SlideShare a Scribd company logo
1 of 2
Download to read offline
 Allow turnkey encryption security of data-at-rest without any
changes in application, infrastructure, administrator and end-user
workflow
 Provide a unified data-at-rest encryption solution to secure on-
premise storage systems from unified storage, data backup and
next generation storage services in both physical and virtual data
centers
 Support deployment on commodity off-the-shelf (COTS) hard-
ware appliances, as virtual appliances on virtual hypervisors and
as compute instances on cloud infrastructures
 Fulfill stringent information privacy regulatory compliance
requirements including PCI DSS, SOX, HIPAA, HITECH, Personal
Data Privacy Law, etc, immediately and cost-effectively
 Mitigate risks and liabilities in event of data exposure
 Harden security of storage data services as last-line-of-defense
from various data leakage, exfiltration, outbound and insider
threats
 Eliminate vendor lock-in and end-of-life impact as with tradition-
al hardware encryption tools
 Offer flexibility, agility, robustness and sustainability for long-
term storage security needs
 Support rich set of security-proven cryptographic cipher algo-
rithms from AES, RSA, Twofish, Blowfish, etc to various other
regional cipher standards including Camellia, SEED, ARIA, SCB2,
etc enabling organizations to fulfill data privacy requirements
 Provide data-at-rest encryption security as a turnkey service by
eliminating complex second-development of encryption at the
application-layer
Overview
Value Propositions
Key Selling Points
How to imple-
ment data
encryption
without invest-
ing headcounts
on code devel-
opment?
 Turnkey encryption over storage networking
layer
 No crypto API, SDK and second-development
 Data encryption as-if moving from a disk to
another
 Zero learning curve for administrator, opera-
tor and end users
How to imple-
ment a unified
encryption
solution for an
heterogeneous
storage environ-
ment?
 Block-based, share-based, file-based, object-
based encryption in a single solution
 Block-based encryption for FC-SAN, iSCSI, IP-
SAN, etc
 Share/file-based encryption over NFS, CIFS,
HTTP, etc
 Object-based encryption over RESTful proto-
cols including AWS S3, EMC Atmos/ViPR, Open-
Stack Swift, etc
 Sequential storage encryption for tape librar-
ies and VTL over FCP, iSCSI, etc
How to acceler-
ate adoption of
and migration to
cloud?
 Turnkey, non-disruptive, application-
transparent
 Security proven: NIST FIPS 140-2 certified
 Industry standard: IEEE 1619 compliant
 Realize true separation of duty (data owner,
operator, administrator)
 Lower impact of sensitive data exposure in
event of security breach and data leakage when
migrated to cloud
How to avoid
vendor lock-in
for data encryp-
tion?
 Encryption-as-a-service over standards-based
networked storage protocols
 Unlike silo-based, point-based, disparate
encryption tools such as crypto APIs, database
encryption, file-system encryption, or self-
encryption drives (SED) which are vendor sticky
How to improve
data access
rates with
encrypted
databases?
 Bloombase provides encryption on the
networked storage layer regardless of structure
of data being protected
 Encryption throughput scales with number of
processors allocated
 Intel AES-NI hardware cryptographic accelera-
tion achieves 5-10x boost in real-time encryption
performance gain
 Zero change to database schema and objects
 No index corruption
 Application transparent
How to meet
“minority”
encryption
needs as a
solution for
global deploy-
ment?
 Pluggable cipher architecture enabling
organizations to meet global and local encryp-
tion needs as a single unified data-at-rest
security solution
 Built-in industry-standard encryption cipher
algorithm support including AES, RSA, DES,
3DES, Blowfish, Twofish, etc
 Camellia cipher support by NTT and
Mitsubishi Electric for Japan
 SEED and ARIA ciphers support for Korea
 McEliece and qTESLA post-quantum crypto-
graphic ciphers support
 Kalyna cipher support for Ukraine/CIS
 SCB2 cipher support for China
How to implement a data
encryption solution that
integrates seamlessly
with existing key man-
agement facility?
