Channel FAQ: Smartcrypt Appliances
|
|
- Jessie O’Brien’
- 5 years ago
- Views:
Transcription
1 Channel FAQ: Smartcrypt Appliances Q: When were Smartcrypt appliances announced? A: announced the release of our Smartcrypt virtual and physical appliances on September 19, Smartcrypt Enterprise Manager 200v: a virtual appliance for encryption and key management Smartcrypt Enterprise Manager 300h: a hardware appliance with a FIPS Level 3 hardware security module (HSM) Smartcrypt Enterprise Manager 300r: a hardware appliance with a full-entropy quantum random number generator (RNG) Smartcrypt Enterprise Manager 350: a hardware appliance with both the HSM and RNG Q: What do the Smartcrypt appliances do? A: The Smartcrypt appliances allow security managers to define encryption policies and monitor encryption and decryption activity across the organization. Smartcrypt automates key management, eliminating the complexity of key generation, exchange, synchronization, and rotation. It also applies security policy, provisions encryption functionality for users, devices, and servers, and controls the data discovery features. Both Smartcrypt Enterprise Manager 200v and 300 series contain the Smartcrypt Enterprise Manager software with a built-in key store and a hardened operating system. They offer automatic failover, high availability, support for agents in multiple geographies, and multitenancy. The 300h adds a FIPS Level 3 HSM, the 300r adds a full-entropy quantum RNG, and the 350 adds both the HSM and RNG. The 300 series also provide the ability to store, create, and manage third party keys that conform to the KMIP standard. These are plug-andplay offerings for companies who don t want to spend the time or effort to connect their key management software to their own app and database infrastructures. Q: What is the value proposition for an HSM? A: A Hardware Security Module (HSM) stores master keys for designated encryption keys that Smartcrypt uses for its encryption. Each HSM has multiple secure cryptoprocessor chips to prevent tampering, and the HSM will also delete the key upon detecting tampering. The HSM provides not assurance that keys will remain safe, but also is FIPS Level 3 validated, which is required by many financial and government organizations to protect their data, and has the ability to store, create, and manage third party keys that conform to the KMIP standard.
2 Q: What is FIPS Level 3? A: FIPS 140 is a standard published by NIST to apply requirements for cryptographic modules for use by the U.S. federal government. FIPS Level 3 requires physical tamper resistance, authentication, and separation between the different interfaces in the cryptographic modules. Cryptographic modules must meet Level 3 requirements in order to be authorized for purchase by many government agencies (and other commercial organizations, especially in finance). Also, be aware that FIPS Level 3 certifications are for the HSMs, not for the entire appliance. Q: Does virtual appliance have any FIPS rating? A: The virtual appliance has not yet been submitted for FIPS Level 1 compliance. Please let your Channel Account Manager know if/when customers are asking for this. Q: Do the software clients (Smartcrypt Agent or clients) have any FIPS rating? A: Smartcrypt for Windows does have a FIPS mode option that when enabled will cause the agent to use FIPS certified algorithms and modules. Find more information on meeting FIPS Requirements with Smartcrypt here: Q: Are there any regulations for data protection that require FIPS that customers might not be aware of? A: Many government entities require encryption to be performed in accordance with FIPS. Many financial services institutions that take their queues from the US federal government have adopted the use of FIPS as well. That said, PCI-DSS, HIPAA/HiTech, DFS-500, GDPR, etc. do not specifically mandate encryption be performed in accordance with FIPS. Q: Can a virtual and physical appliance work together? A: This configuration is not supported, although there are no known technical limitations. If you get requests for this, please reach out to your Channel Account Manager. Q: Can someone migrate from a hardware appliance to a virtual appliance in the future? A: This is supported and the process to migrate is as simple as adding additional nodes to the existing cluster and then promoting them to master while disconnecting the original (hardwarebased) nodes. Q: Is there any way to share keys between physical and virtual? E.g. if a customer wants a physical appliance on premise but wants a virtual appliance in the cloud or in a remote data center, is this possible? A: All keys are shared between all appliances in the same cluster, regardless of whether or not they are physical or virtual. For hybrid environments where customers wish to run an Appliance in a cloud like AWS or Azure, please consult with your Channel Account Manager before discussing.
