SlideShare a Scribd company logo
Specification Sheet




                      Bloombase Spitfire StoreSafe Storage
                      Security Server

                      Features
                      Transparent Encryption and Decryption
                      High performance and intelligent cryptographic engine sensing network storage information and carry out
                      cryptographic operations based on user-predefined rules. No user training required. Data to be stored are
                      encrypted and data to be read are decrypted automatically on the fly under the covers requiring no change
                      on user workflow and application logic.

                      Hardware, Platform and Filesystem Independent
                      Spitfire StoreSafe Security Server supports all platforms conforming to industrial storage communications
                      protocols and it operates on the storage networking layer abstracting filesystem underneath or above.

                      High Performance
                      Patent pending Spitfire Transparent Cache minimizes performance degradation as a result of real-time
                      encryption and decryption, pushing encryption throughput to the limits at gigabit and 10-gigabit wire-
                      speeds.

                      Flexible and Secure Access Control
                      Fine grain user and host access control suiting all enterprise storage security needs.

                      High Availability
                      Highly scalable and multiple Spitfire StoreSafe boxes running in cluster for failover in mission-critical
                      systems and load-balancing for high-throughput storage systems.



                      Security
                      Industry-proven cryptographic processing engine
                      NIST FIPS-197 AES encryption and decryption
                      IEEE 1619-compliant AES XTS block cipher
                      Japan NTT/Mitsubishi Electric Camellia encryption and decryption
                      Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption
                      NIST FIPS-46-3 3DES and DES encryption and decryption
                      RC2, RC4, RC5 and RC6 encryption and decryption
                      CAST5 encryption and decryption
                      Twofish and Blowfish encryption and decryption
                      IDEA encryption and decryption
                      Serpent and Skipjack encryption and decryption
                      Pluggable cipher architecture for future cipher upgrade or custom cipher support
                      128, 256, 512, 1024 and 2048 bit public key cryptography
                      RSA and DSA public key cryptography
                      SHA-1, MD5 and Chinese National SCH(SM3) hash generation
                      Hardware ASIC cryptographic acceleration (optional)
                      Obfuscation and data shuffling for simple data hiding


                                                                  www.bloombase.com
Storage Systems
Direct Attached Storage (DAS)
Network Attached Storage (NAS)
Storage Area Network (SAN)
Fiber Channel (FC) and LVD SCSI tape library and virtual tape library (VTL)



Privacy Control
Automated file-based and block-based encryption on storage device and file write operations
Automated decryption on storage device and file read operations on trusted hosts and clients
Multiple key encryption
Fix-sized file header regardless of actual file size for file-based protection
No additional storage required for block-based protection



Access Control
Fine grain read/write/create/delete/list access control
Time-window-based access control
Zero alteration to actual storage contents
Zero impact to performance



Integrity Control
Automated filesystem object digital signature generation
File integrity verification
Multiple key digital signature generation
Fix-sized file header regardless of actual file size



Write-Once-Read-Many (WORM)
Write-once-read-many feature resembling non-rewritable optical media supporting secure archival of data
eliminating potential risks being overwritten by intention or accidental operation
For storage archival, compliance, dynamic capacity management and information lifecycle management
(ILM)
Policy based engine dynamically adapts to changing demands in data requirements, by moving files auto-
matically and transparently to appropriate tiered storage
Rule based configuration for permanently delete and/or shred file contents



Authentication and Authorization
User-based and role-based authentication and authorization
Generic Lightweight Directory Access Protocol (LDAP) and Microsoft Active Directory (MSAD) authentication
and authorization
Host-based authentication and authorization
Microsoft NT Lan Manager (NTLM) authentication
Challenge Handshake Authentication Protocol (CHAP) based discovery and authentication




                                             www.bloombase.com
Direct Attached Storage (DAS)
Extensive Storage Communication Protocol Support
Fiber Channel Protocol (FCP)
Fiber Channel over Ethernet (FCoE)
Internet Small Computer System Interface (iSCSI)
Small Computer System Interface (SCSI)
Serial Attached SCSI (SAS)
Serial Advanced Technology Attachment (SATA)
Parallel Advanced Technology Attachment (PATA)/Integrated Drive Electronics (IDE), etc

