 10,000+ Not specified FIPS support HSM/ QRNG? Level 3 / None HSM (300h) QRNG (300r) Level 3 Level 1 Level 3 Level 1 Level 3 Both None HSM None HSM KMIP support Yes Coming soon Yes Yes Price Contact $48,950 $25,000 $38,000 $35,000 $45,000 Q: How do our appliances compare to the competition in terms of price? A: requires the purchase of KMIP connectors in addition to the appliances, which can add tens of thousands in costs for the customer (and make price comparisons difficult). As you can see from the above table, we believe our prices are competitive with /, Thales/Vormetric, and Micro Focus/Voltage. Q: Do the appliances include any encryption agents for files, users, etc.? A: No. The appliances are just the brains of the operation very similar to and Vormetric offerings. Customers will still need to purchase and implement Smartcrypt user, desktop, mobile, TDE, server, SDK, or other agents. Q: Since the 300 series is hardware, what s the time needed for delivery? A: Please set the expectation with customers that six weeks will be required for delivery. Q: How do channel partners address customer support for the hardware appliances? A: If you get a call on support and it is related to the software (either the 200v or the Smartcrypt software on the hardware box), support is handled as you handle software support today. If the call is related to hardware or any non-smartcrypt software (for the HSM or the RNG, for example), contact and open a support ticket.

8 Q: How quickly can we replace a failed appliance? A: will deal with all replacements for failed appliances. We will expedite these processes when appropriate, so customers are offline as little as possible. (Customers should purchase multiple appliances and set up automatic failover and high availability to reduce the risk of downtime, even if one of their appliances fails.) Q: Can I mix and match virtual and physical appliances? A: In most scenarios, customers who order the 300 series usually have to prove compliance (with HSMs, it s often FIPS Level 3 validation) throughout their environments. Therefore, companies who mix and-match will likely be unable to prove compliance, which undermines their purchase of the HSM (or qrng) in the first place. There are some edge-case scenarios, but generally speaking, mixing-and matching FIPS-certified and non-fips-certified appliances does not follow best practices, and we ll likely flag quotes that include both physical HSM and virtual or physical non-hsm appliances.

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work? SMARTCRYPT PKWARE s Smartcrypt is a data-centric audit and protection platform that automates data discovery, classification, and protection in a single workflow, managed from a single dashboard. With

More information

Who s Protecting Your Keys? August 2018

Who s Protecting Your Keys? August 2018 Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and

More information

VMware, SQL Server and Encrypting Private Data Townsend Security

VMware, SQL Server and Encrypting Private Data Townsend Security VMware, SQL Server and Encrypting Private Data Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 Today s Agenda! What s new from Microsoft?! Compliance, standards, and

More information

VMware, SQL Server and Encrypting Private Data Townsend Security

VMware, SQL Server and Encrypting Private Data Townsend Security VMware, SQL Server and Encrypting Private Data Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 Today s Agenda! Compliance, standards, and best practices! Encryption and

More information

Evolved Backup and Recovery for the Enterprise

Evolved Backup and Recovery for the Enterprise Evolved Backup and Recovery for the Enterprise with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it will take a few minutes rather than

More information

Intermedia s Private Cloud Exchange

Intermedia s Private Cloud Exchange Intermedia s Private Cloud Exchange This is a practical guide to implementing Intermedia s Private Cloud Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading

More information

THALES esecurity: SECURING YOUR DIGITAL TRANSFORMATION

THALES esecurity: SECURING YOUR DIGITAL TRANSFORMATION www.thalesesecurity.com THALES esecurity: SECURING YOUR DIGITAL TRANSFORMATION Enterprises are committing to a digital transformation initiative by embracing new opportunities and building

More information

Carbonite Availability. Technical overview

Carbonite Availability. Technical overview Carbonite Availability Technical overview Table of contents Executive summary The availability imperative...3 True real-time replication More efficient and better protection... 4 Robust protection Reliably