3 Q: Should I lead with hardware? A: does not have a preference to lead with hardware. Provide customers with the hardware and virtual options first and then software as the last option. 1. Lead with hardware security mandates / actual value and perceived value by customer 2. Virtual appliance if hardware isn t required what type of VM environment is required? 3. Software version mention if customers have issue with 1 and 2 Q: What is the value proposition for an RNG? A: Almost all random number generators (RNGs) use algorithms to produce strings of data that appear to be random. However, all these strings of data can be determined from much shorter initial values, known as a seed. Therefore, if the seed is compromised, so too are all the random numbers. In contrast, Smartcrypt Enterprise Manager 300r and 350 appliances uses quantum measurements of an internal laser. The strings of data not appear to be random, but don t come from a seed that could be compromised. This is often called true RNG or full-entropy RNG. In practice, seed-based RNGs (often called pseudo-random RNGs ) are generally considered sufficient, even for high-security applications. However, some government and financial customers may desire the extra security of not having seeds. Q: If customers don t use an HSM or qrng, does that mean their virtual or software solution is less secure? A: If they don t have a hardware root of trust, or a full-entropy random number generator, it is decidedly less secure. Specifically, if the Smartcrypt Manager s master password is not stored in an HSM, it must be stored on the file system. While this can be encrypted on the file system with a key that the application server can access, this process can be reversed by an administrator with sufficient privileges. An HSM allows for separation of duties and adds an additional layer of security that must be compromised during an attack. Q: If hardware fails what is the RMA/Support process? A: DOA units will be immediately replaced from inventory. Post deployment failures will be handled by /Q-Labs support staff. All servers are on 24x7 w/ 4hr response time for parts replacement. To date, Q-Labs has not experienced a single HSM (Thales) failure or a qrng card failure. Q: Can a secure back-up be easily restored to new appliance? A: Smartcrypt Appliances have 1-click restore functionality for database/system backups that have been stored offline.
4 Q: What type of network ports and configurations have to be done with hardware? A: See Support Site: Q: Is it 2U or 1U power consumption, hardware specs A: Units are currently 2U. Next year s chassis will be 2U. Sizing guides for the 200v and Software Only manager can be found in the sizing guide: Q: How do I sell the Smartcrypt appliances? A: Ask your Channel Account Manager for the current price list. On the price list, you ll see the following: Smartcrypt Enterprise Manager 200v virtual appliance Smartcrypt Enterprise Manager 300h appliance Smartcrypt Enterprise Manager 300r appliance Smartcrypt Enterprise Manager 350 appliance For customers who will be installing these in production environments, you must sell at least two of the same appliance (for automatic failover; we will not sell companies a single point of failure in their production environments). Usually a separate appliance will be needed for lab or disaster recovery (and installed in a different location). Therefore, we expect customers to need a minimum of three appliances to be ordered in most cases. Customers cannot cluster physical appliances with virtual appliances. Q: What are our channel discounts for hardware? A: The Smartcrypt Enterprise Manager 200v is software, so channel partners can get their existing software discounts on the 200v. Please contact your Channel Account Manager to get details of channel discounts on the Smartcrypt hardware appliances. Q: Are there volume discounts for multiple appliances? A: No, we will not publish volume discount pricing for these appliances. If you have an opportunity to sell more than 50 appliances to a single customer, contact your Channel Account Manager and we ll work on the pricing with you. Q: What kind of customers should we target? A: The Smartcrypt Enterprise Manager 200v is suited for any customer that wants to take advantage of a turnkey virtual appliance (saving time and effort on setup and deployment), and who don t need the rigor of an HSM or a true RNG. The Smartcrypt Enterprise Manager 300 series is suited for organizations that need or desire the higher rigor of an FIPS Level 3-validated HSM or a true RNG. This includes many financial services organizations and most government agencies. The 300 series also
