SlideShare a Scribd company logo
1 of 10
Download to read offline
Features
Application Transparent Data-at-Rest Security with Storage Virtualization
High performance and intelligent storage virtualization technology delivers security processing of data-at-rest based
on data-owner-defined security rules and policies. No user training is required. Data protected is secured on-the-fly
requiring no change on user workflow and application logic.
Hardware, Platform and Filesystem Independent
Bloombase StoreSafe supports all platforms conforming to standards-based storage networking protocols and it
operates on the storage networking layer abstracting filesystem underneath and software applications above.
High Performance
Leveraging Intel AES-NI and various other third-party hardware cryptographic acceleration technologies to minimize
performance degradation as a result of latency with real-time encryption and decryption, pushing encryption speed to
the limits meeting throughput-computing needs.
Flexible and Secure Access Control
Fine grain user and host access control suiting all enterprise storage security needs.
High Availability
Highly scalable and multiple Bloombase StoreSafe software appliances running in cluster for failover in mission-
critical systems and load-balancing for high-throughput storage applications.
Security
NIST FIPS 197 AES cipher algorithm support (NIST certificate #1041)
IEEE 1619-compliant AES XTS block cipher
RSA public key cryptography (NIST certificate #496)
SHA-1, SHA-256, SHA-384, SHA-512 hash generation (NIST certificate #991)
Accredited keyed-hash message authentication code generation (NIST certificate #583)
Japan NTT/Mitsubishi Electric Camellia cipher algorithm support
Korean SEED and ARIA cipher algorithm support
GOST, Kalyna and SM4 cipher algorithm support
NIST FIPS-46-3 3DES and DES cipher algorithm support
RC2, RC4, RC5 and RC6 cipher algorithm support
CAST5 cipher algorithm support
Twofish and Blowfish cipher algorithm support
IDEA cipher algorithm support
Serpent and Skipjack cipher algorithm support
Post-quantum Cryptography (PQC) cipher algorithms support
Pluggable cipher architecture for future cipher upgrade or custom cipher support
BLOOMBASE
STORESAFE
SPECIFICATIONS
Storage Systems
Direct Attached Storage (DAS)
Network Attached Storage (NAS)
Storage Area Network (SAN)
Tape library, tape drive and virtual tape library (VTL)
Content Addressable Storage (CAS) / Cloud Storage / Object Store
Privacy Control
Automated file-based and block-based encryption on storage device and file write operations
Automated decryption on storage device and file read operations on trusted hosts and clients
Multiple key encryption
Fix-sized file header regardless of actual file size for file-based protection
No additional storage required for block-based protection
Access Control
Fine grain read/write/create/delete/list access control
Time-window-based access control
Zero alteration to actual storage contents
Zero impact to performance
Integrity Control
Automated filesystem object digital signature generation
File integrity verification
Multiple key digital signature generation
Fix-sized file header regardless of actual file size
Write-Once-Read-Many (WORM)
Write-once-read-many feature resembling non-rewritable optical media supporting secure archival of data eliminat-
ing potential risks being overwritten by intention or accidental operation
For storage archival, compliance, dynamic capacity management and information lifecycle management (ILM)
Policy based engine dynamically adapts to changing demands in data requirements, by moving files automatically
and transparently to appropriate tiered storage
Rule based configuration for permanently delete and/or shred file contents
Authentication and Authorization
User-based and role-based authentication and authorization