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

MaaS360 Secure Productivity Suite

MaaS360 Secure Productivity Suite MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity

More information

Security Architecture Models for the Cloud

Security Architecture Models for the Cloud White Paper Security Architecture Models for the Cloud Introduction While Hardware Security Module (HSM) customers traditionally have their own infrastructures and data centers and run HSMs on premises,

More information

Active Directory Services with Windows Server

Active Directory Services with Windows Server Course Code: M10969 Vendor: Microsoft Course Overview Duration: 5 RRP: POA Active Directory Services with Windows Server Overview Get Hands on instruction and practice administering Active Directory technologies

More information

IBM Compose Managed Platform for Multiple Open Source Databases

IBM Compose Managed Platform for Multiple Open Source Databases IBM Compose Managed Platform for Multiple Source Databases Source for Source for Data Layer Blueprint with Compose Source for Comprehensive Catalogue for Simplified Scoping Scalable Platform for FutureProof

More information

Comprehensive Agentless Cloud Backup and Recovery for the Enterprise

Comprehensive Agentless Cloud Backup and Recovery for the Enterprise Comprehensive Agentless Cloud Backup and Recovery for the Enterprise Asigra, Inc. with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it

More information

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated

More information

The Cloud Changes Nothing and Everything! Amazon.com, Inc. and its affiliates. All rights reserved.

The Cloud Changes Nothing and Everything! Amazon.com, Inc. and its affiliates. All rights reserved. The Cloud Changes Nothing and Everything! Amazon.com, Inc. and its affiliates. All rights reserved. About How Amazon did Amazon Web Services Deep experience in building and operating global web scale systems?

More information

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

nshield GENERAL PURPOSE HARDWARE SECURITY MODULES

nshield GENERAL PURPOSE HARDWARE SECURITY MODULES www.thalesesecurity.com nshield GENERAL PURPOSE HARDWARE SECURITY MODULES Contents 1. SECURITY YOU CAN TRUST 3 2. THE nshield FAMILY 4 3. SUPPORT FOR WIDE VARIETY OF USES 5 4. FEATURES

More information

Virtual Machine Encryption Security & Compliance in the Cloud

Virtual Machine Encryption Security & Compliance in the Cloud Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture

More information

Vaultive and SafeNet KeySecure KMIP Integration Guide v1.0. September 2016

Vaultive and SafeNet KeySecure KMIP Integration Guide v1.0. September 2016 Vaultive and SafeNet KeySecure KMIP Integration Guide v1.0 September 2016 2016 Vaultive Inc. All rights reserved. Published in the U.S.A. This documentation contains proprietary information belonging to

More information

Verizon Software Defined Perimeter (SDP).

Verizon Software Defined Perimeter (SDP). Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.

More information

Comprehensive Database Security

Comprehensive Database Security Comprehensive Database Security Safeguard against internal and external threats In today s enterprises, databases house some of the most highly sensitive, tightly regulated data the very data that is sought

More information

Thales e-security. Security Solutions. PosAm, 06th of May 2015 Robert Rüttgen

Thales e-security. Security Solutions. PosAm, 06th of May 2015 Robert Rüttgen Thales e-security Security Solutions PosAm, 06th of May 2015 Robert Rüttgen Hardware Security Modules Hardware vs. Software Key Management & Security Deployment Choices For Cryptography Software-based

More information

Deliver Data Protection Services that Boost Revenues and Margins

Deliver Data Protection Services that Boost Revenues and Margins FAMILY BROCHURE Gemalto s SafeNet Identity and Data Protection Solutions for Service Providers Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing

More information

Dyadic Security Enterprise Key Management

Dyadic Security Enterprise Key Management Dyadic Security Enterprise Key Management The Secure-as-Hardware Software with a Mathematical Proof Dyadic Enterprise Key Management (EKM) is the first software-only key management and key protection system

