ibm pureapplication system encryption
Download
Skip this Video
Download Presentation
IBM PureApplication ™ System Encryption

Loading in 2 Seconds...

play fullscreen
1 / 13

IBM PureApplication ™ System Encryption - PowerPoint PPT Presentation


  • 149 Views
  • Uploaded on

IBM PureApplication ™ System Encryption. Today’s CIO’s Challenges:. Consolidate and Simplify the Infrastructure Cybersecurity Access Integrity Control Privacy-Consumer Data Protection Confidentiality Intellectual Property Protection Theft Prevention Compliance

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' IBM PureApplication ™ System Encryption' - von


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide2

Today’s CIO’s Challenges:

  • Consolidate and Simplify the Infrastructure
  • Cybersecurity
    • Access
    • Integrity
    • Control
  • Privacy-Consumer Data Protection
  • Confidentiality
    • Intellectual Property Protection
    • Theft Prevention
  • Compliance
    • Supporting a multitude of differing EU & North American Consumer Privacy, Financial and Healthcare Regulations
  • Private & Public Cloud Enablement
  • Foreign Government and/or Corporate Espionage
  • AND….Reduce Costs!!
costs of cybercrime
Costs of Cybercrime
  • From the Ponemon Institute
  • (conducts independent research on privacy, data protection and information security policy)
  • Interviews with 60 large U.S. Companies:
  • Average annualized cost of Cybercrime rose 26% in 2013 to $11.6 million per company
      • Loss or theft of information
      • Disruption of Business Operations
      • Revenue Loss
      • Destruction of property, plant and equipment
      • Detection, Investigation, Incident Response, Containment Recovery
  • Average 122 successful attacks per week, up 18% from 2012
  • Invest in Adequate Cybersecurity Resources
  • Monitor systems for early detection
  • “Many attacks are subtle, stealthy and probably will beat your system”

Solutions – Bringing Costs Down

slide4

Worldwide Regulatory Environment

No single standard for “what/how much to encrypt”

Best Practice:ENCRYPT ALL DATA!

customer environments
Customer Environments

Geographic Redundant Data Centers & Communications

  • Enterprise Characteristics
    • East / West or NY / Jersey (Financial Markets)
    • Real Time or Delayed Take-over depending on Cost Parameters
    • Multi-Nationals require Business Recovery
    • Fully Operational Facilities, not stand-by “cold” environments
  • SMB Characteristics
    • Meet HIPPA ex: Doctor’s Office
    • Solve Compliance Issue
    • Provide Secure Entry Level High Availability Solution

Redundant Equipment Configurations

  • Reduce Op-Ex via
    • Vendor Standardization
    • Repeatable Configuration
    • Deployment & Operational Guidelines
  • Remote Management from a single Control Center
  • High Data Availability via Data Replication (acceptable lag/transaction loss)
spx secureparser encryption pattern differentiators
SPx (SecureParser) Encryption Pattern Differentiators
  • SPx is an OEM IBM Part Number (D10N0LL), not an ISV third party solution
  • Provably Secure Data at Rest Protection
  • FIPs 140-2 Certified
      • AES 256; HIPPA and FISMA data compliance at start up
  • No External Key Management System
      • No additional Cost
      • No additional Personnel
      • Integrated with the PureApps Management System
  • Scales with the PureApps System
      • Software only
      • 2 clicks, 1 drag and drop to secure any directory
  • Virtually NO System Overhead Tax
      • <8% CPU utilization for encryption, randomization and authentication of the data (most software encryption solutions require up to 30% additional CPU utilization)
      • No additional storage requirement with SPx encryption
  • Enables Secure Multitenancy for Enterprise Environments
      • Consolidate and optimize the Infrastructure without compromising privacy and confidentiality
slide7

Encryption Solution Decision Maker Criteria

Decision Maker’s Criteria:

CIO : Regulatory i.e. SARBOX, HIPPA, Provably Secure CFO’s : Costs Cap-Ex & Op-Ex(3)

CTO’s : Meeting Internal Customer Requirements Operations: Solution Time to Operation & Complexity of Support

encryption feature comparison
Encryption Feature Comparison

IBM, NetApp and EMC

slide9

Case Study #1: Encryption Solution Pricing* for SAN (FCoE)

  • None of these comparisons account for any additional gap with respect to scalability e.g. additional competitive equipment due to scaling not accounted for.
  • Prices are MSRP
  • Pricing for Hardware and Software only. Does not include additional administrative and operational requirements for the NetApp and EMC solution.
ad