5 include the ability to store, create, and manage third party keys that conform to the KMIP standard. Of course, each customer is different and may have more or less stringent requirements. Q: Do I need to be certified to sell the Smartcrypt appliances? A: No. But you will need to have a services organization that can properly prepare the customer s infrastructure. We encourage channel partners to charge for assessments and setup where appropriate. Q: How should we help a customer choose between the Smartcrypt Enterprise Manager as a Software Application vs a Virtual Appliance vs a Hardware Appliance? A1: Use this flash card: SEM as Software Application vs Virtual Appliance Windows Software Version Preferred by customers that have significantly invested in their application and database infrastructure. They typically: Have dedicated resources for PKI, networking, app/database management and system recovery. Have standardized on application delivery via IIS and SQL Server Have existing solutions for high availability and load balancing Are using SQL clustering / Always on Technology (AOT) Are comfortable being responsible for service availability and recovery Need to manage 10K to 100K+ Agents that connect to centralized infrastructure Hardware/Virtual Appliance Preferred by customers that prefer to push availability and recovery closer to the vendor. They typically: Prefer to deploy solutions that are selfcontained and turnkey. Have overlapping resources for PKI, networking, app/database management and recovery. Have made a significant investment in vsphere or Hyper-V as part of their business application delivery strategy Prefer to use vendor provided high availability and failover Prefer to have vendor provided replication and backup Need to manage < 50K Agents or support Agents connected to highly decentralized locations (e.g. 7K users in Japan, 7K in UK, 7K in US, etc.) Need an HSM or TRNG
6 Q: How do Smartcrypt appliances compare to the competition in terms of features? A: /, and Thales/Vormetric, and Micro Focus/Voltage all have appliances. Their high-end hardware appliances all have FIPS Level 3 HSMs. When used with Smartcrypt agents, the Smartcrypt Appliances are the key management appliances that: Support true persistent encryption: the protection stays with the data wherever it travels, not just when it resides on a particular drive or server Can manage endpoint (desktop, laptop, and mobile device) and encryption Can manage both discovery of sensitive data and the remediation of it Of our biggest competitors, we also offer the appliance with a true, full-entropy quantum RNG /, Thales/Vormetric, and Micro Focus/Voltage don t offer this. Our reporting and policy management capabilities are also superior: much more can be controlled through the dashboard than our competitors (who often require CLI work for some basic functionality), and our dashboard is easier to use and more intuitive. Virtual Offerings Smartcrypt Enterprise Mgr 200v k150v k170v k450v Vormetric DSM Voltage SecureData virtual appliance Keys supported 1,000,000 25,000 25,000 1,000,000 10,000+ Not specified FIPS support No Level 1 Level 3 (AWS) Level 3 (AWS) Level 1 Level 3 (HPE HSM) Cloud marketplaces AWS AWS AWS, Azure AWS AWS, Azure No KMIP support Coming soon Yes No Price Contact $12,500 Unknown $28,500 $25,000 Unknown
7 Hardware Offering Smartcrypt Ent Mgr 300h / 300r Smartcrypt Enterprise Mgr 350 k250 k460 Vormetric DSM 6000 Vormetric DSM 6100 Keys supported 1,000,000 1,000,000 25,000 1,000,000 10,000+ Not specified FIPS support HSM/ QRNG? Level 3 / None HSM (300h) QRNG (300r) Level 3 Level 1 Level 3 Level 1 Level 3 Both None HSM None HSM KMIP support Yes Coming soon Yes Yes Price Contact $48,950 $25,000 $38,000 $35,000 $45,000 Q: How do our appliances compare to the competition in terms of price? A: requires the purchase of KMIP connectors in addition to the appliances, which can add tens of thousands in costs for the customer (and make price comparisons difficult). As you can see from the above table, we believe our prices are competitive with /, Thales/Vormetric, and Micro Focus/Voltage. Q: Do the appliances include any encryption agents for files, users, etc.? A: No. The appliances are just the brains of the operation very similar to and Vormetric offerings. Customers will still need to purchase and implement Smartcrypt user, desktop, mobile, TDE, server, SDK, or other agents. Q: Since the 300 series is hardware, what s the time needed for delivery? A: Please set the expectation with customers that six weeks will be required for delivery. Q: How do channel partners address customer support for the hardware appliances? A: If you get a call on support and it is related to the software (either the 200v or the Smartcrypt software on the hardware box), support is handled as you handle software support today. If the call is related to hardware or any non-smartcrypt software (for the HSM or the RNG, for example), contact and open a support ticket.
8 Q: How quickly can we replace a failed appliance? A: will deal with all replacements for failed appliances. We will expedite these processes when appropriate, so customers are offline as little as possible. (Customers should purchase multiple appliances and set up automatic failover and high availability to reduce the risk of downtime, even if one of their appliances fails.) Q: Can I mix and match virtual and physical appliances? A: In most scenarios, customers who order the 300 series usually have to prove compliance (with HSMs, it s often FIPS Level 3 validation) throughout their environments. Therefore, companies who mix and-match will likely be unable to prove compliance, which undermines their purchase of the HSM (or qrng) in the first place. There are some edge-case scenarios, but generally speaking, mixing-and matching FIPS-certified and non-fips-certified appliances does not follow best practices, and we ll likely flag quotes that include both physical HSM and virtual or physical non-hsm appliances.
SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?
SMARTCRYPT PKWARE s Smartcrypt is a data-centric audit and protection platform that automates data discovery, classification, and protection in a single workflow, managed from a single dashboard. With
More informationWho s Protecting Your Keys? August 2018
Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and
More informationVMware, SQL Server and Encrypting Private Data Townsend Security
VMware, SQL Server and Encrypting Private Data Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 Today s Agenda! What s new from Microsoft?! Compliance, standards, and
More informationVMware, SQL Server and Encrypting Private Data Townsend Security
VMware, SQL Server and Encrypting Private Data Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 Today s Agenda! Compliance, standards, and best practices! Encryption and
More informationEvolved Backup and Recovery for the Enterprise
Evolved Backup and Recovery for the Enterprise with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it will take a few minutes rather than
More informationIntermedia s Private Cloud Exchange
Intermedia s Private Cloud Exchange This is a practical guide to implementing Intermedia s Private Cloud Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading
More informationTHALES esecurity: SECURING YOUR DIGITAL TRANSFORMATION
www.thalesesecurity.com THALES esecurity: SECURING YOUR DIGITAL TRANSFORMATION Enterprises are committing to a digital transformation initiative by embracing new opportunities and building
More informationCarbonite Availability. Technical overview
Carbonite Availability Technical overview Table of contents Executive summary The availability imperative...3 True real-time replication More efficient and better protection... 4 Robust protection Reliably
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationMaaS360 Secure Productivity Suite
MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity
More informationSecurity Architecture Models for the Cloud
White Paper Security Architecture Models for the Cloud Introduction While Hardware Security Module (HSM) customers traditionally have their own infrastructures and data centers and run HSMs on premises,
More informationActive Directory Services with Windows Server
Course Code: M10969 Vendor: Microsoft Course Overview Duration: 5 RRP: POA Active Directory Services with Windows Server Overview Get Hands on instruction and practice administering Active Directory technologies
More informationIBM Compose Managed Platform for Multiple Open Source Databases
IBM Compose Managed Platform for Multiple Source Databases Source for Source for Data Layer Blueprint with Compose Source for Comprehensive Catalogue for Simplified Scoping Scalable Platform for FutureProof
More informationComprehensive Agentless Cloud Backup and Recovery for the Enterprise
Comprehensive Agentless Cloud Backup and Recovery for the Enterprise Asigra, Inc. with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it
More informationAUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE
AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated
More informationThe Cloud Changes Nothing and Everything! Amazon.com, Inc. and its affiliates. All rights reserved.
The Cloud Changes Nothing and Everything! Amazon.com, Inc. and its affiliates. All rights reserved. About How Amazon did Amazon Web Services Deep experience in building and operating global web scale systems?
More informationWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationnshield GENERAL PURPOSE HARDWARE SECURITY MODULES
www.thalesesecurity.com nshield GENERAL PURPOSE HARDWARE SECURITY MODULES Contents 1. SECURITY YOU CAN TRUST 3 2. THE nshield FAMILY 4 3. SUPPORT FOR WIDE VARIETY OF USES 5 4. FEATURES
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More informationVaultive and SafeNet KeySecure KMIP Integration Guide v1.0. September 2016
Vaultive and SafeNet KeySecure KMIP Integration Guide v1.0 September 2016 2016 Vaultive Inc. All rights reserved. Published in the U.S.A. This documentation contains proprietary information belonging to
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationComprehensive Database Security
Comprehensive Database Security Safeguard against internal and external threats In today s enterprises, databases house some of the most highly sensitive, tightly regulated data the very data that is sought
More informationThales e-security. Security Solutions. PosAm, 06th of May 2015 Robert Rüttgen
Thales e-security Security Solutions PosAm, 06th of May 2015 Robert Rüttgen Hardware Security Modules Hardware vs. Software Key Management & Security Deployment Choices For Cryptography Software-based
More informationDeliver Data Protection Services that Boost Revenues and Margins
FAMILY BROCHURE Gemalto s SafeNet Identity and Data Protection Solutions for Service Providers Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing
More informationDyadic Security Enterprise Key Management
Dyadic Security Enterprise Key Management The Secure-as-Hardware Software with a Mathematical Proof Dyadic Enterprise Key Management (EKM) is the first software-only key management and key protection system
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationHybrid Cloud Data Protection & Storage
Hybrid Cloud Data Protection & Storage Company Overview Acronis is a leading backup software, disaster recovery, and secure data access provider with solutions including physical, virtual, and cloud server
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More informationHybrid Data Security Overview
From day one, data security has been the primary focus in designing Cisco Webex Teams. The cornerstone of this security is end-to-end content encryption, enabled by Webex Teams clients interacting with
More informationVirtual KeySecure for AWS
Virtual KeySecure for AWS CUSTOMER RELEASE NOTES Version: 8.2.1 Issue Date: June 5 2015 Document Part Number: 007-013116-001, Rev A Contents Product Description... 2 Key Management... 2 High Performance...
