SlideShare a Scribd company logo
1 of 2
A Government
                                                                                                 Bloombase® Spitfire StoreSafe™




                                                                                                                                                              CUSTOMER SPOTLIGHT
Security Control                                                                                  Storage Security Server
                                                                                                 Bloombase® Spitfire StoreSafe™
Organization                                                                                      Lite Storage Security API
                                                                                                 Bloombase® Spitfire KeyCastle™
                                                                                                  Key Management Server


                                                Sensitive departmental information interchange and storage data of govern-
                                                ment security organization are encrypted using Bloombase® Spitfire Store-
                                                Safe™ storage encryption solution achieving end-to-end data in-flight and
AT A GLANCE                                     data at-rest security


 ABOUT THE CUSTOMER                          physical plain originals and copies are   Overview
                                             allowed
 • Government security control organiza-   • Interoperable with IBM WebSphere
                                                                                       A municipal security control organization dynamically allocates
  tion                                       application server and IBM DB2 Univer-
                                             sal Database (UDB) server                 their task forces and automatically reacts to potential incidents
 • Employees: More than 10,000
                                           • Encrypted archives on backup tapes        based on a self-developed intelligence information system. Hun-
 SUMMARY                                   • High performance encryption and           dreds or even thousands of information feeds including weather
                                             decryption                                forecast and reports, local news, foreign news, traffic reports,
 To protect privacy of sensitive data                                                  border and coastal data, calendar events, etc are collected from
 interchange information submitted from    PROJECT OBJECTIVES                          hundreds of data sources every minute. These real time informa-
 various trusted data providers and                                                    tion, structured and/or unstructured, in form of flat files, are
 secure contents in storage sub-systems    • Protects in-flight data submitted from
                                            third parties by HTTP form posts           parsed, extracted and aggregated before they are loaded into a
 and backup tapes from secret data
 exposure to unauthorized parties caused   • Protects filesystem objects, relational   central data warehouse.
 by physical or electronic theft            databases and backup media
                                           • Encrypts dynamic database data stored     Based on various pre-defined data mining rules, real time secu-
                                            in storage area network (SAN)              rity data are analyzed to generate reports, milestones and alerts
 KEY CHALLENGES
                                                                                       to proactively monitor potential hazards and risks. With response
 • Support heterogeneous host operating
                                           SOLUTIONS AND SERVICES
                                                                                       to these possible outcomes closely monitored and tracked by the
   systems including Microsoft Windows,                                                24x7 operation unit, the bureau dynamically reacts and allocates
   IBM AIX, etc                            • Spitfire KeyCastle™ key management
                                             server                                    resources and task forces to combat such potential incidents,
 • No change to end user, administrator
   and operator workflow                   • Spitfire StoreSafe™ Lite storage secu-    better control the worsening situation, if any, or even suppress
 • No coding or second development           rity API                                  outbreak of the incidents.
   required                                • Spitfire StoreSafe™ enterprise storage
 • Sensitive information are physically      security server
                                                                                       Among these incoming information feeds, data warehouse and
   stored encrypted at all times and no                                                reports repository are extremely sensitive and are under airtight
                                                                                       political and security privacy regulatory. In application’s perspec-
tive, security measures limit access to the sys-
              tem to authorized personnel only, protecting                                       WHY BLOOMBASE SOLUTIONS                                                    tion
              from unauthorized access. Network communica-
                                                                                                 • All in one solution     to achieve data in-flight and                  HARDWARE
              tions of these controlled information are secured                                   at-rest security
              by secure socket layer (SSL) powered by AES 256                                    • Platform independence                                                  • IBM x-Series servers
              -bit strong encryption with industry proven                                        • NIST FIPS-140-2 level-3 tamper proof and                               • IBM p-Series servers
              secure key exchange, thus, sensitive data expo-                                     tamper resistant key protection                                         • IBM TotalStorage DS4100 SAN storage
              sure due to eavesdropping is eliminated. Physi-                                    • Full lifecycle key management                                          • IBM tape library
                                                                                                                                                                          • Sun Microsystems Sun Fire X2100 servers
              cal access to the computing hardware, whether
              at primary data center or disaster recovery (DR)
                                                                                                 IMPLEMENTATION HIGHLIGHTS
                                                                                                                                                                          OPERATING SYSTEM
              site, are securely isolated and under strict physi-                                First customer to practice both data-in-flight
              cal access control, blocking possible physical                                     and data-at-rest protection for end-to-end                               • Microsoft Windows Server 2003
              tampering and data/hardware theft.                                                 security of highly available sensitive business                          • IBM AIX 5.3
                                                                                                 data interchange and persistence                                         • Novell SUSE Linux Enterprise 9
              With all these security measures in place which
              are generally considered border or perimeter                                       KEY BENEFITS                                                              SOFTWARE
              protection, the data system is vulnerable to core
                                                                                                 • No client user
                                                                                                                training required for third party                         • IBM WebSphere application server
              attacks, unknown attacks and outbound threats                                       data providers                                                          • IBM DB2 Universal Database
              such as operator/insider attacks, spyware at-                                      • Application transparency                                               • IBM Lotus Domino messaging server
              tacks and viral outbreaks, etc.                                                    • High encryption performance                                            • IBM Tivoli Storage Manager (TSM)
