SlideShare a Scribd company logo
CUSTOMER SPOTLIGHT
                                                                                          Bloombase® Spitfire StoreSafe™
                                                                                           Storage Security Server
A Government                                                                              Bloombase® Spitfire KeyCastle™
                                                                                           Key Management Server
Border Control
Agency
                                             Government organization secures privacy of sensitive personal border con-
                                             trol data of a data warehouse system using Bloombase® Spitfire StoreSafe™
                                             storage encryption and Bloombase® Spitfire KeyCastle™ key management
                                             security solution



AT A GLANCE

 ABOUT THE CUSTOMER                            WHY BLOOMBASE SOLUTIONS

 • Government agency controlling               • Enabled customer to leverage exist-
   border entrance of people and issue          ing hardware and software
   of personal identification and travel       • Provided comprehensive key and
   documents                                    encrypted storage management
 • Employees: More than 12,000                 • Platform and application neutral
                                               • Scalable and extensible
 SUMMARY                                       • Custom cipher support


 To protect privacy of sensitive personal      IMPLEMENTATION HIGHLIGHTS
 information of an off-the-shelf business
 intelligence and reporting system             Was first organization in public sector
 according to regional personal data           to institute an end-to-end persistence
 privacy laws                                  data protection from data extraction,
                                               transform and load (ETL), data ware-
 KEY CHALLENGES                                housing, reporting, backup and archi-
                                               val
 • No change to end user, administrator
  and operator workflow                        KEY BENEFITS
 • No significant degradation of system
  throughput and response                      • Immediate information privacy    regu-     Overview
 • Off-the-shelf data warehouse system           latory compliance
  cannot be altered                            • Transparent deployment                     A border control government organization runs an intelligence
 • No coding required                          • High encryption performance
 • No hardware, system and application
                                                                                            system to keep track of entrance and exit of people for collection
                                               • No system response degradation
  change                                       • Highly available and fault-tolerant
                                                                                            and analysis of movement habits of travelers.
 • Deployment and data migration can
  be committed in phases                       EXISTING ENVIRONMENT                         According to personal data privacy laws, such intelligence infor-
 • Supports storage media including                                                         mation are under strict control and required to be secured by
  SCSI disks, magnetic tapes and virtual       • No data encryption in place                strong encryption for all at-rest data on storage media including
  tape libraries (VTL)                         • Physical isolation of system hardware
 • Protects cooked and uncooked/raw
                                                                                            hard disks, optical disks, magnetic tapes, etc.
                                                in data center
  filesystems with a single solution
                                                                                            Working under tight time constraints, the customer is required to
                                               HARDWARE
 PROJECT OBJECTIVES                                                                         implement effective data protection measures of the system,
                                               • IBM p-Series servers                       which has been in operation for 5 years, in within 3 months’ time.
 • Encrypts dynamic database data              • EMC Symmetrix SAN                          With stringent constraints including no change to system infra-
   stored in storage area network (SAN)        • Brocade FC SAN switch                      structure and user/operator workflow as well as the requirement
   and backup tapes                            • IBM tape library
 • Protects filesystem objects, relational
                                                                                            to maintain the same level of service (system response, availabil-
                                               • HP Integrity Server
   databases, uncooked volume and                                                           ity, capacity, etc), end customer selected Bloombase® Spitfire
   backup media                                                                             StoreSafe™ enterprise storage security server to provide on-the-
                                               OPERATING SYSTEM
 • Interoperable with existing informa-                                                     fly encryption of their sensitive persistence data and Bloombase®
   tion lifecycle management (ILM)                                                          Spitfire KeyCastle™ key management server for full lifecycle
                                               • IBM AIX 5.3
   system for automatic data persistence
                                               • Redhat Enterprise Linux 4                  management of their cryptographic keys.
 SOLUTIONS AND SERVICES                        SOFTWARE
 • Spitfire   KeyCastle™ key management
                                                                                            An Ambitious Trial Project
                                               • IBM OnDemand Content Manager
   server
                                               • IBM DB2 Universal Database                 The business intelligence system has been in operation for more
 • Spitfire StoreSafe™ enterprise storage
                                               • IBM Tivoli Storage Manager (TSM)
   security server                                                                          than 5 years. Like many core business operations systems in the
                                                                                            IT infrastructure of this customer, the system is mission-critical.
As a pilot project for data protection, the encryp-                            dated or less frequently accessed reports to tape                              staging storage and the report repository.
              tion solution has to prove fault-tolerant, highly                              libraries for archival, freeing up fast disk storage
              available and disaster-recovery ready.                                         space for new and frequently accessed reports.                                 To customer’s biggest frustration, their proof-of-
                                                                                             On the other hand, if user retrieves a report that                             concept tests on filesystem encryption products
              Border traveler information are submitted to the                               OnDemand finds archived, TSM will be triggered                                 did not work out either. Yes, filesystem encryp-
              system timely around the clock which contains                                  to restore the report contents from backup tapes                               tion works fine with incoming data staging
              sensitive personal information including travel-                               back to SAN disk for user’s retrieval.                                         storage, database files and log files, however,
              ers’ names, personal identification numbers                                                                                                                   filesystem encryption failed to work with the
              such as identity card numbers, visa numbers                                                                                                                   report repository where the filesystem is un-
              and passport identifiers etc., date and time of                                                                                                               cooked, in other words, raw or no filesystem.
              gate-in and gate-out, etc. Such information are