Platform Independent
Bloombase SpitfireOS
HP-UX
OpenVMS
IBM-AIX
Sun Solaris
Linux
Microsoft Windows
Mac OS, etc

Hardware Interoperability
HP
IBM
Sun StorageTek
Dell
HDS
EMC
NetApp
Apple
Ultra 160 SCSI low voltage differential (LVD) compliant host bus adapter (HBA)
Emulex
Qlogic, etc

Filesystem Independent
Raw
ext2 and ext3
FAT
FAT-32
NTFS
UFS
ZFS
CFS
VxFS, etc




                                           www.bloombase.com
Network Attached Storage (NAS)
Extensive Storage Communication Protocol Support
Network File System (NFS)
Common Internet File System (CIFS)/Server Message Block (SMB)
Andrew File System (AFS)
NetWare Core Protocol (NCP)
Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FTP), etc

Platform Independent
Bloombase SpitfireOS
HP-UX
OpenVMS
IBM-AIX
Sun Solaris
Linux
Microsoft Windows
Mac OS, etc

Hardware Interoperability
HP
IBM
Sun StorageTek
Dell
HDS
EMC
NetApp
Apple
Generic and TCP/IP offloading network interface card (NIC)
Neterion
Intel, etc

Filesystem Independent
ext2 and ext3
FAT
FAT-32
NTFS
UFS
ZFS
CFS
VxFS, etc




                                          www.bloombase.com
Storage Area Network (SAN)
Extensive Storage Communication Protocol Support
Fiber Channel Protocol (FCP)
Fiber Channel over Ethernet (FCoE)
Internet Small Computer System Interface (iSCSI), etc

Platform Independent
Bloombase SpitfireOS
HP-UX
OpenVMS
IBM-AIX
Sun Solaris
Linux
Microsoft Windows
Mac OS, etc

Hardware Interoperability
HP
IBM
Sun StorageTek
Dell
HDS
EMC
NetApp
Apple
Brocade
Cisco
Emulex
Qlogic
Alacritech, etc

Filesystem Independent
Raw
ext2 and ext3
FAT
FAT-32
NTFS
UFS
ZFS
CFS
VxFS, etc




                                          www.bloombase.com
Tape Library and Virtual Tape Library (VTL)
Extensive Tape Communication Protocol Support
Fiber Channel
Low Voltage Differential (LVD) Small Computer System Interface (SCSI), etc

Platform Independent
Bloombase SpitfireOS
HP-UX
OpenVMS
IBM-AIX
Sun Solaris
Linux
Microsoft Windows
Mac OS, etc

Hardware Interoperability
HP
IBM
Sun StorageTek
Dell
HDS
EMC
NetApp
Apple
Brocade
Cisco
Emulex
Qlogic
Quantum
CommVault
FalconStor
Alacritech, etc




                                          www.bloombase.com
Key Management
Multiple certificate authority (CA) support
Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion
Built-in certificate request and revocation check (CRL/OCSP)
X.509 and PKCS#12 DER and PEM key import and export
Key Usage Profiling
RDBMS and Generic LDAP Support and Integration
Industry Standard PKCS#11
NIST FIPS-140-1 level 2 cryptographic module support (optional)
Automatic Certificate Retrieval via HTTP or LDAP
Certificate Validity Check
Certificate Revocation Check via HTTP or LDAP
Certificate Revocation List (CRL)
Certificate Revocation List Distribution Point (CRLDP)
Online Certificate Status Protocal (OCSP)
CRL scheduled download, caching and automatic retry
OCSP scheduled request, caching and automatic retry



Hardware Security Module Support
Gemalto/Schlumberger/Axalto Cryptoflex
Gemalto/Schlumberger/Axalto Cyberflex
Gemalto/Schlumberger/Axalto e-gate
Gemalto/Gemplus GPK
Aladdin eToken PRO
Hifn Express DS cards
Sun Microsystems Crypto Accelerator cards
Siemens CardOS M4
IBM JCOP
Micardo
Oberthur 64k Java-card
OpenPGP 1.0 card
Setcos 4.4.1 cards
RSA SecurID 3100 cards
Giesecke & Devrient Starcos
Eutrom CryptoIdendity IT-SEC
Rainbow iKey 3000




                                              www.bloombase.com
Standard Support and Certification
IEEE 1619 standard-based mode
OASIS Key Management Interoperability Protocol (KMIP) support
NIST FIPS 140-2 compliant Bloombase Cryptographic Module