                                                                                                 • Highly available and fault-tolerant                                    • Symantec Storage Foundation
                                                                                                 • Tamper proof and tamper resistant key protec-
              The Mission Critical Encryp-
              tion                                                                           After a three-months evaluation process, end                                   DS4100 SAN in form of flat file. A job is sched-
                                                                                             customer selected Bloombase® Spitfire™ enter-                                  uled to run every other minute at an IBM Web-
              To cope with these challenges and meet national
                                                                                             prise security solution over rivals taking kernel-                             Sphere application server to scan for latest
              data privacy requirements, end customer needs
                                                                                             based, database column-based, and hardware                                     information feeds, access of ciphered incoming
              to implement effective data encryption to secure
                                                                                             appliance-based encryption approaches.                                         files via Spitfire™ StoreSafe security server
              information exchange with various data provid-
                                                                                                                                                                            provides a virtual plain view of sensitive con-
              ers, protect data repository storage, data ware-
                                                                                             Deployment of Bloombase® Spitfire™ KeyCastle                                   tents to be extracted and bulk imported into a
              house and backup archives at both primary and
                                                                                             key management servers and Spitfire™ Store-                                    data warehouse powered by IBM DB2 UDB.
              disaster recovery systems.
                                                                                             Safe storage security servers completed within 3                               Read/write access of DB2 UDB is made via a
                                                                                             days whereas initial data migration of incoming                                highly available Spitfire™ StoreSafe server
              Implementing encryption on this mission critical
                                                                                             information feed repository, IBM DB2 UDB data                                  cluster. Thus, during bulk import of information,
              system is full of constraints, baseline require-
                                                                                             files and report storage area took merely another                              sensitive information are first encrypted on-the-
              ments being data in-flight and at-rest are se-
                                                                                             surprisingly 2 days.                                                           fly by Spitfire™ StoreSafe before they are per-
              curely encrypted by AES 256-bit cryptographic
                                                                                                                                                                            sisted onto SAN, vice versa, on execution of data
              cipher, high availability ready and fault-tolerant,
                                                                                             An active self executing component is deployed                                 -mining procedures, ciphered data warehouse
              tamper proof and tamper resistant key protec-
                                                                                             at every data providers’ internal network to poll                              data are deciphered at real time on demand prior
              tion and management. On the other hand, the
                                                                                             for latest news and information. These sensitive                               to actual query reads. Analysis results in form of
              encryption solution has to fit perfectly into end
                                                                                             information feeds are encrypted automatically as                               data records and large binary objects are stored
              customer’s three-tier architecture at zero
                                                                                             they are uploaded to the intelligence system by                                in another DB2 UDB instance which is also pro-
              change, no application change, no database
                                                                                             Spitfire™ StoreSafe Lite storage security API with                             tected by Spitfire™ StoreSafe storage encryption
              object change and last but not least, to be fully
                                                                                             channel further protected by SSL. The ciphered                                 servers. Again, only when these sensitive mile-
              transparent to applications, administrators,
                                                                                             information feed is temporarily stored at a stag-                              stones are accessed and presented to author-
              operators and users.
                                                                                             ing area physically located at IBM TotalStorage                                ized personnel will the private information be
                                                                                                                                                                                           deciphered at wire-speed by Spit-
                                                                                                                                                                                           fire™ StoreSafe. Ciphered block
                                                                                                                                                                                           based SAN storage updates are
                                                                                                                                                                                           automatically synchronized from
                                                                                                                                                                                           primary site to DR site via a virtual
                                                                                                                                                                                           private lease line to be further
                                                                                                                                                                                           reconstructed and applied to the
                                                                                                                                                                                           DR SAN sub-system. Further,
                                                                                                                                                                                           backup archives are created di-
                                                                                                                                                                                           rectly from ciphered physical stor-
                                                                                                                                                                                           age system and stored on magnetic
                                                                                                                                                                                           tape cartridges for backup and sent
                                                                                                                                                                                           offsite for safe storage.