              collected from various border control units from                                                                                                              Customer did not prefer extra software to be
              within the whole state and temporarily stored at                                   "Bloombase Spitfire™ enterprise                                            installed on their AIX application servers due to
              a staging storage area of the system. An extrac-                                   security solution brings you key                                           their server capacity and audit requirements.
              tion-transform-load (ETL) worker processes the                                     management, file protection,                                               The average processing time for report genera-
              staging area for incoming traveler information.                                                                                                               tion has to be kept within 30 seconds.
              The ETL worker triggers a content filter to scan                                   database protection, raw disk
              for potential hazards. Viral and malicious con-                                    encryption and backup encryp-
              tents are rejected and moved to parking area for                                                                                                              Turning Challenge into Op-
                                                                                                 tion in a single solution at low
              examination or disposal. Clean files are parsed,
              contents extracted and loaded into a relation                                      total cost of ownership (TCO)”                                             portunity
              database system powered by IBM DB2 Universal
                                                                                                                                                                            Apart from support issues of various encryption
              Database System.
                                                                                                                                                                            products end customer considered, there were a
                                                                                                                                                                            number of issues remained unsolved: an all-in-
              End users of the system define reports to be run                               Thanks to IBM OnDemand Content Manager, DB2
                                                                                                                                                                            one cryptographic key management system, a
              and at what timely manner via IBM OnDemand                                     UDB and TSM, the intelligence system works
                                                                                                                                                                            scalable encryption platform that can scale up
              Content Manager management console. When-                                      seamlessly and at the best performance one
                                                                                                                                                                            easily as to cope with growing needs of the
              ever an analysis task is executed in the system,                               could get from an IBM Power platform fueled
                                                                                                                                                                            system, a cryptographic platform that supports a
              a report file will be generated and stored at an                               with EMC Symmetrix SAN. However, when talk-
                                                                                                                                                                            rich set of ciphers and in some special occa-
              uncooked storage area managed by IBM Tivoli                                    ing about data protection, customer faces their
                                                                                                                                                                            sions, customer’s proprietary cipher algorithms,
              Storage Manager (TSM). IBM OnDemand Content                                    first challenge. The application is built on off-the
                                                                                                                                                                            last but not least, platform independence and
              Manager links the analysis task to the physical                                -shelf products that cannot be altered, therefore,
                                                                                                                                                                            application independence to support potential
              disk location(s) where the output reports are                                  there is no way one can introduce data crypto-
                                                                                                                                                                            future change of platform.
              stored. On user’s retrieval of analysis results,                               graphic processing at the application level.
              Content Manager reads the physical EMC stor-
                                                                                                                                                                            End customer finally turned to Bloombase®
              age area network (SAN) disk and presents the                                   Customer hit their second challenge when they
                                                                                                                                                                            Spitfire™ enterprise security solution installed
              information to users in a readable form, or as                                 stepped backward and considered database
                                                                                                                                                                            onto HP Integrity Servers to meet their stringent
              files to be exported for further analysis or report-                           encryption. Despite database encryption’s
                                                                                                                                                                            security requirements.
              ing use.                                                                       difficulty on deployment and the vast amount of
                                                                                             database objects to get encryption configured,
                                                                                                                                                                            Without the need to alter any of end users’ work-
              IBM TSM manages information lifecycle of the                                   database encryption products cannot solve data
                                                                                                                                                                            flow, application and hardware platform, Spitfire
              storage area by automatically offloading out-                                  privacy problems on the incoming sensitive
                                                                                                                                                                            StoreSafe™ virtualizes incoming data staging
                                                                                                                                                                            storage, DB2 data file repository and OnDemand
                                                                                                                                                                            Content Manager report repository as Spitfire
                                                                                                                                                                            StoreSafe™ file-based and block-based virtual
                                                                                                                                                                            storages.

