SafeNet ProtectApp APPLICATION-LEVEL ENCRYPTION

Similar documents
Unstructured Data. Stored & Archived Data. Customers + Partners

Protect Your Sensitive Data A Step-by-Step Guide to Finding the Right SafeNet Data Protection Solution for Your Organization

Encrypt Everything. How to unshare and secure your sensitive data wherever it resides SAFENET-INC.COM

Use Cases Oriented Portfolio. Marko Bobinac PreSales Engineer, Identity & Data Protection

LEARN HOW TO SECURE THE BREACH! SECURE THE BREACH: BREACH PREVENTION DOES NOT WORK A THREE-STEP APPROACH TO BOOST DATA PROTECTION

Why Gemalto with F5. Trust. Every day. Matija Mandarić, Presales Engineer, Veracomp. February 2017

Bull Trustway DataProtect. Securing your end to end infrastructure with unified encryption

VMware, SQL Server and Encrypting Private Data Townsend Security

WHITE PAPER Complying with the Payment Card Industry Data Security Standard

VMware, SQL Server and Encrypting Private Data Townsend Security

Vormetric Data Security

Adding value to your MS customers

How CloudEndure Disaster Recovery Works

How CloudEndure Works

Hyperion System 9 Strategic Finance release

Virtual KeySecure for AWS

IBM Tivoli Directory Server

How CloudEndure Works

Who s Protecting Your Keys? August 2018

ProtectV StartGuard. FIPS Level 1 Non-Proprietary Security Policy

How CloudEndure Disaster Recovery Works

Enabling Fast Recovery of Your Virtual Environments: NetBackup, Backup Exec & VCS for VMware

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

Oracle Database 11g: Security Release 2

Randtronics Data Privacy Manager

SYMANTEC DATA CENTER SECURITY

Hyperion System 9 Financial Management release

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

Centrify Infrastructure Services

Vormetric Data Security Platform

Oracle Database 11g: Security Release 2

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Key Drivers for Data Security

Alliance Key Manager A Solution Brief for Technical Implementers

Virtual Machine Encryption Security & Compliance in the Cloud

PCI DSS Compliance. White Paper Parallels Remote Application Server

CloudHSM Deep-Dive. Dave Walker Specialised Solutions Architect Security/Compliance Amazon Web Services UK Ltd

Vormetric Data Security Platform

TRANSPARENT ENCRYPTION ARCHITECTURE

Axway Validation Authority Suite

Vormetric Data Security Platform

SQL Server SQL Server 2008 and 2008 R2. SQL Server SQL Server 2014 Currently supporting all versions July 9, 2019 July 9, 2024

Centrify Server Suite, Standard Edition

Vaultive and SafeNet KeySecure KMIP Integration Guide v1.0. September 2016

Comprehensive Agentless Cloud Backup and Recovery for the Enterprise

Deliver Data Protection Services that Boost Revenues and Margins

Oracle Advanced Security Transparent Data Encryption (TDE)

Encrypting Critical Data In Databases. An Overview of the Database Integration Process

White Paper. Deploying CKMS Within a Business

MySQL Enterprise Security

Dyadic Security Enterprise Key Management

Thales e-security. Security Solutions. PosAm, 06th of May 2015 Robert Rüttgen

Hyperion System 9 BI+ Analytic Services

Protecting Your Data in AWS. 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Veritas NetBackup 6.5 Clients and Agents

You Might Know Us As. Copyright 2016 TierPoint, LLC. All rights reserved.

Sensitive Data and Key Management for DBAs

Supported OS, Application Servers, and Databases Guide

Example Architectures for Data Security and the GDPR

Vormetric Data Security Platform

CimTrak Product Brief. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

Total Content Integrator Support Matrix Updated: January 8, 2016

Key Management in a System z Enterprise

McAfee Database Security

Migration and Building of Data Centers in IBM SoftLayer

Example Architectures for Data Security and the GDPR

The Nasuni Security Model

Encryption In The Enterprise

Data Protector 10.x Express Support Matrix

Rocket UniData. Deliver Fast, Flexible, and Secure Applications with Low Overhead

Vormetric Data Security Platform

Alliance Key Manager A Solution Brief for Partners & Integrators

Getting Started with Intellicus. Version: 16.0

WHITEPAPER. MemSQL Enterprise Feature List

Top 40 Cloud Computing Interview Questions

EBOOK The General Data Protection Regulation. What is it? Why was it created? How can organisations prepare for it?

InstallAnywhere: Requirements

Reducing PCI Compliance Costs and Effort with SafeNet Transparent Tokenization

VORMETRIC TRANSPARENT ENCRYPTION ARCHITECTURE

THALES esecurity: SECURING YOUR DIGITAL TRANSFORMATION

The following table shows supported platforms for servers running CA Clarity PPM server software (application and background servers).

