Presentation is loading. Please wait.

Presentation is loading. Please wait.

Vormetric Data Security

Similar presentations


Presentation on theme: "Vormetric Data Security"— Presentation transcript:

1 Vormetric Data Security
Cloud Computing

2 Who is Vormetric? Founded in 2001 Purpose: Customers: OEM Partners:
To Simplify Data Security Customers: 1100+ Customers Worldwide OEM Partners: IBM Guardium Data Encryption Symantec NetBackup MSEO

3 Government & Technology
Vormetric, Inc. Vormetric Customers Financial Services Consumer Brands Technology Healthcare S. Korea Travel & Hospitality Government & Technology Energy Proprietary & Confidential. All Rights Reserved

4 Data Security Simplified
Vormetric, Inc. Data Security Simplified Transparent Must be transparent to business processes, end users, and applications Data type neutral – any data, anywhere Strong Control Privileged Users access to sensitive data Firewall your data – approved users and applications allowed, deny all others. Integrated Key Management Vormetric believes that “Data Security must be Simplified” It must be transparent, strong, efficient, and easy. If any of those 4 characteristics are missing then simplification fails. Transparent – Data Security can not disrupt how business is run to be adoptable. Strong – Data Security Efficient SLA, User, and Application performance must remain acceptable Encryption overhead can approach zero Easy Easy to Understand Easy to Implement Easy to Manage Proprietary & Confidential. All Rights Reserved

5 Data is Everywhere Public Cloud
Unstructured Data File Systems Office documents, SharePoint, PDF, Images, Audio……etc… Public Cloud (AWS, Rackspace, Smart Cloud, Savvis, Terremark) Virtual & Private Cloud (VMware, Citrix, Hyper-V) Remote Locations & Systems Business Application Systems (SAP, PeopleSoft, Oracle Financials, In-house, CRM, eComm/eBiz, etc.) Application Server Security & Other Systems (Event logs, Error logs Cache, Encryption keys, & other secrets) Security Systems Data exists in different formats, states, and locations, including unstructured file systems, structured database systems, and physical, public, private and virtual cloud environments. A comprehensive data security strategy is needed to protect sensitive data and meet industry compliance requirements including: The Hippa HITECH Act, UK Data Protection Act, South Korea’s and Taiwan’s Personal Information Protection Act, PCI DSS Storage & Backup Systems SAN/NAS Backup Systems Data Communications VoIP Systems FTP/Dropbox Server Servers Structured Database Systems (SQL, Oracle, DB2, Informix, MySQL) Database Server

6 Advanced Persistent Threat
Reducing the Threat Landscape A Defense in Depth Strategy is essential to combating APT Controls and Safeguards are intended to combat the APT at different points in its life cycle The goal is the APT is to gain access to you most valued possession, you data APT’s are already at work on your network. The Data must be protected locally, at the point of access Protect what Matters Image from Secureworks.com

7 Control and Defend Audit Security Management Domains
Privileged User Access Control Separation of Roles & Need to Know Key Management Encryption Data Assets

8 Unstructured Data Encryption
Transitioning to the Cloud Database Encryption Unstructured Data Encryption Cloud Encryption Usage: Encrypt Tablespace, Log, and other DB files Common Databases: Oracle, MSSQL, DB2, Sybase, Informix, MySQL… Usage: Encrypt and Control access to any type of data used by LUW server Common Data Types: Logs, Reports, Images, ETL, Audio/Video Recordings, Documents, Big Data… Examples: FileNet, Documentum, Nice, Hadoop, Home Grown, etc… Usage: Encrypt and Control Access to data used by Cloud Instances Common Cloud Providers: Amazon EC2, Rackspace, MS Azure, Savvis, Terremark AT&T, SoftLayer +++

9 Vormetric Data Security
What is it? Integrated solution that controls access to data… What does it do? Controls what users and processes can access data Enforces access controls with encryption of any type of data transparently Provide security intelligence around your data Data Integrated Key Management Transparent Encryption Data Firewall Security Intelligence

10 Security Intelligence
Transitioning to the Cloud Data Encryption Data Firewall Security Intelligence Encrypts file system and volume data transparently to: Applications Databases Storage Infrastructure Integrated Key Management High Efficiency Encryption Need to know access to data, based on approved behavior. Separate data access from data management for system privileged users Rich event driven audit logs for approved and denied attempts to sensitive data Multiple reporting options to enable actionable security intelligence More than just audit reports – prove data is protected

11 Locking down the CSP Admin
Policy ≈ Firewall Rules Rules have Criteria and Effects Criteria User/Group, Process, Data Location, Type of I/O, Time Effects Permission: Permit or Deny Encryption Key: Yes or No Audit: Yes or No The Rules of a policy work like a firewall rule engine Receive criteria from request. Try to match Criteria to Rules. Start at the top. On first match apply the associated Effect. If no match, then deny

12 Locking Down the CSP Admin

13

14 Vormetric Data Security : Single Pane of Glass
Traditional Infrastructure Cloud Computing AWS, RacSpace, Saavis… Data Security Manager Unstructured Unstructured Vormetric Vault Database Database

15 Vormetric Data Security : Single Pane of Glass
Traditional Infrastructure Cloud Computing AWS, RacSpace, Saavis… Data Security Manager Unstructured Unstructured Vormetric Vault Database Database

16 Vormetric Data Security Product Suite
Vormetric Encryption Purpose: Transparent Data Encryption and Access Control of structured and unstructured data Use Cases: Database Encryption, File Encryption, Privileged User Data Management Vormetric Vault Purpose: Securely store and report on Security Materials Use Cases: Key Vaulting, Certificate Vaulting, Vaulting of other Security materials. Vormetric Key Management Purpose: Key Management for other Encryption platforms Use Cases: Application Encryption, TDE Key Management Vormetric Toolkit Purpose: Automate and accelerate deployment Use Cases: Cloud Providers, Enterprise Deployments

17 Technical Benefits Transparent Strong Efficient Easy
Vormetric, Inc. Technical Benefits Transparent No changes required to Database, Application or Storage Data type neutral – any data type Strong System privileged users can be restricted from accessing sensitive data Firewall your data – approved users and applications allowed, deny all others. Integrated Key Management Vormetric believes that “Data Security must be Simplified” It must be transparent, strong, efficient, and easy. If any of those 4 characteristics are missing then simplification fails. Transparent – Data Security can not disrupt how business is run to be adoptable. Strong – Data Security Efficient SLA, User, and Application performance are maintained Encryption overhead is minimal Rapid Deployment Easy Easy to Understand Easy to Implement Easy to Manage Proprietary & Confidential. All Rights Reserved

18 Vormetric Data Security
Protect what matters Jeff Sherman Regional Sales Manager Bill Goodman Sales Engineer


Download ppt "Vormetric Data Security"

Similar presentations


Ads by Google