Generic Lightweight Directory Access Protocol (LDAP) and Microsoft Active Directory (MSAD) authentication and au-
thorization
Host-based authentication and authorization
Microsoft NT Lan Manager (NTLM) authentication
Challenge Handshake Authentication Protocol (CHAP) based discovery and authentication
Direct Attached Storage (DAS)
Extensive Storage Communication Protocol Support
Fiber Channel Protocol (FCP)
Fiber Channel over Ethernet (FCoE)
Internet Small Computer System Interface (iSCSI)
Small Computer System Interface (SCSI)
Serial Attached SCSI (SAS)
Serial Advanced Technology Attachment (SATA)
Parallel Advanced Technology Attachment (PATA)/Integrated Drive Electronics (IDE), etc
Platform Independent
Bloombase OS
HP-UX
OpenVMS
IBM-AIX
Sun Solaris
Linux
Microsoft Windows
Mac OS, etc
Hardware Interoperability
HP
IBM
Sun StorageTek
Dell
HDS
EMC
NetApp
Apple
Ultra 160 SCSI low voltage differential (LVD) compliant host bus adapter (HBA)
Emulex
QLogic, etc
Filesystem Independent
Raw
ext2 and ext3
FAT
FAT-32
NTFS
UFS
ZFS
CFS
VxFS
HDFS, etc
Network Attached Storage (NAS)
Extensive Storage Communication Protocol Support
Network File System (NFS)
Common Internet File System (CIFS)
Server Message Block (SMB)
Web-based Distributed Authoring and Versioning (WebDAV)
Andrew File System (AFS)
NetWare Core Protocol (NCP)
Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FTP), etc
Platform Independent
Bloombase OS
HP-UX
OpenVMS
IBM-AIX
Sun Solaris
Linux
Microsoft Windows
Mac OS, etc
Hardware Interoperability
HP
IBM
Sun StorageTek
Dell
HDS
EMC
NetApp
Apple
Generic and TCP/IP offloading network interface card (NIC)
Neterion
Intel, etc
Filesystem Independent
ext2 and ext3
FAT
FAT-32
NTFS
UFS
ZFS
CFS
VxFS
HDFS, etc
Storage Area Network (SAN)
Extensive Storage Communication Protocol Support
Fiber Channel Protocol (FCP)
Fiber Channel over Ethernet (FCoE)
Internet Small Computer System Interface (iSCSI), etc
Platform Independent
Bloombase OS
HP-UX
OpenVMS
IBM-AIX
Sun Solaris
Linux
Microsoft Windows
Mac OS, etc
Hardware Interoperability
HP
IBM
Sun StorageTek
Dell
HDS
EMC
NetApp
Apple
Brocade
Cisco
Emulex
QLogic
ATTO Technology
Alacritech, etc
Filesystem Independent
Raw
ext2 and ext3
FAT
FAT-32
NTFS
UFS
ZFS
CFS
VxFS
HDFS, etc
Tape Library, Tape Drive and Virtual Tape Library (VTL)
Extensive Tape Communication Protocol Support
Fiber Channel
Small Computer System Interface (SCSI)
Serial Attached SCSCI (SAS)
Internet Small Computer System Interface (iSCSI), etc
Platform Independent
Bloombase OS
HP-UX
OpenVMS
IBM-AIX
Sun Solaris
Linux
Microsoft Windows
Mac OS, etc
Hardware Interoperability
HP
IBM
Oracle Sun StorageTek
Dell
HDS
EMC
NetApp
Apple
Brocade
Cisco
Quantum
CommVault
FalconStor
Spectra Logic
Alacritech, etc
Content Addressable Storage (CAS) / Object Store
Interoperability
Ceph
RESTful Object Store
EMC Centera
EMC ATMOS / ViPR / Elastic Cloud Storage (ECS)
Caringo CAStor and Dell Object Storage
NetApp SnapLock
Hitachi Content Platform (HCP)
Cloud Storage Services
Amazon Simple Storage Service (S3)
Amazon Elastic Block Storage (EBS)
Amazon Elastic File System (EFS)
IBM Cloud Block Storage
IBM Cloud File Storage
IBM Cloud Object Storage
Google Cloud Storage (Object or Blob Storage)
Google Cloud Persistent Disk
Google Cloud FileStore
Microsoft Azure Blob Storage
Microsoft Azure File Storage
Microsoft Azure Disk Storage
OpenStack Cinder Block Storage
OpenStack Swift Object Storage
Application Programming Interface
REST
Web Services
Java RMI
C application programming interface (API)
Key Generation
NIST FIPS accredited random number generator (NIST certificate #591)
Intel Digital Random Number Generator (DRNG)
ID Quantique Quantis true random number generator support (optional)
Key Management
Multiple certificate authority (CA) support
Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion
X.509 and PKCS#12 DER and PEM key import and export
Key Usage Profiling
RDBMS and Generic LDAP Support and Integration
Automatic Certificate Retrieval from Certificate Authority via HTTP or LDAP
Certificate Validity Check
Certificate Revocation Check via HTTP or LDAP
Certificate Revocation List (CRL)
Certificate Revocation List Distribution Point (CRLDP)
Online Certificate Status Protocol (OCSP)
Hardware Security Module Support
Futurex/VirtuCrypt
Marvell Cavium LiquidSecurity HSM / NITROX XL
nCipher nShield
Oracle Sun Crypto Accelerator
Thales Gemalto SafeNet Network HSM / Luna SA
Thales Gemalto SafeNet ProtectServer
Thales payShield
Utimaco CryptoServer
Ultra Electronics AEP Keyper
PKCS#11 compliant hardware security modules
OASIS KMIP compliant key managers
Hardware Cryptographic Acceleration Support
UltraSPARC cryptographic accelerator
Intel Advanced Encryption Standard New Instructions (AES-NI)
Exar/Hifn Express DS cards
Key Manager Support
IBM Security Key Lifecycle Manager (SKLM) (formerly Tivoli Key Lifecycle Manager TKLM)
Thales Gemalto SafeNet KeySecure
Thales Vormetric DSM (formerly keyAuthority)
Utimaco Enterprise Secure Key Manager (ESKM) (formerly HP/HPE/Micro Focus Atalla)
Utimaco SecurityServer
Cloud Key Management Support
AWS CloudHSM
AWS Key Management Service (KMS)
Google Cloud HSM
Google Cloud Key Management Service (KMS)
IBM Cloud Key Protect
Microsoft Azure Dedicated HSM
Microsoft Azure Key Vault
Standard Support and Certification
IEEE 1619 standard-based mode
NIST FIPS 140-2 validated Bloombase Cryptographic Module
OASIS Key Management Interoperability Protocol (KMIP) support (optional)
Management
Web based management console
Central administration and configuration
User security
Serial console
SNMP v1, v2c, v3
syslog, auto log rotation and auto archive
Heartbeat and keep alive
High Availability
High-availability option for active-active or active-standby operation
Stateless active-standby failover
Interoperable with Bloombase Quorum Server to avoid split-brain scenarios (optional)
Disaster Recovery
Configurations backup and restore
FIPS-140 hardware security module recovery key or software recovery key vault for settings restoration (optional)
Customer-defined recovery quorum (e.g. 2 of 5)
FIPS-140 hardware security module operator key or operator pin for day-to-day Bloombase KeyCastle operation
(optional)
Operating System Support
Bloombase OS
Solaris
HP-UX
OpenVMS
IBM AIX
Linux
Microsoft Windows
Apple macOS
Hardware Support
i386-base architecture
AMD 32 and 64 architecture
Intel Itanium-2 architecture
IBM Power6 architecture
PA-RISC architecture
UltraSPARC architecture
Virtual Platform Support
VMware vSphere / ESX / ESXi
VMware Server
VMware Workstation
Red Hat KVM
Citrix XenServer
Microsoft Hyper-V
IBM PowerVM
Oracle VM Server
Oracle VirtualBox
OpenStack
Cloud Platform Support
Amazon Web Services (AWS)
Google Cloud Platform (GCP)
IBM Cloud / Bluemix / SoftLayer
Microsoft Azure
Rackspace
Oracle Cloud
Software Applications Support
ERP, CRM, RDBMS
BI, data warehouse, data mining, Hadoop, Big Data analytics
File service, CMS, DMS
Messaging, group ware, collaborations
Virtual server computing, VDI
System Requirements
System free memory space 1GB
Free storage space 2GB
Warranty and Maintenance
Software maintenance and technical support services are available for subscription
Bloombase - Intelligent Storage Firewall email info@bloombase.com web https://www.bloombase.com
Copyright 2019 Bloombase, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or
registered trademarks of Bloombase in United States, Canada, European Union and/or other jurisdictions. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for
Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein.
Item No. BLBS-Bloombase-StoreSafe-Specifications-USLET-EN-R13

