1 / 11

Vormetric Encryption Architecture Overview

This is an excerpt of Vormetric’s Encryption Architecture Overview Whitepaper: Protecting Enterprise Data at Rest with Encryption, Access Controls and Auditing More on subject : www.vormetric.com/datasecurity82 This Vormetric whitepaper discusses data security threats and related incidents, such as security breaches, which can be harmful to any organization operating online. It then goes on to explain the real risks to the enterprise data and how to make encryption successful. The whitepaper also discusses Vormetric encryption, which is a comprehensive solution for key management and encryption of data at rest. The whitepaper on Vormetric Encryption Architecture consists of brief introduction to two most important components of Vormetric Encryption i.e., Data Security Manager and Encryption Expert Agents. According to whitepaper, some of the advantages of using Vormetric Encryption solution are: • Encryption and Access Controls • Transparent Implementation • High Performance • Centralized Key and Policy Management • Strong Separation of Duties • Role-Based Administration and Domains • Scalability • Distributed IT Environments • High Availability • Fine-Grained Auditing

TinaStewart
Download Presentation

Vormetric Encryption Architecture Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls, and Auditing

  2. Data is Your Business ! Data security breaches are harmfulto any organization of any size.

  3. People Devices Servers Servers People 34% 35% 94% 2012 DATA BREACH INVESTIGATION REPORTA study conducted by the Verizon RISK Team with cooperation from global policing agencies. Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

  4. Protect private and confidential info. Global Compliance • PCI DSS • HITECH Act • UK Data Protection Act • South Korea’s PIPA • And more … Server Defense-in-Depth Controls Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

  5. Data is Everywhere Business Application Systems (SAP, PeopleSoft, Oracle Financials, In-house, CRM, eComm/eBiz, etc.) Application Server Unstructured data File SystemsOffice documents, PDF, Vision, Audio & other Fax/Print Servers File Servers Security & Other Systems (Event logs, Error logs Cache, Encryption keys, & other secrets) Security Systems Remote locations & systems Structured data Database Systems (SQL, Oracle, DB2, Informix, MySQL) Database Server Storage & Backup Systems SAN/NASBackup Systems Data Communications VoIP SystemsFTP/Dropbox ServerEmail Servers ! Data exists in different formats, states, and locations. Traditional Controls are not designed to secure it. Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

  6. Data Security Simplified • Strong Transparent Must be transparent to business processes, end users, and applications • Privileged users should not have access to sensitive data • Firewall your data – approved users and applications allowed, deny all others. • Data type neutral – any data, anywhere • Efficient Easy • SLA, User, and Application performance must remain acceptable • Easy to Understand • Easy to Implement • Easy to Manage • Encryption overhead can approach zero Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

  7. Vormetric Data Security Vormetric Encryption Vormetric Key Management Encryption Agent Key Agent Data Security Manager Oracle 11gR2 TDE Unstructured Encryption Agent Key Agent VormetricKey Vault SQL Server 2008 / 2012 TDE Database Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

  8. Vormetric Encryption Architecture Users Application Policy is used to restrict access to sensitive data by user and process information provided by the OS. Database OS FS Agent SSL/TLS File System SAN, NAS, DAS Storage Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

  9. Protect Server Data Log Files Password files Config files Archive Payment Custom Apps ERP CRM CMS Log Files Password files Config Files Archive WebLogic IIS APACHE Data Files Transaction Logs Exports Backup SQL MySQL Sybase DB2 Oracle File Share Archive Content Multi Needs FTP Servers File Servers Email Servers Others VM SAN NAS DAS CLOUD Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

  10. We Secure The Data That Runs Your Business Download Whitepaper

  11. Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls, and Auditing

More Related