Presentation is loading. Please wait.

Presentation is loading. Please wait.

Vormetric Data Security Cloud Computing. Who is Vormetric? Founded in 2001 Purpose: To Simplify Data Security Customers: 1100+ Customers Worldwide OEM.

Similar presentations


Presentation on theme: "Vormetric Data Security Cloud Computing. Who is Vormetric? Founded in 2001 Purpose: To Simplify Data Security Customers: 1100+ Customers Worldwide OEM."— Presentation transcript:

1 Vormetric Data Security Cloud Computing

2 Who is Vormetric? Founded in 2001 Purpose: To Simplify Data Security Customers: Customers Worldwide OEM Partners: IBM Guardium Data Encryption Symantec NetBackup MSEO

3 Vormetric Customers Financial Services Consumer BrandsTechnology Healthcare Government & Technology Energy Travel & Hospitality S. Korea

4 Data Security Simplified Transparent Must be transparent to business processes, end users, and applications Data type neutral – any data, anywhere Efficient SLA, User, and Application performance must remain acceptable Encryption overhead can approach zero Strong Control Privileged Users access to sensitive data Firewall your data – approved users and applications allowed, deny all others. Integrated Key Management Easy Easy to Understand Easy to Implement Easy to Manage

5 Business Application Systems (SAP, PeopleSoft, Oracle Financials, In-house, CRM, eComm/eBiz, etc.) Application Server Remote Locations & Systems Storage & Backup Systems SAN/NAS Backup Systems Data Communications VoIP Systems FTP/Dropbox Server Servers Structured Database Systems (SQL, Oracle, DB2, Informix, MySQL) Database Server Security & Other Systems (Event logs, Error logs Cache, Encryption keys, & other secrets) Security Systems Unstructured Data File Systems Office documents, SharePoint, PDF, Images, Audio……etc… Public Cloud ( AWS, Rackspace, Smart Cloud, Savvis, Terremark) Virtual & Private Cloud ( VMware, Citrix, Hyper-V) Data is Everywhere

6 Advanced Persistent Threat  A Defense in Depth Strategy is essential to combating APT  Controls and Safeguards are intended to combat the APT at different points in its life cycle  The goal is the APT is to gain access to you most valued possession, you data  APT’s are already at work on your network. The Data must be protected locally, at the point of access  Protect what Matters Image from Secureworks.com Reducing the Threat Landscape

7 Control and Defend Audit Security Management Domains Privileged User Access Control Separation of Roles & Need to Know Key Management Encryption Data Assets

8 Database EncryptionUnstructured Data Encryption Cloud Encryption Usage: Encrypt Tablespace, Log, and other DB files Common Databases: Oracle, MSSQL, DB2, Sybase, Informix, MySQL… Usage: Encrypt and Control access to any type of data used by LUW server Common Data Types: Logs, Reports, Images, ETL, Audio/Video Recordings, Documents, Big Data… Examples: FileNet, Documentum, Nice, Hadoop, Home Grown, etc… Usage: Encrypt and Control Access to data used by Cloud Instances Common Cloud Providers: Amazon EC2, Rackspace, MS Azure, Savvis, Terremark AT&T, SoftLayer +++ Transitioning to the Cloud

9 Vormetric Data Security What is it? Integrated solution that controls access to data… What does it do? Controls what users and processes can access data Enforces access controls with encryption of any type of data transparently Provide security intelligence around your data Data Integrated Key Management Transparent Encryption Data Firewall Security Intelligence

10 Data EncryptionData FirewallSecurity Intelligence Encrypts file system and volume data transparently to: Applications Databases Storage Infrastructure Integrated Key Management High Efficiency Encryption Need to know access to data, based on approved behavior. Separate data access from data management for system privileged users Rich event driven audit logs for approved and denied attempts to sensitive data Multiple reporting options to enable actionable security intelligence More than just audit reports – prove data is protected Transitioning to the Cloud

11 Locking down the CSP Admin Policy ≈ Firewall Rules Rules have Criteria and Effects Criteria User/Group, Process, Data Location, Type of I/O, Time Effects Permission: Permit or Deny Encryption Key: Yes or No Audit: Yes or No The Rules of a policy work like a firewall rule engine 1.Receive criteria from request. 2.Try to match Criteria to Rules. Start at the top. 3.On first match apply the associated Effect. 4.If no match, then deny

12 Locking Down the CSP Admin

13

14 Vormetric Data Security : Single Pane of Glass Data Security Manager Database Unstructured Database Unstructured Traditional Infrastructure Vormetric Vault Cloud Computing AWS, RacSpace, Saavis… Cloud Computing AWS, RacSpace, Saavis…

15 Vormetric Data Security : Single Pane of Glass Data Security Manager Database Unstructured Database Unstructured Traditional Infrastructure Vormetric Vault Cloud Computing AWS, RacSpace, Saavis… Cloud Computing AWS, RacSpace, Saavis…

16 Vormetric Data Security Product Suite Vormetric Encryption Purpose: Transparent Data Encryption and Access Control of structured and unstructured data Use Cases: Database Encryption, File Encryption, Privileged User Data Management Vormetric Key Management Purpose: Key Management for other Encryption platforms Use Cases: Application Encryption, TDE Key Management Vormetric Vault Purpose: Securely store and report on Security Materials Use Cases: Key Vaulting, Certificate Vaulting, Vaulting of other Security materials. Vormetric Toolkit Purpose: Automate and accelerate deployment Use Cases: Cloud Providers, Enterprise Deployments

17 Technical Benefits Transparent No changes required to Database, Application or Storage Data type neutral – any data type Efficient SLA, User, and Application performance are maintained Encryption overhead is minimal Rapid Deployment Strong System privileged users can be restricted from accessing sensitive data Firewall your data – approved users and applications allowed, deny all others. Integrated Key Management Easy Easy to Understand Easy to Implement Easy to Manage

18 Vormetric Data Security Protect what matters Jeff Sherman Regional Sales Manager Bill Goodman Sales Engineer


Download ppt "Vormetric Data Security Cloud Computing. Who is Vormetric? Founded in 2001 Purpose: To Simplify Data Security Customers: 1100+ Customers Worldwide OEM."

Similar presentations


Ads by Google