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

Hybrid Cloud Data Protection & Storage

Hybrid Cloud Data Protection & Storage Hybrid Cloud Data Protection & Storage Company Overview Acronis is a leading backup software, disaster recovery, and secure data access provider with solutions including physical, virtual, and cloud server

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information

Hybrid Data Security Overview

Hybrid Data Security Overview From day one, data security has been the primary focus in designing Cisco Webex Teams. The cornerstone of this security is end-to-end content encryption, enabled by Webex Teams clients interacting with

More information

Virtual KeySecure for AWS

Virtual KeySecure for AWS Virtual KeySecure for AWS CUSTOMER RELEASE NOTES Version: 8.2.1 Issue Date: June 5 2015 Document Part Number: 007-013116-001, Rev A Contents Product Description... 2 Key Management... 2 High Performance...

More information

Cloud Confidence: Simple Seamless Secure. Dell EMC Data Protection for VMware Cloud on AWS

Cloud Confidence: Simple Seamless Secure. Dell EMC Data Protection for VMware Cloud on AWS Cloud Confidence: Simple Seamless Secure Dell EMC Data Protection for VMware Cloud on AWS Introduction From the boardroom to the data center, digital transformation has become a business imperative. Whether

More information

Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud.

Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud. Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud A PUBLIC Any Deploy ment UBER VENDOR Any Workload ON-PREMISES PHYSICAL

More information

Perfect Balance of Public and Private Cloud

Perfect Balance of Public and Private Cloud Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These

More information

Microsoft Active Directory Services with Windows Server

Microsoft Active Directory Services with Windows Server 1800 ULEARN (853 276) www.ddls.com.au Microsoft 10969 - Active Directory Services with Windows Server Length 5 days Price $4290.00 (inc GST) Version B Overview Get hands-on instruction and practice administering

More information

Inventory and Reporting Security Q&A

Inventory and Reporting Security Q&A Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes

More information

Data Protection Everywhere. For the modern data center

Data Protection Everywhere. For the modern data center Data Protection Everywhere For the modern data center Tale of two worlds You need both for Traditional apps IT centric & Next-gen apps Developer centric On-premise Trust Agility Live in the cloud 3 Copyright

More information

GLOBAL PKI TRENDS STUDY

GLOBAL PKI TRENDS STUDY 2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the

More information

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.

More information

Licensing & Pricing FAQ

Licensing & Pricing FAQ Licensing & Pricing FAQ Table of Contents WINDOWS SERVER 2012 DATACENTER AND STANDARD EDITIONS... 4 Q1. What is new in Windows Server 2012?... 4 Q2. What is the difference between Windows Server 2012 Standard

More information

the SWIFT Customer Security

the SWIFT Customer Security TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This

More information

Why is Office 365 the right choice?

Why is Office 365 the right choice? Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply

More information

Configuring Advanced Windows Server 2012 Services

Configuring Advanced Windows Server 2012 Services Course 20412 : Configuring Advanced Windows Server 2012 Services Page 1 of 6 Configuring Advanced Windows Server 2012 Services Course 20412: 4 days; Instructor-Led Introduction Course 20412 is part three

More information

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof Dyadic Enterprise Unbound Key Control For Azure Marketplace The Secure-As-Hardware Software With a Mathematical Proof Unbound Key Control (UKC) is the first software-only key management and key protection

More information

How unified backup and cloud enable your digital transformation success

How unified backup and cloud enable your digital transformation success Key Considerations for Data Protection and Cloud on Your Digital Journey How unified backup and cloud enable your digital transformation success An IDC InfoBrief, Sponsored by February 2018 1 Digital Transformation

More information

Go Cloud. VMware vcloud Datacenter Services by BIOS

Go Cloud. VMware vcloud Datacenter Services by BIOS Go Cloud VMware vcloud Datacenter Services by BIOS Is your IT infrastructure always in tune with your business? If a market opportunity suddenly arises, can your business respond in time? Or is the opportunity