More informationCloud Confidence: Simple Seamless Secure. Dell EMC Data Protection for VMware Cloud on AWS
Cloud Confidence: Simple Seamless Secure Dell EMC Data Protection for VMware Cloud on AWS Introduction From the boardroom to the data center, digital transformation has become a business imperative. Whether
More informationAcronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud.
Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud A PUBLIC Any Deploy ment UBER VENDOR Any Workload ON-PREMISES PHYSICAL
More informationPerfect Balance of Public and Private Cloud
Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These
More informationMicrosoft Active Directory Services with Windows Server
1800 ULEARN (853 276) www.ddls.com.au Microsoft 10969 - Active Directory Services with Windows Server Length 5 days Price $4290.00 (inc GST) Version B Overview Get hands-on instruction and practice administering
More informationInventory and Reporting Security Q&A
Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes
More informationData Protection Everywhere. For the modern data center
Data Protection Everywhere For the modern data center Tale of two worlds You need both for Traditional apps IT centric & Next-gen apps Developer centric On-premise Trust Agility Live in the cloud 3 Copyright
More informationGLOBAL PKI TRENDS STUDY
2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the
More informationArchiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention
Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.
More informationLicensing & Pricing FAQ
Licensing & Pricing FAQ Table of Contents WINDOWS SERVER 2012 DATACENTER AND STANDARD EDITIONS... 4 Q1. What is new in Windows Server 2012?... 4 Q2. What is the difference between Windows Server 2012 Standard
More informationthe SWIFT Customer Security
TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This
More informationWhy is Office 365 the right choice?
Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply
More informationConfiguring Advanced Windows Server 2012 Services
Course 20412 : Configuring Advanced Windows Server 2012 Services Page 1 of 6 Configuring Advanced Windows Server 2012 Services Course 20412: 4 days; Instructor-Led Introduction Course 20412 is part three
More informationDyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof
Dyadic Enterprise Unbound Key Control For Azure Marketplace The Secure-As-Hardware Software With a Mathematical Proof Unbound Key Control (UKC) is the first software-only key management and key protection
More informationHow unified backup and cloud enable your digital transformation success
Key Considerations for Data Protection and Cloud on Your Digital Journey How unified backup and cloud enable your digital transformation success An IDC InfoBrief, Sponsored by February 2018 1 Digital Transformation
More informationGo Cloud. VMware vcloud Datacenter Services by BIOS
Go Cloud VMware vcloud Datacenter Services by BIOS Is your IT infrastructure always in tune with your business? If a market opportunity suddenly arises, can your business respond in time? Or is the opportunity
More informationImplementing Microsoft Azure Infrastructure Solutions (20533)
Implementing Microsoft Azure Infrastructure Solutions (20533) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Describing Azure architecture components, including
More informationHPE Hyper Converged. Mohannad Daradkeh Data center and Hybrid Cloud Architect Hewlett-Packard Enterprise Saudi Arabia
HPE Hyper Converged Mohannad Daradkeh Data center and Hybrid Cloud Architect Hewlett-Packard Enterprise Saudi Arabia Transform to a hybrid infrastructure Accelerate the delivery of apps and services to
More informationNext-Generation HCI: Fine- Tuned for New Ways of Working
www. Govtech.com Next-Generation HCI: Fine-Tuned for New Ways of Working - p. 1 February 21, 2018 Next-Generation HCI: Fine- Tuned for New Ways of Working Traditional data center management focuses mainly
More informationCountering ransomware with HPE data protection solutions
Countering ransomware with HPE data protection solutions What is ransomware? Definition Malware that prevents or limits users from accessing their system by: Locking the system s screen Encrypting files
More informationBUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY
SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve
More informationIBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati
LHC2432BU IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud #VMworld IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR
More informationOn Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor
On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor Ugo Piazzalunga SafeNet Italy Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com
More informationBUYER S GUIDE TO AWS AND AZURE RESERVED INSTANCES
WHITEPAPER BUYER S GUIDE TO AWS AND AZURE RESERVED INSTANCES Maximizing RI Cost-Saving Potential www.cloudcheckr.com For the right workloads, those that are predictable and stable, utilizing reserved instances