Management
Web based management console
Central administration and configuration
User security
Serial console
SNMP v1, v2c, v3
syslog, auto log rotation and auto archive
Heartbeat and keep alive



Disaster Recovery
Configurations backup and restore
FIPS-140 hardware security module recovery key or software recovery key vault for settings restoration
Customer-defined recovery quorum (e.g. 2 of 5)
FIPS-140 hardware security module operator key or operator pin for daily Spitfire KeyCastle operation
High-availability option for active-active or active-standby operation
Stateless active-standby failover



Platform Support
Bloombase SpitfireOS
Solaris
HP-UX
OpenVMS
IBM AIX
Linux
Microsoft Windows
Mac OS X



Hardware Support
i386-base architecture
AMD 32 and 64 architecture
Intel Itanium-2 architecture
IBM Power6 architecture
PA-RISC architecture
UltraSPARC architecture




                                             www.bloombase.com
System Requirements
                                                                            System free memory 1GB
                                                                            Free storage space 1GB



                                                                            Warranty and Maintenance
                                                                            Software maintenance and support services are available.




Bloombase Technologies - Information Security Company

email info@bloombase.com
web http://www.bloombase.com


Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products
and services mentioned herein as well as their respective logos are
trademarks or registered trademarks of Bloombase Technologies Ltd in
Hong Kong, China and in several other countries all over the world. All
other product and service names mentioned are the trademarks of their
respective companies.

The information contained herein is subject to change without notice.
The only warranties for Bloombase products and services are set forth in
the express warranty statements accompanying such products and
services. Nothing herein should be construed as constituting an addi-
tional warranty. Bloombase shall not be liable for technical or editorial
errors or omissions contained herein.

Copyright 2008 Bloombase Technologies. All rights reserved.

Specification Sheet
H87998                                                                                                               www.bloombase.com

More Related Content

What's hot

Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452
IOSR Journals
 
High end security for low-end microcontrollers
High end security for low-end microcontrollersHigh end security for low-end microcontrollers
High end security for low-end microcontrollers
Milosch Meriac
 
Introduction to CPSA
Introduction to CPSAIntroduction to CPSA
Introduction to CPSA
fullhouseweb
 
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniBSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
Shellmates
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
eyad alaa
 
Linux security-fosster-09
Linux security-fosster-09Linux security-fosster-09
Linux security-fosster-09
Dr. Jayaraj Poroor
 
6550
65506550
VLSI IEEE 2014 TITLES
VLSI IEEE 2014 TITLESVLSI IEEE 2014 TITLES
VLSI IEEE 2014 TITLES
Arudhra Innovations
 
Essential security for linux servers
Essential security for linux serversEssential security for linux servers
Essential security for linux servers
Juan Carlos Pérez Pardo
 
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security
 
Pki Training V1.5
Pki Training V1.5Pki Training V1.5
Pki Training V1.5
Sylvain Maret
 
Futex ppt
Futex  pptFutex  ppt
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and DevicesTriangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Tyler Shields
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
Luigi Perrone
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
cnnetwork
 
A pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsA pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security Solutions
B.A.
 
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Cisco Russia
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
David Sweigert
 
15-382_TenAsys-RTOS-DataSheet_HI
15-382_TenAsys-RTOS-DataSheet_HI15-382_TenAsys-RTOS-DataSheet_HI
15-382_TenAsys-RTOS-DataSheet_HI
Assaf Galil
 
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...
gueste37130
 

What's hot (20)

Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452
 
High end security for low-end microcontrollers
High end security for low-end microcontrollersHigh end security for low-end microcontrollers
High end security for low-end microcontrollers
 
Introduction to CPSA
Introduction to CPSAIntroduction to CPSA
Introduction to CPSA
 
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal HarouniBSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
Linux security-fosster-09
Linux security-fosster-09Linux security-fosster-09
Linux security-fosster-09
 
6550
65506550
6550
 
VLSI IEEE 2014 TITLES
VLSI IEEE 2014 TITLESVLSI IEEE 2014 TITLES
VLSI IEEE 2014 TITLES
 
Essential security for linux servers
Essential security for linux serversEssential security for linux servers
Essential security for linux servers
 