More information

Implementing Microsoft Azure Infrastructure Solutions (20533)

Implementing Microsoft Azure Infrastructure Solutions (20533) Implementing Microsoft Azure Infrastructure Solutions (20533) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Describing Azure architecture components, including

More information

HPE Hyper Converged. Mohannad Daradkeh Data center and Hybrid Cloud Architect Hewlett-Packard Enterprise Saudi Arabia

HPE Hyper Converged. Mohannad Daradkeh Data center and Hybrid Cloud Architect Hewlett-Packard Enterprise Saudi Arabia HPE Hyper Converged Mohannad Daradkeh Data center and Hybrid Cloud Architect Hewlett-Packard Enterprise Saudi Arabia Transform to a hybrid infrastructure Accelerate the delivery of apps and services to

More information

Next-Generation HCI: Fine- Tuned for New Ways of Working

Next-Generation HCI: Fine- Tuned for New Ways of Working www. Govtech.com Next-Generation HCI: Fine-Tuned for New Ways of Working - p. 1 February 21, 2018 Next-Generation HCI: Fine- Tuned for New Ways of Working Traditional data center management focuses mainly

More information

Countering ransomware with HPE data protection solutions

Countering ransomware with HPE data protection solutions Countering ransomware with HPE data protection solutions What is ransomware? Definition Malware that prevents or limits users from accessing their system by: Locking the system s screen Encrypting files

More information

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve

More information

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati LHC2432BU IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud #VMworld IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR

More information

On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor

On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor Ugo Piazzalunga SafeNet Italy Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com

More information

BUYER S GUIDE TO AWS AND AZURE RESERVED INSTANCES

BUYER S GUIDE TO AWS AND AZURE RESERVED INSTANCES WHITEPAPER BUYER S GUIDE TO AWS AND AZURE RESERVED INSTANCES Maximizing RI Cost-Saving Potential www.cloudcheckr.com For the right workloads, those that are predictable and stable, utilizing reserved instances

More information

IPMA State of Washington. Disaster Recovery in. State and Local. Governments

IPMA State of Washington. Disaster Recovery in. State and Local. Governments IPMA State of Washington Disaster Recovery in State and Local Governments Disaster by the Numbers Over 70% of agencies had some sort of data loss incident in 2012 Under 5% report that they were able to

More information

SHA-1 to SHA-2. Migration Guide

SHA-1 to SHA-2. Migration Guide SHA-1 to SHA-2 Migration Guide Web-application attacks represented 40 percent of breaches in 2015. Cryptographic and server-side vulnerabilities provide opportunities for cyber criminals to carry out ransomware

More information

P a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection

P a g e 1. Teknologisk Institut.   Online kursus k SysAdmin & DevOps Collection P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Hybrid Cloud 1. ebookiness created by the HPE Europe Division of Ingram Micro

Hybrid Cloud 1. ebookiness created by the HPE Europe Division of Ingram Micro Hybrid Cloud 1 contents 3 Hybrid IT: the path to the Cloud HPE & Microsoft: the strongest commitment to the Hybrid cloud 4 5 Accelerate your business with the hybrid cloud offered by HPE and Azure Why

More information

VMWARE VSAN LICENSING GUIDE - MARCH 2018 VMWARE VSAN 6.6. Licensing Guide

VMWARE VSAN LICENSING GUIDE - MARCH 2018 VMWARE VSAN 6.6. Licensing Guide - MARCH 2018 VMWARE VSAN 6.6 Licensing Guide Table of Contents Introduction 3 License Editions 4 Virtual Desktop Infrastructure... 5 Upgrades... 5 Remote Office / Branch Office... 5 Stretched Cluster with

More information

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You

More information

Getting Started with AWS Security

Getting Started with AWS Security Getting Started with AWS Security Tomas Clemente Sanchez Senior Consultant Security, Risk and Compliance September 21st 2017 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Move

More information

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments. WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish

More information

2017 THALES DATA THREAT REPORT

2017 THALES DATA THREAT REPORT 2017 THALES DATA THREAT REPORT Trends in Encryption and Data Security FINANCIAL SERVICES EDITION www.thales-esecurity.com 2017 THALES DATA THREAT REPORT TRENDS IN ENCRYPTION AND DATA PROTECTION U.S. U.K.