                                                                                                                                                                            Spitfire StoreSafe™ virtual storage offers a
                                                                                                                                                                            secure virtual plain updateable view of the their
                                                                                                                                                                            encrypted contents replica physically persisted
                                                                                                                                                                            on disks. Thus, system and application remain
                                                                                                                                                                            unchanged and access Spitfire StoreSafe™
                                                                                                                                                                            secured storage contents as if they are normal
                                                                                                                                                                            files and disks, but in reality, the sensitive data
                                                                                                                                                                            are secured by strong encryption. Only when
                                                                                                                                                                            OnDemand Content Manager and DB2 UDB
                                                                                                                                                                            request for storage contents will trigger Spitfire
                                                                                                                                                                            StoreSafe™ to decrypt the ciphered sensitive
                                                                                                                                                                            data and when data are stored by Content Man-
                                                                                                                                                                            ager or database records committed to DB2 will
                                                                                                                                                                            trigger Spitfire StoreSafe™ to encrypt the sensi-
                                                                                                                                                                            tive contents before they are physically written
                                                                                                                                                                            to EMC SAN disk.

                                                                                                                                                                            Spitfire StoreSafe™ enabled the customer to
                                                                                                                                                                            migrate their whole data storage in phases
                                                                                                                                                                            minimizing cutover windows and thus service
                                                                                                                                                                            availability. TSM managed encrypted raw volume
                                                                                                                                                                            as normal volumes without change with benefit
                                                                                                                                                                            that data archived to backup tapes are in their
                                                                                                                                                                            original secure ciphered form.

                                                                                                                                                                            End customer enjoyed end-to-end data privacy
                                                                                                                                                                            using Bloombase Spitfire™ security platform
                                                                                                                                                                            meeting the toughest national data security
                                                                                                                                                                            requirements at low total cost of ownership
                                                                                                                                                                            (TCO).




© 2006 Bloombase Technologies. All rights reserved. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their
respective logos are trademarks or registered trademarks of Bloombase Technologies Ltd in Hong Kong, China and in several other countries all over the world. All other product and
service names mentioned are the trademarks of their respective companies.

The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors
or omissions contained herein.

4AA0-0696EEP 09/2006

More Related Content

What's hot

Symantec Appliances Strategy Launch
Symantec Appliances Strategy LaunchSymantec Appliances Strategy Launch
Symantec Appliances Strategy Launch
Symantec
 
SANsymphony V
SANsymphony VSANsymphony V
SANsymphony V
TTEC
 
IBM XIV Storage System series
IBM XIV Storage System seriesIBM XIV Storage System series
IBM XIV Storage System series
IBM India Smarter Computing
 
Visual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalVisual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story Finalmealvara
 
Vna for indexing & storing dicom & non dicom objects - peter lange - ibm
Vna for indexing & storing dicom & non dicom objects - peter lange - ibmVna for indexing & storing dicom & non dicom objects - peter lange - ibm
Vna for indexing & storing dicom & non dicom objects - peter lange - ibm
Peter B. Lange
 