 Standards-based key management
protocol support including OASIS KMIP
and PKCS#11
 Bloombase-proprietary KeyCastle key
management support
Competitors
Brocade/IBM/
HP Encryption
Switch and
Blade
 Hardware-based encryption product
 Limited storage support on FC-SAN only
 Not designed for virtual data center and cloud
infrastructure
 Limited cipher support on AES only
Gemalto/
SafeNet Storag-
eSecure
 Hardware-based encryption product
 Limited storage support on NAS only
 Not designed for virtual data center and cloud
infrastructure
 Limited cipher support on AES only
Thales/
Vormetric
Transparent
Encryption
 Agent-based encryption
 Client piece is required to be installed onto
host OS and file-system
 Limited OS support
 Limited cipher support on AES only
CipherCloud  SaaS encryption for hosted applications
including Gmail and Salesforce only
 Not designed for generic data center platform
and on-premise IT infrastructure
Qualifying Questions
Is customer one of
Global 500 scale organi-
zations?
Fortune Global 500 scale multi-national
corporations manage vast amount of
business sensitive data in complex
heterogeneous IT environment that
needs protection
Are you from market
verticals in which data
privacy regulatory
compliance is mandato-
ry?
Bloombase provides turnkey data-at-
rest encryption security of stored data
enabling organizations to meet data
regulatory compliance easily and cost-
effectively. Organizations from seg-
ments including banking and FSI,
public, healthcare and medical manage
large volume of end customer infor-
mation requiring encryption
Are you from market
verticals which deal
with a lot of intellectual
properties, business
know-hows and trade-
secrets in your day-t0-
day operations?
Bloombase delivers non-disruptive
protection of your invaluable digital
assets from leakage and exfiltration
threats. Data can be locked down on
storage systems and services, ena-
bling data owners to retrieve these
business sensitive information as-if
they are in the clear without workflow
change. This achieves separation-of-
duties allowing administrators and
operators to manage the IT infrastruc-
ture without being able to access the
business sensitive digital assets.
Organizations from oil-and-gas,
technology, chemical and pharma-
ceutical, research, defense and
aerospace are well qualified as
Bloombase customers
Are you challenged by
the need for data
encryption with com-
plex heterogeneous
business applications,
host operating systems
and storage infrastruc-
ture?
Bloombase provides a unified, plat-
form-neutral, application-transparent
encryption of data-at-rest over net-
worked storage layer
Are you moving appli-
cation workload and
data to cloud infra-
structure managed by
MSPs?
The level and scale of exposure by
migrating on-premises data to off-
premises cloud managed by out-
sourced service providers are much
higher. Off-premise business sensi-
tive data deserves proper protection
Is your storage infra-
structure built with
high-end storage
systems and services?
Chances sensitivity of stored data
higher for organizations running high
-end storage systems and services
Any existing data-at-
rest encryption tools
running in your IT
environment?
Customers running NetApp/Decru
DataFort, Thales/nCipher/NeoScale
CryptoStor, CipherMax/MaXXan,
Gemalto/SafeNet/Ingrian Da-
taSecure, Protegrity, Sophos/Utimaco
SafeGuard LAN Crypt, etc are chal-
lenged by product end-of-life (EOL)
and service end-of-support (EOS) with
immediate need for rescue and
product replacement
Bloombase StoreSafe storage security software appliance provides
turnkey, non-disruptive, application-transparent encryption securi-
ty of data-at-rest (DAR) from physical data center, virtual data
center, big data, to the cloud.
Bloombase StoreSafe enables organizational customers to secure
their structured and unstructured stored data with state-of-the-art
cryptographic technologies at minimal application and infrastruc-
ture change.
BLOOMBASE STORESAFE
SALES CHEAT SHEET
* with Intel AES-NI
† as of FY19 Q1
‡ as of FY19 Q1
To engage Bloombase in business opportunity, reach out to our
Global Sales Operations team at email gso@bloombase.com
directly, we will identify the product specialist(s) to support you
and your customers.