More information

Active Directory Services with Windows Server

Active Directory Services with Windows Server Active Directory Services with Windows Server 10969B; 5 days, Instructor-led Course Description Get hands on instruction and practice administering Active Directory technologies in Windows Server 2012

More information

arcserve r16.5 Hybrid data protection

arcserve r16.5 Hybrid data protection arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements

More information

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS

More information

PUT DATA PROTECTION WHERE YOU NEED IT

PUT DATA PROTECTION WHERE YOU NEED IT from Carbonite PUT DATA PROTECTION WHERE YOU NEED IT Flexibility is your best friend when it comes to choosing a backup plan. For a backup solution to be considered flexible, it needs to satisfy several

More information

WHITE PAPER SEPTEMBER VMWARE vsphere AND vsphere WITH OPERATIONS MANAGEMENT. Licensing, Pricing and Packaging

WHITE PAPER SEPTEMBER VMWARE vsphere AND vsphere WITH OPERATIONS MANAGEMENT. Licensing, Pricing and Packaging WHITE PAPER SEPTEMBER 2017 VMWARE vsphere AND vsphere WITH OPERATIONS MANAGEMENT Licensing, Pricing and Packaging Table of Contents Executive Summary 3 VMware vsphere with Operations Management Overview

More information

Microsoft Configuring Advanced Windows Server 2012 Services

Microsoft Configuring Advanced Windows Server 2012 Services 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20412 - Configuring Advanced Windows Server 2012 Services Length 5 days Price $4290.00 (inc GST) Version D Overview Get hands-on instruction and practice

More information

Vembu Service Provider Program

Vembu Service Provider Program Vembu Service Provider Program Built for CSPs, MSPs, HSPs and other Solution / Service Providers VEMBU TECHNOLOGIES PARTNERS Vembu Technologies Founded in 2002 10+ Years of Experience Headquartered in

More information

Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel

Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel Legal Disclaimer Intel may make changes to specifications

More information

Configuring Advanced Windows Server 2012 Services

Configuring Advanced Windows Server 2012 Services Configuring Advanced Windows Server 2012 Services Course 20412D - Five days - Instructor-led - Hands-on Introduction Get hands-on instruction and practice configuring advanced Windows Server 2012, including

More information

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Managing Your Privileged Identities: The Choke Point of Advanced Attacks Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why

More information

hcloud Deployment Models

hcloud Deployment Models hcloud Deployment Models Drew Dietrich Director, Oracle Managed Cloud Services 1 The Safe Harbor The following is intended to outline our general product direction. It is intended for information purposes

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

ENCRYPTION IN USE FACT AND FICTION. White Paper

ENCRYPTION IN USE FACT AND FICTION. White Paper White Paper Table of Contents The Case for Encryption... Encryption in Use Not Some Kind of Magic... Evaluating Encryption in Use Claims... 3 4 4 The Vaultive Approach... 5 2 Risk-conscious enterprises

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure Solutions OD20533C; On-Demand, Video-based Course Description This course is intended for IT professionals who are familiar with managing on-premises IT deployments

More information

[MS20533]: Implementing Microsoft Azure Infrastructure Solutions

[MS20533]: Implementing Microsoft Azure Infrastructure Solutions [MS20533]: Implementing Microsoft Azure Infrastructure Solutions Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Microsoft Products Delivery Method : Instructor-led (Classroom)