More informationIPMA State of Washington. Disaster Recovery in. State and Local. Governments
IPMA State of Washington Disaster Recovery in State and Local Governments Disaster by the Numbers Over 70% of agencies had some sort of data loss incident in 2012 Under 5% report that they were able to
More informationSHA-1 to SHA-2. Migration Guide
SHA-1 to SHA-2 Migration Guide Web-application attacks represented 40 percent of breaches in 2015. Cryptographic and server-side vulnerabilities provide opportunities for cyber criminals to carry out ransomware
More informationP a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection
P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationHybrid Cloud 1. ebookiness created by the HPE Europe Division of Ingram Micro
Hybrid Cloud 1 contents 3 Hybrid IT: the path to the Cloud HPE & Microsoft: the strongest commitment to the Hybrid cloud 4 5 Accelerate your business with the hybrid cloud offered by HPE and Azure Why
More informationVMWARE VSAN LICENSING GUIDE - MARCH 2018 VMWARE VSAN 6.6. Licensing Guide
- MARCH 2018 VMWARE VSAN 6.6 Licensing Guide Table of Contents Introduction 3 License Editions 4 Virtual Desktop Infrastructure... 5 Upgrades... 5 Remote Office / Branch Office... 5 Stretched Cluster with
More informationVeritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW
Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You
More informationGetting Started with AWS Security
Getting Started with AWS Security Tomas Clemente Sanchez Senior Consultant Security, Risk and Compliance September 21st 2017 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Move
More informationData safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.
WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish
More information2017 THALES DATA THREAT REPORT
2017 THALES DATA THREAT REPORT Trends in Encryption and Data Security FINANCIAL SERVICES EDITION www.thales-esecurity.com 2017 THALES DATA THREAT REPORT TRENDS IN ENCRYPTION AND DATA PROTECTION U.S. U.K.
More informationActive Directory Services with Windows Server
Active Directory Services with Windows Server 10969B; 5 days, Instructor-led Course Description Get hands on instruction and practice administering Active Directory technologies in Windows Server 2012
More informationarcserve r16.5 Hybrid data protection
arcserve r16.5 Hybrid data protection Whether you re protecting the data center, remote offices or desktop resources, you need a solution that helps you meet today s demanding service-level agreements
More informationVirtustream Cloud and Managed Services Solutions for US State & Local Governments and Education
Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS
More informationPUT DATA PROTECTION WHERE YOU NEED IT
from Carbonite PUT DATA PROTECTION WHERE YOU NEED IT Flexibility is your best friend when it comes to choosing a backup plan. For a backup solution to be considered flexible, it needs to satisfy several
More informationWHITE PAPER SEPTEMBER VMWARE vsphere AND vsphere WITH OPERATIONS MANAGEMENT. Licensing, Pricing and Packaging
WHITE PAPER SEPTEMBER 2017 VMWARE vsphere AND vsphere WITH OPERATIONS MANAGEMENT Licensing, Pricing and Packaging Table of Contents Executive Summary 3 VMware vsphere with Operations Management Overview
More informationMicrosoft Configuring Advanced Windows Server 2012 Services
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20412 - Configuring Advanced Windows Server 2012 Services Length 5 days Price $4290.00 (inc GST) Version D Overview Get hands-on instruction and practice
More informationVembu Service Provider Program
Vembu Service Provider Program Built for CSPs, MSPs, HSPs and other Solution / Service Providers VEMBU TECHNOLOGIES PARTNERS Vembu Technologies Founded in 2002 10+ Years of Experience Headquartered in
More informationCloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel
Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel Legal Disclaimer Intel may make changes to specifications
More informationConfiguring Advanced Windows Server 2012 Services
Configuring Advanced Windows Server 2012 Services Course 20412D - Five days - Instructor-led - Hands-on Introduction Get hands-on instruction and practice configuring advanced Windows Server 2012, including
More informationManaging Your Privileged Identities: The Choke Point of Advanced Attacks
Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why
More informationhcloud Deployment Models
hcloud Deployment Models Drew Dietrich Director, Oracle Managed Cloud Services 1 The Safe Harbor The following is intended to outline our general product direction. It is intended for information purposes
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationENCRYPTION IN USE FACT AND FICTION. White Paper
White Paper Table of Contents The Case for Encryption... Encryption in Use Not Some Kind of Magic... Evaluating Encryption in Use Claims... 3 4 4 The Vaultive Approach... 5 2 Risk-conscious enterprises
More informationImplementing Microsoft Azure Infrastructure Solutions