The sales process would include lead qualification, product evalua-
tion, solution proposition, sizing, etc.
For further information, please visit https://www.bloombase.com/
go/productinfo.
For deal registration, please visit https://
supportal.bloombase.com/supportal/submit_lead.jsp.
To request for a product evaluation kit, please visit https://
www.bloombase.com/go/evalkit.
Objection Handling
Customer already
has encryption
Customers can sometimes get confused with
data-in-flight and data-at-rest. When they
specifically say they already have encryp-
tion, check if they are referring to HTTPS,
SSL, TLS, IPsec, link encryption, etc which
are just data in-flight/in-motion encryption
only. Some customers may truly have en-
cryption of at-rest data implemented but
simply at the application or database layer
which is risky to implement and costly to
maintain. The fact that application and
database data are mainly structured-data,
however, the expansion of enterprise data is
largely unstructured and located in hetero-
geneous data center environment and
storage infrastructure accessed by heteroge-
neous storage networking protocols. To deal
with the challenging growth of these data
driven by big data, analytics and likely
Internet of Things and Internet of Everything,
in which sensitive information are all over
the place, customers need a unified, turnkey
easy to manage, easy to implement encryp-
tion solution which is able to scale from
physical, virtual data center to cloud and
being able to be future-proof.
End-point security
products have built
-in data-loss-
protection (DLP)
support
Data loss protection (DLP) tools protect data
privacy from leakage in event of portable/
mobile hardware/media loss only. It is not
designed to secure long term retention of
storage data in data center infrastructure
and does not provide enterprise-grade full
life-cycle key management support.
Customer already
has key manage-
ment tool and
hardware security
module (HSM)
Key management tools (e.g. OASIS KMIP,
PKCS#11, etc) mainly deal with life-cycle
management of encryption keys whereas
hardware security modules (HSM) provide
tamper-proof and tamper-resistant key
storage and protection for higher standard of
key security. Customers having deployed key
management tools and HSMs only get part of
their data protection problem solved which
is merely key management. When it comes to
actual encryption of their business critical
data, they are required to implement sepa-
rate encryption in their business applica-
tions by integrating with these key tools.
Often times this traditional process from
data classification, application second
development, testing, tuning, to migration
takes more than 6 months whereas for
Bloombase approach, in a week's time.
Database encryp-
tion is already in
place
Database encryption tools are costly to
maintain, sticky on specific database vendor
and version, and oftentimes of low efficien-
cy. Bloombase to serve as customer option
with capability to secure database files and
volumes on storage networking layer as a
more future-proof and efficient solution.
Perimeter security
measures are already
adequate
Cyber-attacks from the outside can
effectively be blocked by network
security tools including intelligent
firewall and content filters. Storage
encryption solutions such as Bloom-
base helps mitigate the worsening
threat of data exfiltration problem
caused by insiders.
Data encryption would
significantly slow down
software applications
Traditional database encryption and
file-system encryption are inefficient
by competing for computing re-
sources with business application
workload. Bloombase provides next-
generation stored data encryption
as a separate piece and allows scale
-up and scale-out flexibly.
Encryption could cause data
corruption
Standards-based cryptographic
algorithms are proven and have
been utilized extensively to secure e
-commerce applications. Bloombase
supports various robust industry
standard encryption cipher algo-
rithms to secure mission critical
application data. To avoid potential
data loss and facilitate data restora-
tion/recovery, customers should
practice effective backup of cipher-
text stored data along with the
encryption key(s) securing the data.
Encryption is costly to
deployment and maintain
Bloombase software products offer
flexible licensing model which adapt
to any scale of deployment. The
software appliance can be deployed
on cost effective COTS hardware
appliance to deliver encryption
services.