More information

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security

More information

VMware vcloud Air Accelerator Service

VMware vcloud Air Accelerator Service DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement

More information

MySQL Enterprise Security

MySQL Enterprise Security MySQL Enterprise Security Mike Frank Product Management Director Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,

More information

The Nasuni Security Model

The Nasuni Security Model White Paper Nasuni enterprise file services ensures unstructured data security and privacy, enabling IT organizations to safely leverage cloud storage while meeting stringent governance and compliance

More information

White Paper. Deploying CKMS Within a Business

White Paper. Deploying CKMS Within a Business White Paper Deploying CKMS Within a Business 1 Introduction The Cryptomathic Crypto Key Management System (CKMS) is a market-leading lifecycle key management product that can manage cryptographic keys

More information

Hosted Azure for your business. Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution.

Hosted Azure for your business. Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution. Hosted Azure for your business Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution. Azure is approximately 50 percent cheaper than other cloud services

More information

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged

More information

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting

More information

Windows Server The operating system

Windows Server The operating system Windows Server 2019 The operating system that bridges onpremises and cloud By maximizing technology and infrastructure investments with Windows Server 2019, forward-facing businesses can capture direct

More information

Transform Availability

Transform Availability Transform Availability EMC Continuous Availability Advisory Services Presenter: 1 Agenda Introduction Why Continuous Availability? Customer Challenges EMC s Approach Service Description Delivery Timeline

More information

"Charting the Course... MOC B Active Directory Services with Windows Server Course Summary

Charting the Course... MOC B Active Directory Services with Windows Server Course Summary Description Course Summary Get Hands on instruction and practice administering Active Directory technologies in Windows Server 2012 and Windows Server 2012 R2 in this 5-day Microsoft Official Course. You

More information

DATACENTER AS A SERVICE. We unburden you at the level you desire

DATACENTER AS A SERVICE. We unburden you at the level you desire DATACENTER AS A SERVICE We unburden you at the level you desire MARKET TREND BY VARIOUS ANALYSTS The concept of flexible and scalable computing is a key reason to create a Cloud based architecture 77%

More information

THE THALES SECURITY WORLD ARCHITECTURE

THE THALES SECURITY WORLD ARCHITECTURE www.thalesesecurity.com THE THALES SECURITY WORLD ARCHITECTURE Optimizing Security and Operational Efficiency in nshield HSM Environments White Paper Executive Summary Today s security

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

Partner Center: Secure application model

Partner Center: Secure application model Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including

More information

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso The CISO s Guide to Deploying True Password-less Security by Bojan Simic and Ed Amoroso TRUST ANYONE HYPR Deployment Overview for Managers HYPR is designed to eliminate credential stuffing, phishing and

More information

HCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY

HCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF A SERVER OPTIMIZED FOR A HYBRID WORLD The HCX Server is a Windows Server pre-bundled with integrated core IT services designed for small and midsize

More information

Windows Server : Configuring Advanced Windows Server 2012 Services R2. Upcoming Dates. Course Description.

Windows Server : Configuring Advanced Windows Server 2012 Services R2. Upcoming Dates. Course Description. Windows Server 2012 20412: Configuring Advanced Windows Server 2012 Services R2 Gain the skills and knowledge necessary to perform advanced management and provisioning of services within Windows Server

More information

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public

Data Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public Data Protection for Cisco HyperFlex with Veeam Availability Suite 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. Highlights Is Cisco compatible

More information

VMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager

VMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager VMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager 1 VMware By the Numbers Year Founded Employees R&D Engineers with Advanced Degrees Technology Partners Channel

More information

This course prepares the student for Exam : Configuring Advanced Windows Server 2012 Services.

This course prepares the student for Exam : Configuring Advanced Windows Server 2012 Services. Course 20412A: 5 Days About this Course Course 20412A is part three of a three-course series that includes courses 20410A and 20411A. The series provides the skills and knowledge necessary to implement

More information