Vormetric Encryption                Architecture Overview                      Protecting Enterprise Data at Rest with    ...
Data is Your Business!      Data security breaches      are harmful to any      organization of any size.Slide No: 2
People                          Devices                                            Servers                             Peo...
Protect private and confidential info. Global Compliance     PCI DSS     HITECH Act     UK Data Protection Act     South K...
Data is Everywhere                                                                   Business Application                 ...
Data Security Simplified              Transparent                                          Strong               Must be tr...
Vormetric Data Security                   Vormetric                                Vormetric                   Encryption ...
Vormetric Encryption Architecture                 Users               Application                                         ...
Protect Server Data                                                                                                       ...
We Secure The DataThat Runs Your Business Download Whitepaper
Vormetric Encryption                Architecture Overview                      Protecting Enterprise Data at Rest with    ...
Upcoming SlideShare
Loading in …5
×

Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper to protect enterprise data at rest

1,736 views

Published on

This is an excerpt of Vormetric’s Encryption Architecture Overview Whitepaper: Protecting Enterprise Data at Rest with Encryption, Access Controls and Auditing
More on subject : www.vormetric.com/datasecurity82
This Vormetric whitepaper discusses data security threats and related incidents, such as security breaches, which can be harmful to any organization operating online. It then goes on to explain the real risks to the enterprise data and how to make encryption successful. The whitepaper also discusses Vormetric encryption, which is a comprehensive solution for key management and encryption of data at rest. The whitepaper on Vormetric Encryption Architecture consists of brief introduction to two most important components of Vormetric Encryption i.e., Data Security Manager and Encryption Expert Agents.
According to whitepaper, some of the advantages of using Vormetric Encryption solution are:
• Encryption and Access Controls
• Transparent Implementation
• High Performance
• Centralized Key and Policy Management
• Strong Separation of Duties
• Role-Based Administration and Domains
• Scalability
• Distributed IT Environments
• High Availability
• Fine-Grained Auditing

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,736
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
46
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper to protect enterprise data at rest

  1. 1. Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls, and Auditingwww.Vormetric.com
  2. 2. Data is Your Business! Data security breaches are harmful to any organization of any size.Slide No: 2
  3. 3. People Devices Servers People 34% 35% 94% 2012 DATA BREACH INVESTIGATION REPORT A study conducted by the Verizon RISK Team with cooperation from global policing agencies.Slide No: 3 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
  4. 4. Protect private and confidential info. Global Compliance PCI DSS HITECH Act UK Data Protection Act South Korea’s PIPA And more … Server Defense-in-Depth ControlsSlide No: 4 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
  5. 5. Data is Everywhere Business Application Unstructured data Systems (SAP, PeopleSoft, Oracle Security & File Systems Financials, In- Office documents, house, CRM, eComm/eBiz, etc. Other Systems PDF, Vision, Audio & other ) (Event logs, Error logs Fax/Print Servers Application Server Cache, Encryption keys, File Servers & other secrets) Security Systems Remote locations & systems Structured data Database Systems Storage & Backup (SQL, Oracle, DB2, Informix, MySQL) Systems Database Server SAN/NAS Data Communications Backup Systems VoIP Systems FTP/Dropbox Server Email Servers ! Data exists in different formats, states, and locations. Traditional Controls are not designed to secure it.Slide No: 5 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
  6. 6. Data Security Simplified Transparent Strong Must be transparent to business Privileged users should not have processes, end users, and access to sensitive data applications Firewall your data – approved Data type neutral – any data, users and applications allowed, anywhere deny all others. Efficient Easy SLA, User, and Application Easy to Understand performance must remain Easy to Implement acceptable Easy to Manage Encryption overhead can approach zeroSlide No: 6 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
  7. 7. Vormetric Data Security Vormetric Vormetric Encryption Key Management Encryption Key Agent Agent Data Security Manager Oracle 11gR2 Unstructured TDE Encryption Key Agent Agent Vormetric Key Vault SQL Server Database 2008 / 2012 TDESlide No: 7 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
  8. 8. Vormetric Encryption Architecture Users Application Policy is used to restrict access to sensitive data Database by user and process information provided by the OS. OS FS Agent SSL/TLS File System SAN, NAS, DAS StorageSlide No: 8 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
  9. 9. Protect Server Data Log Files Payment Custom Apps Password files ERP CRM CMS Config filesLog Files ArchivePassword files WebLogicConfig Files IIS APACHE Data FilesArchive Transaction Logs DB2 Oracle SQL Sybase MySQL ExportsFile Share BackupArchive File Servers FTP Servers Email Servers OthersContentMulti Needs DAS SAN NAS VM CLOUD Slide No: 9 Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.
  10. 10. We Secure The DataThat Runs Your Business Download Whitepaper
  11. 11. Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls, and Auditingwww.Vormetric.com

×