Webinar: Unifying storage for EMC & NetApp
Webinar: Unifying storage for EMC & NetAppWebinar: Unifying storage for EMC & NetApp
Webinar: Unifying storage for EMC & NetApp
Jeannette Grand
 
IBM PureFlex System storage resources
IBM PureFlex System storage resourcesIBM PureFlex System storage resources
IBM PureFlex System storage resources
IBM India Smarter Computing
 
Windows Hosting Service-Level Description
Windows Hosting Service-Level DescriptionWindows Hosting Service-Level Description
Windows Hosting Service-Level Descriptionwebhostingguy
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use Cases
Novell
 
Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)webhostingguy
 
File Access in Novell Open Enterprise Server 2 SP2
File Access in Novell Open Enterprise Server 2 SP2File Access in Novell Open Enterprise Server 2 SP2
File Access in Novell Open Enterprise Server 2 SP2
Novell
 
Agentless backup is not a myth
Agentless backup is not a mythAgentless backup is not a myth
Agentless backup is not a myth
Global Micro Solutions
 
Mct summit na what's new in forefront endpoint protection 2012 beta
Mct summit na   what's new in forefront endpoint protection 2012 betaMct summit na   what's new in forefront endpoint protection 2012 beta
Mct summit na what's new in forefront endpoint protection 2012 beta
Peter De Tender
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase
 
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell
 
TS7680 ProtecTIER for z/OS Datasheet
TS7680 ProtecTIER for z/OS DatasheetTS7680 ProtecTIER for z/OS Datasheet
TS7680 ProtecTIER for z/OS Datasheet
IBM India Smarter Computing
 

What's hot (17)

Symantec Appliances Strategy Launch
Symantec Appliances Strategy LaunchSymantec Appliances Strategy Launch
Symantec Appliances Strategy Launch
 
SANsymphony V
SANsymphony VSANsymphony V
SANsymphony V
 
IBM XIV Storage System series
IBM XIV Storage System seriesIBM XIV Storage System series
IBM XIV Storage System series
 
Visual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story FinalVisual Storage Intelligence™ Case Story Final
Visual Storage Intelligence™ Case Story Final
 
Vna for indexing & storing dicom & non dicom objects - peter lange - ibm
Vna for indexing & storing dicom & non dicom objects - peter lange - ibmVna for indexing & storing dicom & non dicom objects - peter lange - ibm
Vna for indexing & storing dicom & non dicom objects - peter lange - ibm
 
Webinar: Unifying storage for EMC & NetApp
Webinar: Unifying storage for EMC & NetAppWebinar: Unifying storage for EMC & NetApp
Webinar: Unifying storage for EMC & NetApp
 
IBM PureFlex System storage resources
IBM PureFlex System storage resourcesIBM PureFlex System storage resources
IBM PureFlex System storage resources
 
Windows Hosting Service-Level Description
Windows Hosting Service-Level DescriptionWindows Hosting Service-Level Description
Windows Hosting Service-Level Description
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use Cases
 
Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)
 
File Access in Novell Open Enterprise Server 2 SP2
File Access in Novell Open Enterprise Server 2 SP2File Access in Novell Open Enterprise Server 2 SP2
File Access in Novell Open Enterprise Server 2 SP2
 
Agentless backup is not a myth
Agentless backup is not a mythAgentless backup is not a myth
Agentless backup is not a myth
 
Vm6 v mex
Vm6 v mexVm6 v mex
Vm6 v mex
 
Mct summit na what's new in forefront endpoint protection 2012 beta
Mct summit na   what's new in forefront endpoint protection 2012 betaMct summit na   what's new in forefront endpoint protection 2012 beta
Mct summit na what's new in forefront endpoint protection 2012 beta
 
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC CelerraBloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
 
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
 
TS7680 ProtecTIER for z/OS Datasheet
TS7680 ProtecTIER for z/OS DatasheetTS7680 ProtecTIER for z/OS Datasheet
TS7680 ProtecTIER for z/OS Datasheet
 