No urgency with encryption:
no data classification and
no definite data protection
guidelines
Customers should take prompt
action to secure their business
sensitive data otherwise they might
risk security breaches and data
leakage which could lead to adverse
effects to their business operations
and company goodwill
Performance Benchmark (Per Processor-core / vCPU)
FCP 2 Gbps *
iSCSI 1 Gbps *
NFS 0.5 Gbps *
SMB/CIFS 0.4 Gbps *
REST/HTTP 0.25 Gbps *
MSRP
Processor-core Perpetual License US$15,200.00 †
Processor-core 1-Year Term License US$3,040.00 †
Processor-core 2-Year Term License US$5,320.00 †
Processor-core 3-Year Term License US$7,600.00 †
Processor-core 4-Year Term License US$9,120.00 †
Processor-core 5-Year Term License US$10,640.00 †
Annual Software Maintenance and Support US$1,520.00 †
Annual Basic Maintenance and Support US$2,280.00 †
Annual Standard Maintenance and Support US$3,040.00 †
Annual Premium Maintenance and Support US$3,800.00 †
Package Offer by Example
1-node 1-way quad-core x86-processor
single-node setup with first year standard
maintenance (max 8Gbps encryption
throughput)
1 * 1 * 4 * 0.5 *
15,200 * 1.2 =
US$36,480.00 ‡
1-node 1-way quad-core x86-processor HA
cluster setup with first year standard
maintenance (max 8Gbps encryption
throughput)
1 * 2 * 4 * 0.5 *
15,200 * 1.2 =
US$72,960.00 ‡
2-node 2-way quad-core x86 processor HA
cluster setup with first year standard
maintenance (max 16Gbps encryption
throughput)
2 * 2 * 4 * 0.5 *
15,200 * 1.2 =
US$145,920.00 ‡
2-node 2-way eight-core x86 processor HA
cluster setup with first year standard
maintenance (max 32Gbps encryption
throughput)
2 * 2 * 8 * 0.5 *
15,200 * 1.2 =
US$291,840.00 ‡
2-node 4-way eight-core x86 processor HA
cluster setup with first year standard
maintenance (max 64Gbps encryption
throughput)
2 * 4 * 8 * 0.5 *
15,200 * 1.2 =
US$583,680.00 ‡
2-node 4-way sixteen-core x86 processor
HA cluster setup with first year standard
maintenance (max 128Gbps encryption
throughput)
2 * 4 * 16 * 0.5 *
15,200 * 1.2 =
US$1,167,360.00 ‡
Engagement Model
Additional Information
Bloombase StoreSafe
product brochure
https://www.bloombase.com/
content/9o82VHud
Bloombase StoreSafe
technical specifications
https://www.bloombase.com/
content/8936QA88
Bloombase StoreSafe
compatibility matrix
https://www.bloombase.com/
content/8396639C
Bloombase / AWS
solution brief
https://www.bloombase.com/
content/fVjOxbwc
Bloombase / Dell
solution brief
https://www.bloombase.com/
content/UYpUsgZQ
Bloombase / EMC solu-
tion brief
https://www.bloombase.com/
content/W9pfThdR
Bloombase / HDS
solution brief
https://www.bloombase.com/
content/DsRDs8xi
Bloombase / IBM SKLM
solution brief
https://www.bloombase.com/
content/txuaKvBs
Bloombase / Intel
solution brief
https://www.bloombase.com/
content/iqqEIrAU
Bloombase / KVM
solution brief
https://www.bloombase.com/
content/fBwXRRf5
Bloombase / Micro Focus
ESKM solution brief
https://www.bloombase.com/
content/dEjXPo5z
Bloombase / Microsoft
solution brief
https://www.bloombase.com/
content/L7bEST1J
Bloombase / nCipher
solution brief
https://www.bloombase.com/
content/jKlxcGwU
Bloombase / Thales
solution brief
https://www.bloombase.com/
content/GzIRSH7E
Bloombase / VMware
solution brief
https://www.bloombase.com/
content/5WLHL7rP
Bloombase - Intelligent Storage Firewall email info@bloombase.com web https://www.bloombase.com
Copyright 2019 Bloombase, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase in United
States and/or other jurisdictions. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and
services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. Item No. BLBS-Bloombase-StoreSafe-Sales-Cheat-Sheet-FY19Q1-USLET-EN-R8

More Related Content

More from Bloombase

More from Bloombase (20)

4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbooklet
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-edition
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyer
 
4aa5 2782
4aa5 27824aa5 2782
4aa5 2782
 

Recently uploaded

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Recently uploaded (20)

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
 
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdfAzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
 
WSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million PeopleWSO2Con2024 - Unleashing the Financial Potential of 13 Million People
WSO2Con2024 - Unleashing the Financial Potential of 13 Million People
 
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
 

Bloombase StoreSafe Sales Cheat Sheet FY19Q1

  • 1.  Allow turnkey encryption security of data-at-rest without any changes in application, infrastructure, administrator and end-user workflow  Provide a unified data-at-rest encryption solution to secure on- premise storage systems from unified storage, data backup and next generation storage services in both physical and virtual data centers  Support deployment on commodity off-the-shelf (COTS) hard- ware appliances, as virtual appliances on virtual hypervisors and as compute instances on cloud infrastructures  Fulfill stringent information privacy regulatory compliance requirements including PCI DSS, SOX, HIPAA, HITECH, Personal Data Privacy Law, etc, immediately and cost-effectively  Mitigate risks and liabilities in event of data exposure  Harden security of storage data services as last-line-of-defense from various data leakage, exfiltration, outbound and insider threats  Eliminate vendor lock-in and end-of-life impact as with tradition- al hardware encryption tools  Offer flexibility, agility, robustness and sustainability for long- term storage security needs  Support rich set of security-proven cryptographic cipher algo- rithms from AES, RSA, Twofish, Blowfish, etc to various other regional cipher standards including Camellia, SEED, ARIA, SCB2, etc enabling organizations to fulfill data privacy requirements  Provide data-at-rest encryption security as a turnkey service by eliminating complex second-development of encryption at the application-layer Overview Value Propositions Key Selling Points How to imple- ment data encryption without invest- ing headcounts on code devel- opment?  Turnkey encryption over storage networking layer  No crypto API, SDK and second-development  Data encryption as-if moving from a disk to another  Zero learning curve for administrator, opera- tor and end users How to imple- ment a unified encryption solution for an heterogeneous storage environ- ment?  Block-based, share-based, file-based, object- based encryption in a single solution  Block-based encryption for FC-SAN, iSCSI, IP- SAN, etc  Share/file-based encryption over NFS, CIFS, HTTP, etc  Object-based encryption over RESTful proto- cols including AWS S3, EMC Atmos/ViPR, Open- Stack Swift, etc  Sequential storage encryption for tape librar- ies and VTL over FCP, iSCSI, etc How to acceler- ate adoption of and migration to cloud?  Turnkey, non-disruptive, application- transparent  Security proven: NIST FIPS 140-2 certified  Industry standard: IEEE 1619 compliant  Realize true separation of duty (data owner, operator, administrator)  Lower impact of sensitive data exposure in event of security breach and data leakage when migrated to cloud How to avoid vendor lock-in for data encryp- tion?  Encryption-as-a-service over standards-based networked storage protocols  Unlike silo-based, point-based, disparate encryption tools such as crypto APIs, database encryption, file-system encryption, or self- encryption drives (SED) which are vendor sticky How to improve data access rates with encrypted databases?  Bloombase provides encryption on the networked storage layer regardless of structure of data being protected  Encryption throughput scales with number of processors allocated  Intel AES-NI hardware cryptographic accelera- tion achieves 5-10x boost in real-time encryption performance gain  Zero change to database schema and objects  No index corruption  Application transparent How to meet “minority” encryption needs as a solution for global deploy- ment?  Pluggable cipher architecture enabling organizations to meet global and local encryp- tion needs as a single unified data-at-rest security solution  Built-in industry-standard encryption cipher algorithm support including AES, RSA, DES, 3DES, Blowfish, Twofish, etc  Camellia cipher support by NTT and Mitsubishi Electric for Japan  SEED and ARIA ciphers support for Korea  McEliece and qTESLA post-quantum crypto- graphic ciphers support  Kalyna cipher support for Ukraine/CIS  SCB2 cipher support for China How to implement a data encryption solution that integrates seamlessly with existing key man- agement facility?  