IZO MANAGED CLOUD FOR AZURE

EMC CUSTOMER UPDATE. 12 juni 2012 Fort Voordorp. WHAT S NEW IN EMC AVAMAR 6.1 Arjo de Bruin. Copyright 2012 EMC Corporation. All rights reserved.

Offers easy management of all protected devices and data through a unified secure touchfriendly web-based management console.

Hybrid Cloud Data Protection & Storage

Netwrix Auditor. Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer

Arcserve Unified Data Protection: Enterprise power, small team simple

DOCAVE ONLINE. Your Cloud. Our SaaS. A Powerful Combination. Online Services. Technical Overview ADMINISTRATION BACKUP & RESTORE

Data Protector 10.0x Platform and Integration Support Matrix

Simple Data Protection for the Cloud Era

Watson Developer Cloud Security Overview

When (and how) to move applications from VMware to Cisco Metacloud

Data Protector 10.x Platform and Integration Support Matrix

Getting Started With Intellicus. Version: 7.3

Data Protector 10.x Platform and Integration Support Matrix

Data Encryption with ServiceNow

Compatibility matrix: HP Service Manager Software version 7.00

<Insert Picture Here> Value of TimesTen Oracle TimesTen Product Overview

Cisco Integration Platform

HP Data Protector 8.00 Platform and Integration Support Matrix

Transcription:

SafeNet ProtectApp APPLICATION-LEVEL ENCRYPTION Encrypt application data and keep it secure across its entire lifecycle no matter where it is transferred, backed up, or copied Rich application encryption and flexible key management interfaces Broad standard and interface support, including web services Easy deployment and management, including built-in key rotation and data re-keying Built-in health checking and multi-tier load balancing Secure authentication, granular authorization, and detailed logging and auditing Large and growing ecosystem Integrates with SafeNet KeySecure to provide: Centralized administration of application encryption policy and keys Ability to offload cryptographic processing to KeySecure for improved performance Deployment Options On-premises Cloud/Virtual SUPPORTED PLATFORMS Web Application Servers Apache Tomcat IBM WebSphere IBM AS/400 Jboss Microsoft IIS Oracle WebLogic SAP NetWeaver Sun ONE And more Cloud/Virtual Infrastructures All public cloud and virtual environments, including Amazon Web Services, Microsoft Azure, and VMware Development Libraries/APIs Java, C/C++,.NET XML open interface, KMIP standard Web services, including SOAP and REST Certificates X509, PKCS1, PKCS8, PKCS12 Export, Import, Monitor

Application Level Encryption Application Server Database Server SafeNet ProtectApp SafeNet KeySecure

SafeNet ProtectApp: Common Use Cases Protect personally identifiable information Protect data in the cloud Meet compliance and regulatory mandates Secure intellectual property Deploy a KMIP-enabled key management solution

SafeNet ProtectDB COLUMN-LEVEL DATABASE ENCRYPTION Deployment Options On-premises Cloud/Virtual Encrypt column-level data in databases transparently in multi-vendor database management systems Define granular access controls by role, user, time of day, and other variables Prevent database administrators (DBAs) from impersonating users with access to sensitive data Increase security of sensitive data with seamless, built-in key rotation and data re-keying Secure communication, logging, and auditing Multi-site support with built-in load balancer Integrates with SafeNet KeySecure to provide: Centralized key and policy management Segregation of data and keys Strong separation of duties Ability to meet compliance mandates SUPPORTED PLATFORMS Databases Oracle Microsoft SQL Server IBM DB2 Operating Systems Microsoft Windows Linux Solaris HP-UX AIX IBM i/os Cloud/Virtual Infrastructures All public cloud and virtual environments, including Amazon Web Services, Microsoft Azure, and VMware

Transparent Database Encryption Application Server Database Server SafeNet ProtectDB SafeNet KeySecure

SafeNet ProtectDB: Common Use Cases Secure financial data Meet compliance and regulatory mandates, specifically PCI DSS Protect data in the cloud Protect personally identifiable information