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentation
 
Pki Training V1.5
Pki Training V1.5Pki Training V1.5
Pki Training V1.5
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and DevicesTriangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
Triangle InfoSecCon - Detecting Certified Pre-Owned Software and Devices
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
 
CipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecureCipherWire Networks - SafeNet KeySecure
CipherWire Networks - SafeNet KeySecure
 
A pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security SolutionsA pinguin as a bouncer... Open Source Security Solutions
A pinguin as a bouncer... Open Source Security Solutions
 
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
15-382_TenAsys-RTOS-DataSheet_HI
15-382_TenAsys-RTOS-DataSheet_HI15-382_TenAsys-RTOS-DataSheet_HI
15-382_TenAsys-RTOS-DataSheet_HI
 
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...
 

Viewers also liked

Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Bloombase
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Bloombase
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase
 
Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2
Bloombase
 
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Bloombase
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase
 
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Bloombase
 
ES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager Essentials
Bloombase
 
Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server Specifications
Bloombase
 
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Bloombase
 
Bloombase Spitfire SOA Compatibility Matrix
Bloombase Spitfire SOA Compatibility MatrixBloombase Spitfire SOA Compatibility Matrix
Bloombase Spitfire SOA Compatibility Matrix
Bloombase
 
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Bloombase
 
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Bloombase
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Bloombase
 

Viewers also liked (15)

Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
Performance Benchmarks for Bloombase Spitfire StoreSafe Encryption Security S...
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
 
Bloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility MatrixBloombase Spitfire Identity Manager Compatibility Matrix
Bloombase Spitfire Identity Manager Compatibility Matrix
 
Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-aix-oracle-encryption-application-notes-uslet-en-r2
 
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
Blbs an-encryption-oracle-bloombase-store safe-nec-express-5800ft-application...
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
 
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
 
ES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager EssentialsES-351 Bloombase Spitfire Identity Manager Essentials
ES-351 Bloombase Spitfire Identity Manager Essentials
 
Bloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server SpecificationsBloombase Spitfire Messaging Security Server Specifications
Bloombase Spitfire Messaging Security Server Specifications
 
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
Blbs tn-bloombase-store safe-nas-benchmarking-uslet-en-r3
 
Bloombase Spitfire SOA Compatibility Matrix
Bloombase Spitfire SOA Compatibility MatrixBloombase Spitfire SOA Compatibility Matrix
Bloombase Spitfire SOA Compatibility Matrix
 
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter InteroperabilityBloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
Bloombase Spitfire StoreSafe QLogic 10GbE Ethernet Adapter Interoperability
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
Interoperability of Bloombase Spitfire StoreSafe Security Server and Brocade ...
 
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
 
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
Interoperability of Bloombase Spitfire StoreSafe Security Server and ATTO Cel...
 

Similar to Bloombase Spitfire StoreSafe Security Server Specifications

Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase
 
Bloombase Spitfire Ethernet Encryptor Specifications
Bloombase Spitfire Ethernet Encryptor SpecificationsBloombase Spitfire Ethernet Encryptor Specifications
Bloombase Spitfire Ethernet Encryptor Specifications
Bloombase
 
Bloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server SpecificationsBloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server Specifications
Bloombase
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestIBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
Sandeep Patil
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase
 
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presales
Mustafa Kuğu
 
FalconStor NSS Presentation
FalconStor NSS PresentationFalconStor NSS Presentation
FalconStor NSS Presentation
rpsprowl
 
Quickassist adapter-8960-8970-brief
Quickassist adapter-8960-8970-briefQuickassist adapter-8960-8970-brief
Quickassist adapter-8960-8970-brief
Vijaianand Sundaramoorthy
 
ComWorth' Sirius SwiftWing Hi Performance Capture & Storage Solutions
ComWorth'  Sirius SwiftWing Hi Performance Capture & Storage SolutionsComWorth'  Sirius SwiftWing Hi Performance Capture & Storage Solutions
ComWorth' Sirius SwiftWing Hi Performance Capture & Storage Solutions
ComWorth Europe
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
ADVA
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security
Sandeep Patil
 
ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.
Advanced Card Systems Ltd.
 