Standards-based key management protocol support including OASIS KMIP and PKCS#11  Bloombase-proprietary KeyCastle key management support Competitors Brocade/IBM/ HP Encryption Switch and Blade  Hardware-based encryption product  Limited storage support on FC-SAN only  Not designed for virtual data center and cloud infrastructure  Limited cipher support on AES only Gemalto/ SafeNet Storag- eSecure  Hardware-based encryption product  Limited storage support on NAS only  Not designed for virtual data center and cloud infrastructure  Limited cipher support on AES only Thales/ Vormetric Transparent Encryption  Agent-based encryption  Client piece is required to be installed onto host OS and file-system  Limited OS support  Limited cipher support on AES only CipherCloud  SaaS encryption for hosted applications including Gmail and Salesforce only  Not designed for generic data center platform and on-premise IT infrastructure Qualifying Questions Is customer one of Global 500 scale organi- zations? Fortune Global 500 scale multi-national corporations manage vast amount of business sensitive data in complex heterogeneous IT environment that needs protection Are you from market verticals in which data privacy regulatory compliance is mandato- ry? Bloombase provides turnkey data-at- rest encryption security of stored data enabling organizations to meet data regulatory compliance easily and cost- effectively. Organizations from seg- ments including banking and FSI, public, healthcare and medical manage large volume of end customer infor- mation requiring encryption Are you from market verticals which deal with a lot of intellectual properties, business know-hows and trade- secrets in your day-t0- day operations? Bloombase delivers non-disruptive protection of your invaluable digital assets from leakage and exfiltration threats. Data can be locked down on storage systems and services, ena- bling data owners to retrieve these business sensitive information as-if they are in the clear without workflow change. This achieves separation-of- duties allowing administrators and operators to manage the IT infrastruc- ture without being able to access the business sensitive digital assets. Organizations from oil-and-gas, technology, chemical and pharma- ceutical, research, defense and aerospace are well qualified as Bloombase customers Are you challenged by the need for data encryption with com- plex heterogeneous business applications, host operating systems and storage infrastruc- ture? Bloombase provides a unified, plat- form-neutral, application-transparent encryption of data-at-rest over net- worked storage layer Are you moving appli- cation workload and data to cloud infra- structure managed by MSPs? The level and scale of exposure by migrating on-premises data to off- premises cloud managed by out- sourced service providers are much higher. Off-premise business sensi- tive data deserves proper protection Is your storage infra- structure built with high-end storage systems and services? Chances sensitivity of stored data higher for organizations running high -end storage systems and services Any existing data-at- rest encryption tools running in your IT environment? Customers running NetApp/Decru DataFort, Thales/nCipher/NeoScale CryptoStor, CipherMax/MaXXan, Gemalto/SafeNet/Ingrian Da- taSecure, Protegrity, Sophos/Utimaco SafeGuard LAN Crypt, etc are chal- lenged by product end-of-life (EOL) and service end-of-support (EOS) with immediate need for rescue and product replacement Bloombase StoreSafe storage security software appliance provides turnkey, non-disruptive, application-transparent encryption securi- ty of data-at-rest (DAR) from physical data center, virtual data center, big data, to the cloud. Bloombase StoreSafe enables organizational customers to secure their structured and unstructured stored data with state-of-the-art cryptographic technologies at minimal application and infrastruc- ture change. BLOOMBASE STORESAFE SALES CHEAT SHEET