                                                                                                                                                                                         The entire life-cycle of sensitive
                                                                                                                                                                                         incident information is secured by
                                                                                                                                                                                         Spitfire™ StoreSafe at complete
                                                                                                                                                                                         application transparency. Highly
                                                                                                                                                                                         regulated digital data in form of
                                                                                                                                                                                         files, disk data blocks, database
                                                                                                                                                                                         entries and tape are privately
                                                                                                                                                                                         locked down onto generic enter-
                                                                                                                                                                                         prise storage infrastructure by
                                                                                                                                                                                         strong encryption at all times,
                                                                                                                                                                                         effectively forbidding possible core
                                                                                                                                                                                         attacks that might lead to serious
                                                                                                                                                                                         private data exposure at the mini-
                                                                                                                                                                                         mal costs and risks of implementa-
                                                                                                                                                                                         tion.




© 2006 Bloombase Technologies. All rights reserved. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their
respective logos are trademarks or registered trademarks of Bloombase Technologies Ltd in United States, Hong Kong, China and in several other countries all over the world. All
other product and service names mentioned are the trademarks of their respective companies.

The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors
or omissions contained herein.

4AA0-0696AAC 09/2006

More Related Content

What's hot

Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 
SUSE Linux Enterprise Server for System z SP1
SUSE Linux Enterprise Server  for System z SP1 SUSE Linux Enterprise Server  for System z SP1
SUSE Linux Enterprise Server for System z SP1 Novell
 
SANsymphony V
SANsymphony VSANsymphony V
SANsymphony VTTEC
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center VirtualizationCarahsoft
 
Guardium
GuardiumGuardium
Guardiumgigamon
 
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSafeNet
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02frank4dd
 
Presentation hds basic operating system v
Presentation   hds basic operating system vPresentation   hds basic operating system v
Presentation hds basic operating system vxKinAnx
 

What's hot (11)

Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
SUSE Linux Enterprise Server for System z SP1
SUSE Linux Enterprise Server  for System z SP1 SUSE Linux Enterprise Server  for System z SP1
SUSE Linux Enterprise Server for System z SP1
 
SANsymphony V
SANsymphony VSANsymphony V
SANsymphony V
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center Virtualization
 
H8520 vnx-family-ds
H8520 vnx-family-dsH8520 vnx-family-ds
H8520 vnx-family-ds
 
Guardium
GuardiumGuardium
Guardium
 
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security Guide
 
Datasheet stonegate fw-allinone
Datasheet stonegate fw-allinoneDatasheet stonegate fw-allinone
Datasheet stonegate fw-allinone
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02
 
µ-Xen
µ-Xenµ-Xen
µ-Xen
 
Presentation hds basic operating system v
Presentation   hds basic operating system vPresentation   hds basic operating system v
Presentation hds basic operating system v
 

Similar to Government Security Organization Encrypts Sensitive Data with Bloombase Storage Solution

Customer Success - A Government Security Agency
Customer Success - A Government Security AgencyCustomer Success - A Government Security Agency
Customer Success - A Government Security AgencyBloombase
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf MattssonUlf Mattsson
 
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...Bloombase
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection CompanyASBIS SK
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudSafeNet
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase
 
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-PacificCustomer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-PacificBloombase
 
Salesforce Cloud Security
Salesforce Cloud SecuritySalesforce Cloud Security
Salesforce Cloud Securitywaubin
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directionsxKinAnx
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
Symantec - Data Governance in the Cloud
Symantec - Data Governance in the CloudSymantec - Data Governance in the Cloud
Symantec - Data Governance in the CloudAmazon Web Services
 
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaSecurity and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaAmazon Web Services
 