More Related Content

What's hot

Authenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systemsAuthenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systemsPvrtechnologies Nellore
 
Authenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallelAuthenticated key exchange protocols for parallel
Authenticated key exchange protocols for paralleljpstudcorner
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux SecurityGeo Marian
 
Unix Security
Unix SecurityUnix Security
Unix Securityreplay21
 
White Paper: EMC VNXe Data Protection — A Detailed Review
White Paper: EMC VNXe Data Protection — A Detailed Review   White Paper: EMC VNXe Data Protection — A Detailed Review
White Paper: EMC VNXe Data Protection — A Detailed Review EMC
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
 
AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS
AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMSAUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS
AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMSI3E Technologies
 
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security OverviewShawn Wells
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Securitypankaj009
 
enabling data integrity protection in regenerating-coding-based cloud storage...
enabling data integrity protection in regenerating-coding-based cloud storage...enabling data integrity protection in regenerating-coding-based cloud storage...
enabling data integrity protection in regenerating-coding-based cloud storage...swathi78
 
Ibm system storage n series with multi store and snapmover redp4170
Ibm system storage n series with multi store and snapmover redp4170Ibm system storage n series with multi store and snapmover redp4170
Ibm system storage n series with multi store and snapmover redp4170Banking at Ho Chi Minh city
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security OverviewKernel TLV
 
Storage essentials (by Merlin Ran)
Storage essentials (by Merlin Ran)Storage essentials (by Merlin Ran)
Storage essentials (by Merlin Ran)gigix1980
 
Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009James Morris
 
Block Level Storage Vs File Level Storage
Block Level Storage Vs File Level StorageBlock Level Storage Vs File Level Storage
Block Level Storage Vs File Level StoragePradeep Jagan
 
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniBSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniShellmates
 
Linux Network Security
Linux Network SecurityLinux Network Security
Linux Network SecurityAmr Ali
 
LCFS - Storage Driver for Docker
LCFS - Storage Driver for DockerLCFS - Storage Driver for Docker
LCFS - Storage Driver for DockerFred Love
 

What's hot (20)

Authenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systemsAuthenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systems
 
Authenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallelAuthenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallel
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux Security
 
Unix Security
Unix SecurityUnix Security
Unix Security
 
White Paper: EMC VNXe Data Protection — A Detailed Review
White Paper: EMC VNXe Data Protection — A Detailed Review   White Paper: EMC VNXe Data Protection — A Detailed Review
White Paper: EMC VNXe Data Protection — A Detailed Review
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS
AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMSAUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS
AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS
 
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
 
Introduction
IntroductionIntroduction
Introduction
 
enabling data integrity protection in regenerating-coding-based cloud storage...
enabling data integrity protection in regenerating-coding-based cloud storage...enabling data integrity protection in regenerating-coding-based cloud storage...
enabling data integrity protection in regenerating-coding-based cloud storage...
 
Ibm system storage n series with multi store and snapmover redp4170
Ibm system storage n series with multi store and snapmover redp4170Ibm system storage n series with multi store and snapmover redp4170
Ibm system storage n series with multi store and snapmover redp4170
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
 
Storage essentials (by Merlin Ran)
Storage essentials (by Merlin Ran)Storage essentials (by Merlin Ran)
Storage essentials (by Merlin Ran)
 
NAS Concepts
NAS ConceptsNAS Concepts
NAS Concepts
 
Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009Linux Kernel Security Overview - KCA 2009
Linux Kernel Security Overview - KCA 2009
 
Block Level Storage Vs File Level Storage
Block Level Storage Vs File Level StorageBlock Level Storage Vs File Level Storage
Block Level Storage Vs File Level Storage
 
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniBSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
 
Linux Network Security
Linux Network SecurityLinux Network Security
Linux Network Security
 
LCFS - Storage Driver for Docker
LCFS - Storage Driver for DockerLCFS - Storage Driver for Docker
LCFS - Storage Driver for Docker
 

Similar to Bloombase StoreSafe Specifications

FalconStor NSS Presentation
FalconStor NSS PresentationFalconStor NSS Presentation
FalconStor NSS Presentationrpsprowl
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security Sandeep Patil
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestIBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestSandeep Patil
 
Solera Networks
Solera NetworksSolera Networks
Solera Networksgigamon
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
Huawei OceanStorDoradoAll-Flashtorage Systems.pdf
Huawei OceanStorDoradoAll-Flashtorage Systems.pdfHuawei OceanStorDoradoAll-Flashtorage Systems.pdf
Huawei OceanStorDoradoAll-Flashtorage Systems.pdfvineeshen2
 
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)David Sweigert
 
Study notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security PractitionerStudy notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security PractitionerDavid Sweigert
 
Sullego Product Overview
Sullego Product OverviewSullego Product Overview
Sullego Product OverviewMike Lee
 
IBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageIBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageTony Pearson
 
Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400RaGaZoMe
 
Storage Technology Overview
Storage Technology OverviewStorage Technology Overview
Storage Technology Overviewnomathjobs
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?Saroj Sahu
 
Ctera robo solution brief
Ctera robo solution briefCtera robo solution brief
Ctera robo solution briefSIA Group
 

Similar to Bloombase StoreSafe Specifications (20)

FalconStor NSS Presentation
FalconStor NSS PresentationFalconStor NSS Presentation
FalconStor NSS Presentation
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security
 
