А теперь рассмотрим преимущества и масштабы экономии достигнутые благодаря DataSecure – «сердца»всех решений шифрования и управления данными.
In order to maintain ownership and control of your sensitive information throughout its lifecycle – SafeNet provides a centralized platform to define and syndication protection policies by data type, by location, by role, and even by time of day. No you can enforce who and what has access to which information when and where.We are able to offer this control by leveraging standards like FIPS and KMIP for encryption and lifecycle key management with government grade security.Next, having visibility into how your policies are controlling your sensitive information means make continuous refinement for compliance and for growth as you adapt to the ever changing business environment.And finally, applying a persistent protection for your sensitive data enables you the flexibility to extend protection beyond your data centers and endpoints into the cloud – driving further flexibility to manage costs, efficiencies and productivity.
Personal Identifiable InformationTax IDs and SSNsHealth recordsPayment Numbers and TransactionsCredit card numbersAccount numbersIntellectual PropertyDocumentsDesignsImagesResearchFormulasNon-public Information = any corporate information that would be subject to insider trading such as unpublished financial results
DataSecure предоставляет управление ключами на протяжении всего жизненного цикла, что подразумевает генерацию, замену при уничтожении для всех типов затронутых данных, включая неоднородные базы данных, приложения и файлы. Принятые политики безопасности определены ролью навязанной системой менеджмента ключами и разделенными обязанностями, необходимыми для наилучшей защиты поддерживаемых полномочий. Примечание: Поддержка хранилищ данных сейчас осуществляется через сторонних партнеров, таких как Unisys, SecurutyFirstи, конечно, HP.
No single admin can compromise the systemM of N – multiple credentialSplit knowledge & dual controlMaybe use the diagram from Key Man WP
Data Center protection focuses on the data stored and accessed from databases, applications and file servers enforcing protection with corporate driven policies and access controls managed with DataSecure and the suite of ProtectDB, ProtectApp, ProtectFile…
Heterogeneous Database EncryptionCentralized access control and encryption for Oracle, Microsoft SQL Server, IBM DB2 and TeradataGranular ProtectionProtect an entire database or specific columns within the database in order to streamline transparent performanceProven AlgorithmsAchieve the highest level of database security by using proven cryptographic algorithms such as 3DES, DES and AESBroad Platform SupportOffering centralized control across databases on Microsoft Windows, Linux, Solaris, HP-UX, AIX, or IBM z/OS environmentsSupport native encryption for key storage/manangement
Heterogeneous Application EncryptionCentralized access control and encryption for data in the application layer of solutions like ERP, HR and CRM (Note – could require SI assistance with application customization experience)Granular ProtectionDefine thresholds of operation for privileged users in order to safeguard against malicious or negligent threatsProven AlgorithmsAchieve the highest level of application security by using proven cryptographic algorithms such as 3DES, DES, AES,RSA (signatures and encryption), RC4, SHA-I, SHA-2Broad Platform SupportOffering centralized control for web and application servers from Oracle, IBM, BEA, IIS, Apache, Sun ONE, JBoss, SAP and platforms such as Microsoft Windows, Linux, and IBM z/OS
Flexible usesSafeNetProtectZ software can be called from any programming language that follows IBM OS standards. The calling application can encrypt or decrypt any information and return it to the appropriate storage device. In addition to protecting production applications, you can use ProtectZ to facilitate testing of new applications, new software releases, or simply to improve data throughput.Efficient encryptionDataSecure can help move large amounts of sensitive data in and out of data stores rapidly by encrypting or decrypting specific fields in bulk within the flat files that can contain millions of records. By focusing on select fields, you can encrypt and decrypt data efficiently, in a fraction of the time that it might take for the entire file. DataSecure also can be used to encrypt the entire binary files when you do not need field-level granularity.Information securedYou chose your mainframe environment to deliver high levels of performance and reliability for your most important applications and data. By adopting SafeNetProtectZ, you gain a robust security solution that matches the power of your mainframe environment.
Heterogeneous File TypesSupports encryption for a wide variety of data types such as spreadsheets, documents, images, PDFs, and moreInteroperabilityMicrosoft Windows Terminal Server, Offline Folder Synchronization, DFS (Distributed File System), Global Catalog, and NovellGranular ProtectionSecure at the file or folder level and establish rights for privileged users in order to safeguard against malicious or negligent threatsProven AlgorithmsFIPS 140 Level 2 AES Broad Platform SupportOffering support for Windows and Linux operating systems, Microsoft, Novell, Netware & Unix (Samba)
ENTERPRISE VIEW: Secure cloud storage represents an opportunity for organizations to leverage the cloud’s elastic, cost-effective storage capacity, while maintaining security. This approach requires a combination of granular encryption mechanisms and centralized access and policy management.Secure storage in the cloud across file, application, and database systems —Driven by a need to use the cloud’s elastic storage, enterprises can securely store data in the cloud, effectively using the cloud for the backup, disaster recovery, and archival of data. SafeNet provides protection of stored data through a hardened appliance that centralizes encryption processing, keys, logging, auditing, and policy administration across file, application, and database systems.
1. Шифрование данных и осуществление контроляОбзор Derek Tumulak, VP Product Management Paul Earsy & Andrew Dillon, Product Management Mary Cauwels, Product Marketing Dean Ocampo, Compliance Solutions Strategy Director