Viewers also liked

trender WOMM - Case Studies
trender WOMM - Case Studiestrender WOMM - Case Studies
trender WOMM - Case Studies
trender_WOM
 
Advanced english i uvm guadalajara norte essay i 3 rd parcial
Advanced english i uvm guadalajara norte essay i 3 rd parcialAdvanced english i uvm guadalajara norte essay i 3 rd parcial
Advanced english i uvm guadalajara norte essay i 3 rd parcialJosadac Flores
 
Tqms
TqmsTqms
내가 바라는 우리학교
내가 바라는 우리학교내가 바라는 우리학교
내가 바라는 우리학교
com2rang
 
Dieta e prevenção cvd versão slideshare
Dieta e prevenção cvd versão slideshareDieta e prevenção cvd versão slideshare
Dieta e prevenção cvd versão slidesharenutriscience
 
Making the most of 2.2
Making the most of 2.2Making the most of 2.2
Making the most of 2.2
markstory
 
2010 Mercedes CLS Class Los Angeles
2010 Mercedes CLS Class Los Angeles2010 Mercedes CLS Class Los Angeles
2010 Mercedes CLS Class Los Angeles
Mercedes Benz Beverly Hills
 
S1.part.1.install and-settings
S1.part.1.install and-settingsS1.part.1.install and-settings
S1.part.1.install and-settings
082net
 
Body rider-fan-bike.ppt
Body rider-fan-bike.pptBody rider-fan-bike.ppt
Body rider-fan-bike.pptJohn_joe
 
Future of Digital Profiles
Future of Digital ProfilesFuture of Digital Profiles
Future of Digital Profiles
Chris Sparshott
 
The European Climate Change Adaptation Platform: CLIMATE-ADAPT - Dr. Margaret...
The European Climate Change Adaptation Platform: CLIMATE-ADAPT - Dr. Margaret...The European Climate Change Adaptation Platform: CLIMATE-ADAPT - Dr. Margaret...
The European Climate Change Adaptation Platform: CLIMATE-ADAPT - Dr. Margaret...
Environmental Protection Agency, Ireland
 
Les évolutions humanitaires: annexe
Les évolutions humanitaires: annexeLes évolutions humanitaires: annexe
Les évolutions humanitaires: annexe
Development_Initiatives
 
M&L 2012 - Scientific Imagery in Higher Education - by Ruth Kerr, Ilaria Merciai
M&L 2012 - Scientific Imagery in Higher Education - by Ruth Kerr, Ilaria MerciaiM&L 2012 - Scientific Imagery in Higher Education - by Ruth Kerr, Ilaria Merciai
M&L 2012 - Scientific Imagery in Higher Education - by Ruth Kerr, Ilaria MerciaiMedia & Learning Conference
 
Informal emma sci com 2013 nhm
Informal emma sci com 2013 nhmInformal emma sci com 2013 nhm
Informal emma sci com 2013 nhm
British Science Association
 
Ethnographic Reading Summaries
Ethnographic Reading SummariesEthnographic Reading Summaries
Ethnographic Reading Summaries
lgutterson
 
"Preparing for SBAC: Addressing Online Testing Challenges with your Students"
"Preparing for SBAC: Addressing Online Testing Challenges with your Students""Preparing for SBAC: Addressing Online Testing Challenges with your Students"
"Preparing for SBAC: Addressing Online Testing Challenges with your Students"WowzersMath
 

Viewers also liked (17)

trender WOMM - Case Studies
trender WOMM - Case Studiestrender WOMM - Case Studies
trender WOMM - Case Studies
 
Advanced english i uvm guadalajara norte essay i 3 rd parcial
Advanced english i uvm guadalajara norte essay i 3 rd parcialAdvanced english i uvm guadalajara norte essay i 3 rd parcial
Advanced english i uvm guadalajara norte essay i 3 rd parcial
 