Open ebs 101
Open ebs 101Open ebs 101
Open ebs 101
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestIBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
 
Solera Networks
Solera NetworksSolera Networks
Solera Networks
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Nas fundamentals
Nas fundamentalsNas fundamentals
Nas fundamentals
 
Huawei OceanStorDoradoAll-Flashtorage Systems.pdf
Huawei OceanStorDoradoAll-Flashtorage Systems.pdfHuawei OceanStorDoradoAll-Flashtorage Systems.pdf
Huawei OceanStorDoradoAll-Flashtorage Systems.pdf
 
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)Study notes for CompTIA Certified Advanced Security Practitioner  (ver2)
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
 
Study notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security PractitionerStudy notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security Practitioner
 
Sullego Product Overview
Sullego Product OverviewSullego Product Overview
Sullego Product Overview
 
IBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageIBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object Storage
 
Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400Ficha Tecnica EMC VNX5400
Ficha Tecnica EMC VNX5400
 
Storage Technology Overview
Storage Technology OverviewStorage Technology Overview
Storage Technology Overview
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?
 
110629 nexenta- andy bennett
110629   nexenta- andy bennett110629   nexenta- andy bennett
110629 nexenta- andy bennett
 
NodeGrid Flex
NodeGrid FlexNodeGrid Flex
NodeGrid Flex
 
Web Security
Web SecurityWeb Security
Web Security
 
Ctera robo solution brief
Ctera robo solution briefCtera robo solution brief
Ctera robo solution brief
 
Storage Networks
Storage NetworksStorage Networks
Storage Networks
 

More from Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 

More from Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 

Recently uploaded

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 

Recently uploaded (20)