Implementing Microsoft Azure Infrastructure Solutions OD20533C; On-Demand, Video-based Course Description This course is intended for IT professionals who are familiar with managing on-premises IT deployments
More information[MS20533]: Implementing Microsoft Azure Infrastructure Solutions
[MS20533]: Implementing Microsoft Azure Infrastructure Solutions Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Microsoft Products Delivery Method : Instructor-led (Classroom)
More informationRSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief
RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security
More informationVMware vcloud Air Accelerator Service
DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement
More informationMySQL Enterprise Security
MySQL Enterprise Security Mike Frank Product Management Director Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,
More informationThe Nasuni Security Model
White Paper Nasuni enterprise file services ensures unstructured data security and privacy, enabling IT organizations to safely leverage cloud storage while meeting stringent governance and compliance
More informationWhite Paper. Deploying CKMS Within a Business
White Paper Deploying CKMS Within a Business 1 Introduction The Cryptomathic Crypto Key Management System (CKMS) is a market-leading lifecycle key management product that can manage cryptographic keys
More informationHosted Azure for your business. Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution.
Hosted Azure for your business Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution. Azure is approximately 50 percent cheaper than other cloud services
More informationWhat you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered
What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged
More informationManaging and Auditing Organizational Migration to the Cloud TELASA SECURITY
Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting
More informationWindows Server The operating system
Windows Server 2019 The operating system that bridges onpremises and cloud By maximizing technology and infrastructure investments with Windows Server 2019, forward-facing businesses can capture direct
More informationTransform Availability
Transform Availability EMC Continuous Availability Advisory Services Presenter: 1 Agenda Introduction Why Continuous Availability? Customer Challenges EMC s Approach Service Description Delivery Timeline
More information"Charting the Course... MOC B Active Directory Services with Windows Server Course Summary
Description Course Summary Get Hands on instruction and practice administering Active Directory technologies in Windows Server 2012 and Windows Server 2012 R2 in this 5-day Microsoft Official Course. You
More informationDATACENTER AS A SERVICE. We unburden you at the level you desire
DATACENTER AS A SERVICE We unburden you at the level you desire MARKET TREND BY VARIOUS ANALYSTS The concept of flexible and scalable computing is a key reason to create a Cloud based architecture 77%
More informationTHE THALES SECURITY WORLD ARCHITECTURE
www.thalesesecurity.com THE THALES SECURITY WORLD ARCHITECTURE Optimizing Security and Operational Efficiency in nshield HSM Environments White Paper Executive Summary Today s security
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationPartner Center: Secure application model
Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including
More informationThe CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso
The CISO s Guide to Deploying True Password-less Security by Bojan Simic and Ed Amoroso TRUST ANYONE HYPR Deployment Overview for Managers HYPR is designed to eliminate credential stuffing, phishing and
More informationHCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY
PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF A SERVER OPTIMIZED FOR A HYBRID WORLD The HCX Server is a Windows Server pre-bundled with integrated core IT services designed for small and midsize
More informationWindows Server : Configuring Advanced Windows Server 2012 Services R2. Upcoming Dates. Course Description.
Windows Server 2012 20412: Configuring Advanced Windows Server 2012 Services R2 Gain the skills and knowledge necessary to perform advanced management and provisioning of services within Windows Server
More informationData Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public
Data Protection for Cisco HyperFlex with Veeam Availability Suite 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. Highlights Is Cisco compatible
More informationVMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager
VMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager 1 VMware By the Numbers Year Founded Employees R&D Engineers with Advanced Degrees Technology Partners Channel
More informationThis course prepares the student for Exam : Configuring Advanced Windows Server 2012 Services.
Course 20412A: 5 Days About this Course Course 20412A is part three of a three-course series that includes courses 20410A and 20411A. The series provides the skills and knowledge necessary to implement
More information