Similar to Government Security Organization Encrypts Sensitive Data with Bloombase Storage Solution (20)

Customer Success - A Government Security Agency
Customer Success - A Government Security AgencyCustomer Success - A Government Security Agency
Customer Success - A Government Security Agency
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
 
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the Cloud
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-PacificCustomer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
 
Salesforce Cloud Security
Salesforce Cloud SecuritySalesforce Cloud Security
Salesforce Cloud Security
 
SIEM evolution
SIEM evolutionSIEM evolution
SIEM evolution
 
Sklm webinar
Sklm webinarSklm webinar
Sklm webinar
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
TruWest
TruWestTruWest
TruWest
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Symantec - Data Governance in the Cloud
Symantec - Data Governance in the CloudSymantec - Data Governance in the Cloud
Symantec - Data Governance in the Cloud
 
Ibm spectrum protect
Ibm spectrum protect Ibm spectrum protect
Ibm spectrum protect
 
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaSecurity and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
 

More from Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 

More from Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Government Security Organization Encrypts Sensitive Data with Bloombase Storage Solution

  • 1. A Government Bloombase® Spitfire StoreSafe™ CUSTOMER SPOTLIGHT Security Control Storage Security Server Bloombase® Spitfire StoreSafe™ Organization Lite Storage Security API Bloombase® Spitfire KeyCastle™ Key Management Server Sensitive departmental information interchange and storage data of govern- ment security organization are encrypted using Bloombase® Spitfire Store- Safe™ storage encryption solution achieving end-to-end data in-flight and AT A GLANCE data at-rest security ABOUT THE CUSTOMER physical plain originals and copies are Overview allowed • Government security control organiza- • Interoperable with IBM WebSphere A municipal security control organization dynamically allocates tion application server and IBM DB2 Univer- sal Database (UDB) server their task forces and automatically reacts to potential incidents • Employees: More than 10,000 • Encrypted archives on backup tapes based on a self-developed intelligence information system. Hun- SUMMARY • High performance encryption and dreds or even thousands of information feeds including weather decryption forecast and reports, local news, foreign news, traffic reports, To protect privacy of sensitive data border and coastal data, calendar events, etc are collected from interchange information submitted from PROJECT OBJECTIVES hundreds of data sources every minute. These real time informa- various trusted data providers and tion, structured and/or unstructured, in form of flat files, are secure contents in storage sub-systems • Protects in-flight data submitted from third parties by HTTP form posts parsed, extracted and aggregated before they are loaded into a and backup tapes from secret data exposure to unauthorized parties caused • Protects filesystem objects, relational central data warehouse. by physical or electronic theft databases and backup media • Encrypts dynamic database data stored Based on various pre-defined data mining rules, real time secu- in storage area network (SAN) rity data are analyzed to generate reports, milestones and alerts KEY CHALLENGES to proactively monitor potential hazards and risks. With response • Support heterogeneous host operating SOLUTIONS AND SERVICES to these possible outcomes closely monitored and tracked by the systems including Microsoft Windows, 24x7 operation unit, the bureau dynamically reacts and allocates IBM AIX, etc • Spitfire KeyCastle™ key management server resources and task forces to combat such potential incidents, • No change to end user, administrator and operator workflow • Spitfire StoreSafe™ Lite storage secu- better control the worsening situation, if any, or even suppress • No coding or second development rity API outbreak of the incidents. required • Spitfire StoreSafe™ enterprise storage • Sensitive information are physically security server Among these incoming information feeds, data warehouse and stored encrypted at all times and no reports repository are extremely sensitive and are under airtight political and security privacy regulatory. In application’s perspec-