SafeNet ProtectFile FILE AND FOLDER ENCRYPTION Transparent, comprehensive encryption for file shares and network drives (DAS, NAS and SAN) Granular access controls to ensure only authorized users or processes can view protected data Prevent rogue administrators from impersonating users with access to sensitive data Easy and automated deployment in large environments Comprehensive logging and auditing capabilities Deep and shallow key rotation FIPS 140-2 strength AES algorithms Integrates with SafeNet KeySecure to provide: Centralized key and policy management Segregation of data and keys Strong separation of duties Ability to meet compliance mandates Deployment Options On-premises Cloud/Virtual SUPPORTED PLATFORMS Operating Systems Microsoft Windows Linux: Oracle, Red Hat Enterprise Linux, SUSE, Ubuntu, AIX, Centos Databases Oracle mongodb Cassandra IBM DB2 Microsoft: SQL Server, SharePoint MySQL PostgreSQL Cloud/Virtual Infrastructures All public cloud and virtual environments, including Amazon Web Services, Microsoft Azure, and VMware Big Data Apache Hadoop IBM InfoSphere BigInsights Other Cloud Management: Chef Containers: Docker

File System-level Encryption Applications File Server (On premises/virtual/cloud) SafeNet ProtectFile SafeNet KeySecure

ProtectFile Ecosystem Snippet DATABASE ENCRYPTION CLOUD ENCRYPTION BIG DATA ENCRYPTION Supports all public clouds CLOUD MANAGEMENT TOOLS DOCKER CONTAINERS CRYPTOGRAPHIC OPERATIONS Encryption Decryption Key Rotation ACCESS CONTROL No access Encrypt Decrypt Backup Restore Superuser impersonation

SafeNet ProtectFile: Common Use Cases Protect personally identifiable information Protect data in the cloud Enable separation of duties Segregate departmental data on servers Secure big data implementations Protection of data in SQL/NoSQL databases, mongodb, and Cassandra

SafeNet Tokenization APPLICATION-LEVEL TOKENIZATION Protect high value information by replacing it with a surrogate value, or token, that preserves the length and format of the data No changes necessary to applications, databases, or legacy systems Unlimited data type support Broad token format support, including regular expressions and customized formats Granular access controls ensure only authenticated users or systems can view protected tokens and data Integrates with SafeNet KeySecure to provide: Single, centralized interface for logging, auditing, and reporting access to protected data, keys, and tokens Token Vault Databases Microsoft SQL Server MySQL Oracle Cassandra Application Servers IBM SAP Bea Apache Sun Oracle Java JBoss And more Deployment Options On-premises Cloud/Virtual SUPPORTED PLATFORMS APIs Java.NET Web Services (SOAP, REST/JSON)

Token Handling Token generation: Plaintext (sensitive information) is sent by application with request for tokenization Token Managers Keyed hash is generated using hash key on KS If hash exists: Corresponding token is returned. If no hash exists: Token is generated Value is encrypted Token, cipher text, and hash are written to the token vault Token Vault Protected Zone KeySecure Lookup on hash is performed AES 256 Versioned key De-tokenization: Token is sent by application with request for plaintext value (Get Token) Token is looked up Corresponding ciphertext is decrypted and sent back to the application

SafeNet Tokenization: Common Use Cases Protect personally identifiable information Protect data in the cloud Meet compliance and regulatory mandates, specifically PCI DSS Secure financial data Secure big data implementations Prevent exposure of sensitive data in production databases to nonproduction environments (testing, development, staging, research, etc.)

SafeNet ProtectV ENCRYPTION OF ENTIRE VIRTUAL MACHINE Ensure secure virtualization and cloud migration by encrypting the entire virtual machine, including associated storage volumes (mapped drives), instances (snapshots and backups), and partitions (system/os, data) Deployment Options Cloud/Virtual SUPPORTED PLATFORMS Public/Private Cloud Amazon Web Services Microsoft Azure VMware IBM Softlayer Cloud Maintain ownership and control of data and encryption keys at all times Authorize virtual machine instance launches with ProtectV StartGuard Track and report on key access to all copies of your data Revoke key access in case of a breach Integrates with SafeNet KeySecure to provide: Single, centralized interface for logging, auditing, and reporting access to protected data and keys

SafeNet ProtectV Virtual Machine Encryption SafeNet KeySecure On-premises or Virtual SafeNet ProtectV Manager Virtual SafeNet ProtectV Client Virtual Protected Volumes TLS* TLS Secure Channel Protected Volumes Hypervisor Centralized key management Centralized discovery and management Crypto and pre-boot services *Transport Layer Security

ProtectV: Common Use Cases Enable secure cloud migration Meet compliance and regulatory mandates Enable separation of duties between cloud service provider, storage, security and other administrators Protect data against lawful seizure Support for hybrid cloud environments

Native Database TDE Transparent Database Encryption 04.01.2015

Oracle/SQL Server TDE Application Server Database Server TDE KeySecure Transparent Tablespace / column encryption SafeNet enhancements: Moves master keys into KeySecure, key migration, audit trail

Thank you! Insert Your Name Insert Your Title Insert Date