  • 2. * with Intel AES-NI † as of FY19 Q1 ‡ as of FY19 Q1 To engage Bloombase in business opportunity, reach out to our Global Sales Operations team at email gso@bloombase.com directly, we will identify the product specialist(s) to support you and your customers. The sales process would include lead qualification, product evalua- tion, solution proposition, sizing, etc. For further information, please visit https://www.bloombase.com/ go/productinfo. For deal registration, please visit https:// supportal.bloombase.com/supportal/submit_lead.jsp. To request for a product evaluation kit, please visit https:// www.bloombase.com/go/evalkit. Objection Handling Customer already has encryption Customers can sometimes get confused with data-in-flight and data-at-rest. When they specifically say they already have encryp- tion, check if they are referring to HTTPS, SSL, TLS, IPsec, link encryption, etc which are just data in-flight/in-motion encryption only. Some customers may truly have en- cryption of at-rest data implemented but simply at the application or database layer which is risky to implement and costly to maintain. The fact that application and database data are mainly structured-data, however, the expansion of enterprise data is largely unstructured and located in hetero- geneous data center environment and storage infrastructure accessed by heteroge- neous storage networking protocols. To deal with the challenging growth of these data driven by big data, analytics and likely Internet of Things and Internet of Everything, in which sensitive information are all over the place, customers need a unified, turnkey easy to manage, easy to implement encryp- tion solution which is able to scale from physical, virtual data center to cloud and being able to be future-proof. End-point security products have built -in data-loss- protection (DLP) support Data loss protection (DLP) tools protect data privacy from leakage in event of portable/ mobile hardware/media loss only. It is not designed to secure long term retention of storage data in data center infrastructure and does not provide enterprise-grade full life-cycle key management support. Customer already has key manage- ment tool and hardware security module (HSM) Key management tools (e.g. OASIS KMIP, PKCS#11, etc) mainly deal with life-cycle management of encryption keys whereas hardware security modules (HSM) provide tamper-proof and tamper-resistant key storage and protection for higher standard of key security. Customers having deployed key management tools and HSMs only get part of their data protection problem solved which is merely key management. When it comes to actual encryption of their business critical data, they are required to implement sepa- rate encryption in their business applica- tions by integrating with these key tools. Often times this traditional process from data classification, application second development, testing, tuning, to migration takes more than 6 months whereas for Bloombase approach, in a week's time. Database encryp- tion is already in place Database encryption tools are costly to maintain, sticky on specific database vendor and version, and oftentimes of low efficien- cy. Bloombase to serve as customer option with capability to secure database files and volumes on storage networking layer as a more future-proof and efficient solution. Perimeter security measures are already adequate Cyber-attacks from the outside can effectively be blocked by network security tools including intelligent firewall and content filters. Storage encryption solutions such as Bloom- base helps mitigate the worsening threat of data exfiltration problem caused by insiders. Data encryption would significantly slow down software applications Traditional database encryption and file-system encryption are inefficient by competing for computing re- sources with business application workload. Bloombase provides next- generation stored data encryption as a separate piece and allows scale -up and scale-out flexibly. Encryption could cause data corruption Standards-based cryptographic algorithms are proven and have been utilized extensively to secure e -commerce