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 

Bloombase StoreSafe Specifications

  • 1. Features Application Transparent Data-at-Rest Security with Storage Virtualization High performance and intelligent storage virtualization technology delivers security processing of data-at-rest based on data-owner-defined security rules and policies. No user training is required. Data protected is secured on-the-fly requiring no change on user workflow and application logic. Hardware, Platform and Filesystem Independent Bloombase StoreSafe supports all platforms conforming to standards-based storage networking protocols and it operates on the storage networking layer abstracting filesystem underneath and software applications above. High Performance Leveraging Intel AES-NI and various other third-party hardware cryptographic acceleration technologies to minimize performance degradation as a result of latency with real-time encryption and decryption, pushing encryption speed to the limits meeting throughput-computing needs. Flexible and Secure Access Control Fine grain user and host access control suiting all enterprise storage security needs. High Availability Highly scalable and multiple Bloombase StoreSafe software appliances running in cluster for failover in mission- critical systems and load-balancing for high-throughput storage applications. Security NIST FIPS 197 AES cipher algorithm support (NIST certificate #1041) IEEE 1619-compliant AES XTS block cipher RSA public key cryptography (NIST certificate #496) SHA-1, SHA-256, SHA-384, SHA-512 hash generation (NIST certificate #991) Accredited keyed-hash message authentication code generation (NIST certificate #583) Japan NTT/Mitsubishi Electric Camellia cipher algorithm support Korean SEED and ARIA cipher algorithm support GOST, Kalyna and SM4 cipher algorithm support NIST FIPS-46-3 3DES and DES cipher algorithm support RC2, RC4, RC5 and RC6 cipher algorithm support CAST5 cipher algorithm support Twofish and Blowfish cipher algorithm support IDEA cipher algorithm support Serpent and Skipjack cipher algorithm support Post-quantum Cryptography (PQC) cipher algorithms support Pluggable cipher architecture for future cipher upgrade or custom cipher support BLOOMBASE STORESAFE SPECIFICATIONS
  • 2. Storage Systems Direct Attached Storage (DAS) Network Attached Storage (NAS) Storage Area Network (SAN) Tape library, tape drive and virtual tape library (VTL) Content Addressable Storage (CAS) / Cloud Storage / Object Store Privacy Control Automated file-based and block-based encryption on storage device and file write operations Automated decryption on storage device and file read operations on trusted hosts and clients Multiple key encryption Fix-sized file header regardless of actual file size for file-based protection No additional storage required for block-based protection Access Control Fine grain read/write/create/delete/list access control Time-window-based access control Zero alteration to actual storage contents Zero impact to performance Integrity Control Automated filesystem object digital signature generation File integrity verification Multiple key digital signature generation Fix-sized file header regardless of actual file size Write-Once-Read-Many (WORM) Write-once-read-many feature resembling non-rewritable optical media supporting secure archival of data eliminat- ing potential risks being overwritten by intention or accidental operation For storage archival, compliance, dynamic capacity management and information lifecycle management (ILM) Policy based engine dynamically adapts to changing demands in data requirements, by moving files automatically and transparently to appropriate tiered storage Rule based configuration for permanently delete and/or shred file contents Authentication and Authorization User-based and role-based authentication and authorization Generic Lightweight Directory Access Protocol (LDAP) and Microsoft Active Directory (MSAD) authentication and au- thorization Host-based authentication and authorization Microsoft NT Lan Manager (NTLM) authentication Challenge Handshake Authentication Protocol (CHAP) based discovery and authentication
  • 3. Direct Attached Storage (DAS) Extensive Storage Communication Protocol Support Fiber Channel Protocol (FCP) Fiber Channel over Ethernet (FCoE) Internet Small Computer System Interface (iSCSI) Small Computer System Interface (SCSI) Serial Attached SCSI (SAS) Serial Advanced Technology Attachment (SATA) Parallel Advanced Technology Attachment (PATA)/Integrated Drive Electronics (IDE), etc Platform Independent Bloombase OS HP-UX OpenVMS IBM-AIX Sun Solaris Linux Microsoft Windows Mac OS, etc Hardware Interoperability HP IBM Sun StorageTek Dell HDS EMC NetApp Apple Ultra 160 SCSI low voltage differential (LVD) compliant host bus adapter (HBA) Emulex QLogic, etc Filesystem Independent Raw ext2 and ext3 FAT FAT-32 NTFS UFS ZFS CFS VxFS HDFS, etc
  • 4. Network Attached Storage (NAS) Extensive Storage Communication Protocol Support Network File System (NFS) Common Internet File System (CIFS) Server Message Block (SMB) Web-based Distributed Authoring and Versioning (WebDAV) Andrew File System (AFS) NetWare Core Protocol (NCP) Hypertext Transfer Protocol (HTTP) File Transfer Protocol (FTP), etc Platform Independent Bloombase OS HP-UX OpenVMS IBM-AIX Sun Solaris Linux Microsoft Windows Mac OS, etc Hardware Interoperability HP IBM Sun StorageTek Dell HDS EMC NetApp Apple Generic and TCP/IP offloading network interface card (NIC) Neterion Intel, etc Filesystem Independent ext2 and ext3 FAT FAT-32 NTFS UFS ZFS CFS VxFS HDFS, etc