  • 2. tive, security measures limit access to the sys- tem to authorized personnel only, protecting WHY BLOOMBASE SOLUTIONS tion from unauthorized access. Network communica- • All in one solution to achieve data in-flight and HARDWARE tions of these controlled information are secured at-rest security by secure socket layer (SSL) powered by AES 256 • Platform independence • IBM x-Series servers -bit strong encryption with industry proven • NIST FIPS-140-2 level-3 tamper proof and • IBM p-Series servers secure key exchange, thus, sensitive data expo- tamper resistant key protection • IBM TotalStorage DS4100 SAN storage sure due to eavesdropping is eliminated. Physi- • Full lifecycle key management • IBM tape library • Sun Microsystems Sun Fire X2100 servers cal access to the computing hardware, whether at primary data center or disaster recovery (DR) IMPLEMENTATION HIGHLIGHTS OPERATING SYSTEM site, are securely isolated and under strict physi- First customer to practice both data-in-flight cal access control, blocking possible physical and data-at-rest protection for end-to-end • Microsoft Windows Server 2003 tampering and data/hardware theft. security of highly available sensitive business • IBM AIX 5.3 data interchange and persistence • Novell SUSE Linux Enterprise 9 With all these security measures in place which are generally considered border or perimeter KEY BENEFITS SOFTWARE protection, the data system is vulnerable to core • No client user training required for third party • IBM WebSphere application server attacks, unknown attacks and outbound threats data providers • IBM DB2 Universal Database such as operator/insider attacks, spyware at- • Application transparency • IBM Lotus Domino messaging server tacks and viral outbreaks, etc. • High encryption performance • IBM Tivoli Storage Manager (TSM) • Highly available and fault-tolerant • Symantec Storage Foundation • Tamper proof and tamper resistant key protec- The Mission Critical Encryp- tion After a three-months evaluation process, end DS4100 SAN in form of flat file. A job is sched- customer selected Bloombase® Spitfire™ enter- uled to run every other minute at an IBM Web- To cope with these challenges and meet national prise security solution over rivals taking kernel- Sphere application server to scan for latest data privacy requirements, end customer needs based, database column-based, and hardware information feeds, access of ciphered incoming to implement effective data encryption to secure appliance-based encryption approaches. files via Spitfire™ StoreSafe security server information exchange with various data provid- provides a virtual plain view of sensitive con- ers, protect data repository storage, data ware- Deployment of Bloombase® Spitfire™ KeyCastle tents to be extracted and bulk imported into a house and backup archives at both primary and key management servers and Spitfire™ Store- data warehouse powered by IBM DB2 UDB. disaster recovery systems. Safe storage security servers completed within 3 Read/write access of DB2 UDB is made via a days whereas initial data migration of incoming highly available Spitfire™ StoreSafe server Implementing encryption on this mission critical information feed repository, IBM DB2 UDB data cluster. Thus, during bulk import of information, system is full of constraints, baseline require- files and report storage area took merely another sensitive information are first encrypted on-the- ments being data in-flight and at-rest are se- surprisingly 2 days. fly by Spitfire™ StoreSafe before they are per- curely encrypted by AES 256-bit cryptographic sisted onto SAN, vice versa, on execution of data cipher, high availability ready and fault-tolerant, An active self executing component is deployed -mining procedures, ciphered data warehouse tamper proof and tamper resistant key protec- at every data providers’ internal network to poll data are deciphered at real time on demand prior tion and management. On the other hand, the for latest news and information. These sensitive to actual query reads. Analysis results in form of encryption solution has to fit perfectly into end information feeds are encrypted automatically as data records and large binary objects are stored customer’s three-tier architecture at zero they are uploaded to the intelligence system by in another DB2 UDB instance which is also pro- change, no application change, no database Spitfire™ StoreSafe Lite storage security API with tected by Spitfire™ StoreSafe storage encryption object change and last but not least, to be fully channel further protected by SSL. The ciphered servers. Again, only when these sensitive mile- transparent to applications, administrators, information feed is temporarily stored at a stag- stones are accessed and presented to author- operators and users. ing area physically located at IBM TotalStorage ized personnel will the private information be deciphered at wire-speed by Spit- fire™ StoreSafe. Ciphered block based SAN storage updates are automatically synchronized from primary site to DR site via a virtual private lease line to be further reconstructed and applied to the DR SAN sub-system. Further, backup archives are created di- rectly from ciphered physical stor- age system and stored on magnetic tape cartridges for backup and sent offsite for safe storage. The entire life-cycle of sensitive incident information is secured by Spitfire™ StoreSafe at complete application transparency. Highly regulated digital data in form of files, disk data blocks, database entries and tape are privately locked down onto generic enter- prise storage infrastructure by strong encryption at all times, effectively forbidding possible core attacks that might lead to serious private data exposure at the mini- mal costs and risks of implementa- tion. © 2006 Bloombase Technologies. All rights reserved. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase Technologies Ltd in United States, Hong Kong, China and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. 4AA0-0696AAC 09/2006