High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...
Ramesh Nagappan
 
NodeGrid Flex
NodeGrid FlexNodeGrid Flex
NodeGrid Flex
zpeofficial
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
Bloombase
 
Securing Millions of Devices
Securing Millions of DevicesSecuring Millions of Devices
Securing Millions of Devices
Kai Hudalla
 
Bloombase StoreSafe Compatibility Matrix
Bloombase StoreSafe Compatibility MatrixBloombase StoreSafe Compatibility Matrix
Bloombase StoreSafe Compatibility Matrix
Bloombase
 
Summit 16: Deploying Virtualized Mobile Infrastructures on Openstack
Summit 16: Deploying Virtualized Mobile Infrastructures on OpenstackSummit 16: Deploying Virtualized Mobile Infrastructures on Openstack
Summit 16: Deploying Virtualized Mobile Infrastructures on Openstack
OPNFV
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
amber724300
 
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIOHigh Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
Rebekah Rodriguez
 

Similar to Bloombase Spitfire StoreSafe Security Server Specifications (20)

Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server SpecificationsBloombase Spitfire KeyCastle Payment Systems Key Server Specifications
Bloombase Spitfire KeyCastle Payment Systems Key Server Specifications
 
Bloombase Spitfire Ethernet Encryptor Specifications
Bloombase Spitfire Ethernet Encryptor SpecificationsBloombase Spitfire Ethernet Encryptor Specifications
Bloombase Spitfire Ethernet Encryptor Specifications
 
Bloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server SpecificationsBloombase Spitfire SOA Security Server Specifications
Bloombase Spitfire SOA Security Server Specifications
 
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and RestIBM Spectrum Scale Secure- Secure Data in Motion and Rest
IBM Spectrum Scale Secure- Secure Data in Motion and Rest
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presales
 
FalconStor NSS Presentation
FalconStor NSS PresentationFalconStor NSS Presentation
FalconStor NSS Presentation
 
Quickassist adapter-8960-8970-brief
Quickassist adapter-8960-8970-briefQuickassist adapter-8960-8970-brief
Quickassist adapter-8960-8970-brief
 
ComWorth' Sirius SwiftWing Hi Performance Capture & Storage Solutions
ComWorth'  Sirius SwiftWing Hi Performance Capture & Storage SolutionsComWorth'  Sirius SwiftWing Hi Performance Capture & Storage Solutions
ComWorth' Sirius SwiftWing Hi Performance Capture & Storage Solutions
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
IBM Spectrum Scale Security
IBM Spectrum Scale Security IBM Spectrum Scale Security
IBM Spectrum Scale Security
 
ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.ACOS5 product presentation by Advanced Card Systems Ltd.
ACOS5 product presentation by Advanced Card Systems Ltd.
 
High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...
 
NodeGrid Flex
NodeGrid FlexNodeGrid Flex
NodeGrid Flex
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Securing Millions of Devices
Securing Millions of DevicesSecuring Millions of Devices
Securing Millions of Devices
 
Bloombase StoreSafe Compatibility Matrix
Bloombase StoreSafe Compatibility MatrixBloombase StoreSafe Compatibility Matrix
Bloombase StoreSafe Compatibility Matrix
 
Summit 16: Deploying Virtualized Mobile Infrastructures on Openstack
Summit 16: Deploying Virtualized Mobile Infrastructures on OpenstackSummit 16: Deploying Virtualized Mobile Infrastructures on Openstack
Summit 16: Deploying Virtualized Mobile Infrastructures on Openstack
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIOHigh Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
 

More from Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
Bloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
Bloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
Bloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
Bloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
Bloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
Bloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
Bloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
Bloombase
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
Bloombase
 

More from Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 

Recently uploaded

Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 

Recently uploaded (20)

Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 

Bloombase Spitfire StoreSafe Security Server Specifications

  • 1. Specification Sheet Bloombase Spitfire StoreSafe Storage Security Server Features Transparent Encryption and Decryption High performance and intelligent cryptographic engine sensing network storage information and carry out cryptographic operations based on user-predefined rules. No user training required. Data to be stored are encrypted and data to be read are decrypted automatically on the fly under the covers requiring no change on user workflow and application logic. Hardware, Platform and Filesystem Independent Spitfire StoreSafe Security Server supports all platforms conforming to industrial storage communications protocols and it operates on the storage networking layer abstracting filesystem underneath or above. High Performance Patent pending Spitfire Transparent Cache minimizes performance degradation as a result of real-time encryption and decryption, pushing encryption throughput to the limits at gigabit and 10-gigabit wire- speeds. Flexible and Secure Access Control Fine grain user and host access control suiting all enterprise storage security needs. High Availability Highly scalable and multiple Spitfire StoreSafe boxes running in cluster for failover in mission-critical systems and load-balancing for high-throughput storage systems. Security Industry-proven cryptographic processing engine NIST FIPS-197 AES encryption and decryption IEEE 1619-compliant AES XTS block cipher Japan NTT/Mitsubishi Electric Camellia encryption and decryption Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption NIST FIPS-46-3 3DES and DES encryption and decryption RC2, RC4, RC5 and RC6 encryption and decryption CAST5 encryption and decryption Twofish and Blowfish encryption and decryption IDEA encryption and decryption Serpent and Skipjack encryption and decryption Pluggable cipher architecture for future cipher upgrade or custom cipher support 128, 256, 512, 1024 and 2048 bit public key cryptography RSA and DSA public key cryptography SHA-1, MD5 and Chinese National SCH(SM3) hash generation Hardware ASIC cryptographic acceleration (optional) Obfuscation and data shuffling for simple data hiding www.bloombase.com
  • 2. Storage Systems Direct Attached Storage (DAS) Network Attached Storage (NAS) Storage Area Network (SAN) Fiber Channel (FC) and LVD SCSI tape library and virtual tape library (VTL) Privacy Control Automated file-based and block-based encryption on storage device and file write operations Automated decryption on storage device and file read operations on trusted hosts and clients Multiple key encryption Fix-sized file header regardless of actual file size for file-based protection No additional storage required for block-based protection Access Control Fine grain read/write/create/delete/list access control Time-window-based access control Zero alteration to actual storage contents Zero impact to performance Integrity Control Automated filesystem object digital signature generation File integrity verification Multiple key digital signature generation Fix-sized file header regardless of actual file size Write-Once-Read-Many (WORM) Write-once-read-many feature resembling non-rewritable optical media supporting secure archival of data eliminating potential risks being overwritten by intention or accidental operation For storage archival, compliance, dynamic capacity management and information lifecycle management (ILM) Policy based engine dynamically adapts to changing demands in data requirements, by moving files auto- matically and transparently to appropriate tiered storage Rule based configuration for permanently delete and/or shred file contents Authentication and Authorization User-based and role-based authentication and authorization Generic Lightweight Directory Access Protocol (LDAP) and Microsoft Active Directory (MSAD) authentication and authorization Host-based authentication and authorization Microsoft NT Lan Manager (NTLM) authentication Challenge Handshake Authentication Protocol (CHAP) based discovery and authentication www.bloombase.com
  • 3. Direct Attached Storage (DAS) Extensive Storage Communication Protocol Support Fiber Channel Protocol (FCP) Fiber Channel over Ethernet (FCoE) Internet Small Computer System Interface (iSCSI) Small Computer System Interface (SCSI) Serial Attached SCSI (SAS) Serial Advanced Technology Attachment (SATA) Parallel Advanced Technology Attachment (PATA)/Integrated Drive Electronics (IDE), etc Platform Independent Bloombase SpitfireOS HP-UX OpenVMS IBM-AIX Sun Solaris Linux Microsoft Windows Mac OS, etc Hardware Interoperability HP IBM Sun StorageTek Dell HDS EMC NetApp Apple Ultra 160 SCSI low voltage differential (LVD) compliant host bus adapter (HBA) Emulex Qlogic, etc Filesystem Independent Raw ext2 and ext3 FAT FAT-32 NTFS UFS ZFS CFS VxFS, etc www.bloombase.com
