210 likes | 477 Views
Vormetric Data Security. Cloud Computing. Who is Vormetric?. Founded in 2001 Purpose: To Simplify Data Security Customers: 1100+ Customers Worldwide OEM Partners: IBM Guardium Data Encryption Symantec NetBackup MSEO. Data Security Simplified. Transparent
E N D
Vormetric Data Security Cloud Computing
Who is Vormetric? • Founded in 2001 • Purpose: • To Simplify Data Security • Customers: • 1100+ Customers Worldwide • OEM Partners: • IBM • Guardium Data Encryption • Symantec • NetBackup MSEO
Data Security Simplified • Transparent • Must be transparent to business processes, end users, and applications • Data type neutral – any data, anywhere • Efficient • SLA, User, and Application performance must remain acceptable • Encryption overhead can approach zero • Strong • Control Privileged Users access to sensitive data • Firewall your data – approved users and applications allowed, deny all others. • Integrated Key Management • Easy • Easy to Understand • Easy to Implement • Easy to Manage
Data is Everywhere Public Cloud (AWS, Rackspace, Smart Cloud, Savvis, Terremark) Virtual & Private Cloud (VMware, Citrix, Hyper-V) Unstructured Data File SystemsOffice documents, SharePoint, PDF, Images, Audio……etc… Business Application Systems (SAP, PeopleSoft, Oracle Financials, In-house, CRM, eComm/eBiz, etc.) Application Server Remote Locations& Systems Security & Other Systems (Event logs, Error logs Cache, Encryption keys, & other secrets) Security Systems Storage & Backup Systems SAN/NAS Backup Systems Data Communications VoIP SystemsFTP/Dropbox ServerEmail Servers Structured Database Systems (SQL, Oracle, DB2, Informix, MySQL) Database Server
Advanced Persistent Threat Reducing the Threat Landscape • A Defense in Depth Strategy is essential to combating APT • Controls and Safeguards are intended to combat the APT at different points in its life cycle • The goal is the APT is to gain access to you most valued possession, you data • APT’s are already at work on your network. The Data must be protected locally, at the point of access • Protect what Matters Image from Secureworks.com
Transitioning to the Cloud Database Encryption Cloud Encryption Unstructured Data Encryption • Usage: Encrypt Tablespace, Log, and other DB files • Common Databases: Oracle, MSSQL, DB2, Sybase, Informix, MySQL… • Usage: Encrypt and Control access to any type of data used by LUW server • Common Data Types: Logs, Reports, Images, ETL, Audio/Video Recordings, Documents, Big Data… • Examples:FileNet, Documentum, Nice, Hadoop, Home Grown, etc… • Usage: Encrypt and Control Access to data used by Cloud Instances • Common Cloud Providers: Amazon EC2, Rackspace, MS Azure, Savvis, Terremark AT&T, SoftLayer +++
Vormetric Data Security • What is it? • Integrated solution that controls access to data… • What does it do? • Controls what users and processes can access data • Enforces access controls with encryption of any type of data transparently • Provide security intelligence around your data
Transitioning to the Cloud Data Encryption Security Intelligence Data Firewall • Encrypts file system and volume data transparently to: • Applications • Databases • Storage Infrastructure • Integrated Key Management • High Efficiency Encryption • Need to know access to data, based on approved behavior. • Separate data access from data management for system privileged users • Rich event driven audit logs for approved and denied attempts to sensitive data • Multiple reporting options to enable actionable security intelligence • More than just audit reports – prove data is protected
Locking down the CSP Admin Policy ≈ Firewall Rules Rules have Criteria and Effects Criteria • User/Group, Process, Data Location, Type of I/O, Time Effects • Permission: Permit or Deny • Encryption Key: Yes or No • Audit: Yes or No The Rules of a policy work like a firewall rule engine • Receive criteria from request. • Try to match Criteria to Rules. Start at the top. • On first match apply the associated Effect. • If no match, then deny
Vormetric Data Security : Single Pane of Glass Traditional Infrastructure Cloud Computing AWS, RacSpace, Saavis… Data Security Manager Unstructured Unstructured VormetricVault Database Database
Vormetric Data Security : Single Pane of Glass Traditional Infrastructure Cloud Computing AWS, RacSpace, Saavis… Data Security Manager Unstructured Unstructured VormetricVault Database Database
Vormetric Data Security Product Suite • Vormetric Encryption • Purpose: Transparent Data Encryption and Access Control of structured and unstructured data • Use Cases: Database Encryption, File Encryption, Privileged User Data Management • Vormetric Key Management • Purpose: Key Management for other Encryption platforms • Use Cases: Application Encryption, TDE Key Management • Vormetric Vault • Purpose: Securely store and report on Security Materials • Use Cases: Key Vaulting, Certificate Vaulting, Vaulting of other Security materials. • Vormetric Toolkit • Purpose: Automate and accelerate deployment • Use Cases: Cloud Providers, Enterprise Deployments
Technical Benefits • Transparent • No changes required to Database, Application or Storage • Data type neutral – any data type • Efficient • SLA, User, and Application performance are maintained • Encryption overhead is minimal • Rapid Deployment • Strong • System privileged users can be restricted from accessing sensitive data • Firewall your data – approved users and applications allowed, deny all others. • Integrated Key Management • Easy • Easy to Understand • Easy to Implement • Easy to Manage
Vormetric Data Security Protect what matters Jeff Sherman Regional Sales Manager Bill Goodman Sales Engineer