applications. Bloombase supports various robust industry standard encryption cipher algo- rithms to secure mission critical application data. To avoid potential data loss and facilitate data restora- tion/recovery, customers should practice effective backup of cipher- text stored data along with the encryption key(s) securing the data. Encryption is costly to deployment and maintain Bloombase software products offer flexible licensing model which adapt to any scale of deployment. The software appliance can be deployed on cost effective COTS hardware appliance to deliver encryption services. No urgency with encryption: no data classification and no definite data protection guidelines Customers should take prompt action to secure their business sensitive data otherwise they might risk security breaches and data leakage which could lead to adverse effects to their business operations and company goodwill Performance Benchmark (Per Processor-core / vCPU) FCP 2 Gbps * iSCSI 1 Gbps * NFS 0.5 Gbps * SMB/CIFS 0.4 Gbps * REST/HTTP 0.25 Gbps * MSRP Processor-core Perpetual License US$15,200.00 † Processor-core 1-Year Term License US$3,040.00 † Processor-core 2-Year Term License US$5,320.00 † Processor-core 3-Year Term License US$7,600.00 † Processor-core 4-Year Term License US$9,120.00 † Processor-core 5-Year Term License US$10,640.00 † Annual Software Maintenance and Support US$1,520.00 † Annual Basic Maintenance and Support US$2,280.00 † Annual Standard Maintenance and Support US$3,040.00 † Annual Premium Maintenance and Support US$3,800.00 † Package Offer by Example 1-node 1-way quad-core x86-processor single-node setup with first year standard maintenance (max 8Gbps encryption throughput) 1 * 1 * 4 * 0.5 * 15,200 * 1.2 = US$36,480.00 ‡ 1-node 1-way quad-core x86-processor HA cluster setup with first year standard maintenance (max 8Gbps encryption throughput) 1 * 2 * 4 * 0.5 * 15,200 * 1.2 = US$72,960.00 ‡ 2-node 2-way quad-core x86 processor HA cluster setup with first year standard maintenance (max 16Gbps encryption throughput) 2 * 2 * 4 * 0.5 * 15,200 * 1.2 = US$145,920.00 ‡ 2-node 2-way eight-core x86 processor HA cluster setup with first year standard maintenance (max 32Gbps encryption throughput) 2 * 2 * 8 * 0.5 * 15,200 * 1.2 = US$291,840.00 ‡ 2-node 4-way eight-core x86 processor HA cluster setup with first year standard maintenance (max 64Gbps encryption throughput) 2 * 4 * 8 * 0.5 * 15,200 * 1.2 = US$583,680.00 ‡ 2-node 4-way sixteen-core x86 processor HA cluster setup with first year standard maintenance (max 128Gbps encryption throughput) 2 * 4 * 16 * 0.5 * 15,200 * 1.2 = US$1,167,360.00 ‡ Engagement Model Additional Information Bloombase StoreSafe product brochure https://www.bloombase.com/ content/9o82VHud Bloombase StoreSafe technical specifications https://www.bloombase.com/ content/8936QA88 Bloombase StoreSafe compatibility matrix https://www.bloombase.com/ content/8396639C Bloombase / AWS solution brief https://www.bloombase.com/ content/fVjOxbwc Bloombase / Dell solution brief https://www.bloombase.com/ content/UYpUsgZQ Bloombase / EMC solu- tion brief https://www.bloombase.com/ content/W9pfThdR Bloombase / HDS solution brief https://www.bloombase.com/ content/DsRDs8xi Bloombase / IBM SKLM solution brief https://www.bloombase.com/ content/txuaKvBs Bloombase / Intel solution brief https://www.bloombase.com/ content/iqqEIrAU Bloombase / KVM solution brief https://www.bloombase.com/ content/fBwXRRf5 Bloombase / Micro Focus ESKM solution brief https://www.bloombase.com/ content/dEjXPo5z Bloombase / Microsoft solution brief https://www.bloombase.com/ content/L7bEST1J Bloombase / nCipher solution brief https://www.bloombase.com/ content/jKlxcGwU Bloombase / Thales solution brief https://www.bloombase.com/ content/GzIRSH7E Bloombase / VMware solution brief https://www.bloombase.com/ content/5WLHL7rP Bloombase - Intelligent Storage Firewall email info@bloombase.com web https://www.bloombase.com Copyright 2019 Bloombase, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase in United States and/or other jurisdictions. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. Item No. BLBS-Bloombase-StoreSafe-Sales-Cheat-Sheet-FY19Q1-USLET-EN-R8