  • 4. Network Attached Storage (NAS) Extensive Storage Communication Protocol Support Network File System (NFS) Common Internet File System (CIFS)/Server Message Block (SMB) Andrew File System (AFS) NetWare Core Protocol (NCP) Hypertext Transfer Protocol (HTTP) File Transfer Protocol (FTP), etc Platform Independent Bloombase SpitfireOS HP-UX OpenVMS IBM-AIX Sun Solaris Linux Microsoft Windows Mac OS, etc Hardware Interoperability HP IBM Sun StorageTek Dell HDS EMC NetApp Apple Generic and TCP/IP offloading network interface card (NIC) Neterion Intel, etc Filesystem Independent ext2 and ext3 FAT FAT-32 NTFS UFS ZFS CFS VxFS, etc www.bloombase.com
  • 5. Storage Area Network (SAN) Extensive Storage Communication Protocol Support Fiber Channel Protocol (FCP) Fiber Channel over Ethernet (FCoE) Internet Small Computer System Interface (iSCSI), etc Platform Independent Bloombase SpitfireOS HP-UX OpenVMS IBM-AIX Sun Solaris Linux Microsoft Windows Mac OS, etc Hardware Interoperability HP IBM Sun StorageTek Dell HDS EMC NetApp Apple Brocade Cisco Emulex Qlogic Alacritech, etc Filesystem Independent Raw ext2 and ext3 FAT FAT-32 NTFS UFS ZFS CFS VxFS, etc www.bloombase.com
  • 6. Tape Library and Virtual Tape Library (VTL) Extensive Tape Communication Protocol Support Fiber Channel Low Voltage Differential (LVD) Small Computer System Interface (SCSI), etc Platform Independent Bloombase SpitfireOS HP-UX OpenVMS IBM-AIX Sun Solaris Linux Microsoft Windows Mac OS, etc Hardware Interoperability HP IBM Sun StorageTek Dell HDS EMC NetApp Apple Brocade Cisco Emulex Qlogic Quantum CommVault FalconStor Alacritech, etc www.bloombase.com
  • 7. Key Management Multiple certificate authority (CA) support Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion Built-in certificate request and revocation check (CRL/OCSP) X.509 and PKCS#12 DER and PEM key import and export Key Usage Profiling RDBMS and Generic LDAP Support and Integration Industry Standard PKCS#11 NIST FIPS-140-1 level 2 cryptographic module support (optional) Automatic Certificate Retrieval via HTTP or LDAP Certificate Validity Check Certificate Revocation Check via HTTP or LDAP Certificate Revocation List (CRL) Certificate Revocation List Distribution Point (CRLDP) Online Certificate Status Protocal (OCSP) CRL scheduled download, caching and automatic retry OCSP scheduled request, caching and automatic retry Hardware Security Module Support Gemalto/Schlumberger/Axalto Cryptoflex Gemalto/Schlumberger/Axalto Cyberflex Gemalto/Schlumberger/Axalto e-gate Gemalto/Gemplus GPK Aladdin eToken PRO Hifn Express DS cards Sun Microsystems Crypto Accelerator cards Siemens CardOS M4 IBM JCOP Micardo Oberthur 64k Java-card OpenPGP 1.0 card Setcos 4.4.1 cards RSA SecurID 3100 cards Giesecke & Devrient Starcos Eutrom CryptoIdendity IT-SEC Rainbow iKey 3000 www.bloombase.com
  • 8. Standard Support and Certification IEEE 1619 standard-based mode OASIS Key Management Interoperability Protocol (KMIP) support NIST FIPS 140-2 compliant Bloombase Cryptographic Module Management Web based management console Central administration and configuration User security Serial console SNMP v1, v2c, v3 syslog, auto log rotation and auto archive Heartbeat and keep alive Disaster Recovery Configurations backup and restore FIPS-140 hardware security module recovery key or software recovery key vault for settings restoration Customer-defined recovery quorum (e.g. 2 of 5) FIPS-140 hardware security module operator key or operator pin for daily Spitfire KeyCastle operation High-availability option for active-active or active-standby operation Stateless active-standby failover Platform Support Bloombase SpitfireOS Solaris HP-UX OpenVMS IBM AIX Linux Microsoft Windows Mac OS X Hardware Support i386-base architecture AMD 32 and 64 architecture Intel Itanium-2 architecture IBM Power6 architecture PA-RISC architecture UltraSPARC architecture www.bloombase.com
  • 9. System Requirements System free memory 1GB Free storage space 1GB Warranty and Maintenance Software maintenance and support services are available. Bloombase Technologies - Information Security Company email info@bloombase.com web http://www.bloombase.com Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase Technologies Ltd in Hong Kong, China and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an addi- tional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. Copyright 2008 Bloombase Technologies. All rights reserved. Specification Sheet H87998 www.bloombase.com