  • 5. Storage Area Network (SAN) Extensive Storage Communication Protocol Support Fiber Channel Protocol (FCP) Fiber Channel over Ethernet (FCoE) Internet Small Computer System Interface (iSCSI), etc Platform Independent Bloombase OS HP-UX OpenVMS IBM-AIX Sun Solaris Linux Microsoft Windows Mac OS, etc Hardware Interoperability HP IBM Sun StorageTek Dell HDS EMC NetApp Apple Brocade Cisco Emulex QLogic ATTO Technology Alacritech, etc Filesystem Independent Raw ext2 and ext3 FAT FAT-32 NTFS UFS ZFS CFS VxFS HDFS, etc
  • 6. Tape Library, Tape Drive and Virtual Tape Library (VTL) Extensive Tape Communication Protocol Support Fiber Channel Small Computer System Interface (SCSI) Serial Attached SCSCI (SAS) Internet Small Computer System Interface (iSCSI), etc Platform Independent Bloombase OS HP-UX OpenVMS IBM-AIX Sun Solaris Linux Microsoft Windows Mac OS, etc Hardware Interoperability HP IBM Oracle Sun StorageTek Dell HDS EMC NetApp Apple Brocade Cisco Quantum CommVault FalconStor Spectra Logic Alacritech, etc Content Addressable Storage (CAS) / Object Store Interoperability Ceph RESTful Object Store EMC Centera EMC ATMOS / ViPR / Elastic Cloud Storage (ECS) Caringo CAStor and Dell Object Storage NetApp SnapLock Hitachi Content Platform (HCP)
  • 7. Cloud Storage Services Amazon Simple Storage Service (S3) Amazon Elastic Block Storage (EBS) Amazon Elastic File System (EFS) IBM Cloud Block Storage IBM Cloud File Storage IBM Cloud Object Storage Google Cloud Storage (Object or Blob Storage) Google Cloud Persistent Disk Google Cloud FileStore Microsoft Azure Blob Storage Microsoft Azure File Storage Microsoft Azure Disk Storage OpenStack Cinder Block Storage OpenStack Swift Object Storage Application Programming Interface REST Web Services Java RMI C application programming interface (API) Key Generation NIST FIPS accredited random number generator (NIST certificate #591) Intel Digital Random Number Generator (DRNG) ID Quantique Quantis true random number generator support (optional) Key Management Multiple certificate authority (CA) support Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion X.509 and PKCS#12 DER and PEM key import and export Key Usage Profiling RDBMS and Generic LDAP Support and Integration Automatic Certificate Retrieval from Certificate Authority via HTTP or LDAP Certificate Validity Check Certificate Revocation Check via HTTP or LDAP Certificate Revocation List (CRL) Certificate Revocation List Distribution Point (CRLDP) Online Certificate Status Protocol (OCSP)
  • 8. Hardware Security Module Support Futurex/VirtuCrypt Marvell Cavium LiquidSecurity HSM / NITROX XL nCipher nShield Oracle Sun Crypto Accelerator Thales Gemalto SafeNet Network HSM / Luna SA Thales Gemalto SafeNet ProtectServer Thales payShield Utimaco CryptoServer Ultra Electronics AEP Keyper PKCS#11 compliant hardware security modules OASIS KMIP compliant key managers Hardware Cryptographic Acceleration Support UltraSPARC cryptographic accelerator Intel Advanced Encryption Standard New Instructions (AES-NI) Exar/Hifn Express DS cards Key Manager Support IBM Security Key Lifecycle Manager (SKLM) (formerly Tivoli Key Lifecycle Manager TKLM) Thales Gemalto SafeNet KeySecure Thales Vormetric DSM (formerly keyAuthority) Utimaco Enterprise Secure Key Manager (ESKM) (formerly HP/HPE/Micro Focus Atalla) Utimaco SecurityServer Cloud Key Management Support AWS CloudHSM AWS Key Management Service (KMS) Google Cloud HSM Google Cloud Key Management Service (KMS) IBM Cloud Key Protect Microsoft Azure Dedicated HSM Microsoft Azure Key Vault
  • 9. Standard Support and Certification IEEE 1619 standard-based mode NIST FIPS 140-2 validated Bloombase Cryptographic Module OASIS Key Management Interoperability Protocol (KMIP) support (optional) Management Web based management console Central administration and configuration User security Serial console SNMP v1, v2c, v3 syslog, auto log rotation and auto archive Heartbeat and keep alive High Availability High-availability option for active-active or active-standby operation Stateless active-standby failover Interoperable with Bloombase Quorum Server to avoid split-brain scenarios (optional) Disaster Recovery Configurations backup and restore FIPS-140 hardware security module recovery key or software recovery key vault for settings restoration (optional) Customer-defined recovery quorum (e.g. 2 of 5) FIPS-140 hardware security module operator key or operator pin for day-to-day Bloombase KeyCastle operation (optional) Operating System Support Bloombase OS Solaris HP-UX OpenVMS IBM AIX Linux Microsoft Windows Apple macOS Hardware Support i386-base architecture AMD 32 and 64 architecture Intel Itanium-2 architecture IBM Power6 architecture PA-RISC architecture UltraSPARC architecture
  • 10. Virtual Platform Support VMware vSphere / ESX / ESXi VMware Server VMware Workstation Red Hat KVM Citrix XenServer Microsoft Hyper-V IBM PowerVM Oracle VM Server Oracle VirtualBox OpenStack Cloud Platform Support Amazon Web Services (AWS) Google Cloud Platform (GCP) IBM Cloud / Bluemix / SoftLayer Microsoft Azure Rackspace Oracle Cloud Software Applications Support ERP, CRM, RDBMS BI, data warehouse, data mining, Hadoop, Big Data analytics File service, CMS, DMS Messaging, group ware, collaborations Virtual server computing, VDI System Requirements System free memory space 1GB Free storage space 2GB Warranty and Maintenance Software maintenance and technical support services are available for subscription Bloombase - Intelligent Storage Firewall email info@bloombase.com web https://www.bloombase.com Copyright 2019 Bloombase, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase in United States, Canada, European Union and/or other jurisdictions. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. Item No. BLBS-Bloombase-StoreSafe-Specifications-USLET-EN-R13