Tqms
TqmsTqms
Tqms
 
내가 바라는 우리학교
내가 바라는 우리학교내가 바라는 우리학교
내가 바라는 우리학교
 
Dieta e prevenção cvd versão slideshare
Dieta e prevenção cvd versão slideshareDieta e prevenção cvd versão slideshare
Dieta e prevenção cvd versão slideshare
 
Making the most of 2.2
Making the most of 2.2Making the most of 2.2
Making the most of 2.2
 
2010 Mercedes CLS Class Los Angeles
2010 Mercedes CLS Class Los Angeles2010 Mercedes CLS Class Los Angeles
2010 Mercedes CLS Class Los Angeles
 
S1.part.1.install and-settings
S1.part.1.install and-settingsS1.part.1.install and-settings
S1.part.1.install and-settings
 
Body rider-fan-bike.ppt
Body rider-fan-bike.pptBody rider-fan-bike.ppt
Body rider-fan-bike.ppt
 
Future of Digital Profiles
Future of Digital ProfilesFuture of Digital Profiles
Future of Digital Profiles
 
The European Climate Change Adaptation Platform: CLIMATE-ADAPT - Dr. Margaret...
The European Climate Change Adaptation Platform: CLIMATE-ADAPT - Dr. Margaret...The European Climate Change Adaptation Platform: CLIMATE-ADAPT - Dr. Margaret...
The European Climate Change Adaptation Platform: CLIMATE-ADAPT - Dr. Margaret...
 
Les évolutions humanitaires: annexe
Les évolutions humanitaires: annexeLes évolutions humanitaires: annexe
Les évolutions humanitaires: annexe
 
M&L 2012 - Scientific Imagery in Higher Education - by Ruth Kerr, Ilaria Merciai
M&L 2012 - Scientific Imagery in Higher Education - by Ruth Kerr, Ilaria MerciaiM&L 2012 - Scientific Imagery in Higher Education - by Ruth Kerr, Ilaria Merciai
M&L 2012 - Scientific Imagery in Higher Education - by Ruth Kerr, Ilaria Merciai
 
Informal emma sci com 2013 nhm
Informal emma sci com 2013 nhmInformal emma sci com 2013 nhm
Informal emma sci com 2013 nhm
 
Ethnographic Reading Summaries
Ethnographic Reading SummariesEthnographic Reading Summaries
Ethnographic Reading Summaries
 
M&E Logic Model1
M&E Logic Model1M&E Logic Model1
M&E Logic Model1
 
"Preparing for SBAC: Addressing Online Testing Challenges with your Students"
"Preparing for SBAC: Addressing Online Testing Challenges with your Students""Preparing for SBAC: Addressing Online Testing Challenges with your Students"
"Preparing for SBAC: Addressing Online Testing Challenges with your Students"
 

Similar to Customer Success - A Government Security Agency

Customer Success - A Government Organization
Customer Success - A Government OrganizationCustomer Success - A Government Organization
Customer Success - A Government OrganizationBloombase
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)
johndorian555
 
Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4
Tony Pearson
 
S100298 pendulum-swings-orlando-v1804a
S100298 pendulum-swings-orlando-v1804aS100298 pendulum-swings-orlando-v1804a
S100298 pendulum-swings-orlando-v1804a
Tony Pearson
 
Cloud computing simplified
Cloud computing simplifiedCloud computing simplified
Cloud computing simplified
johndorian555
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)
johndorian555
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Ulf Mattsson
 
Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...
Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...
Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...
Odinot Stanislas
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
Skytap Cloud
 
Spectrum Scale final
Spectrum Scale finalSpectrum Scale final
Spectrum Scale finalJoe Krotz
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
xKinAnx
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Dharma Atluri
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Glen Roberts, CISSP
 
Storage simplicity value_110810
Storage simplicity value_110810Storage simplicity value_110810
Storage simplicity value_110810rjmurphyslideshare
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
ORACLE USER GROUP ESTONIA
 
Earthlink introduction and its overview eb 01-16-04
Earthlink introduction and its overview   eb  01-16-04 Earthlink introduction and its overview   eb  01-16-04
Earthlink introduction and its overview eb 01-16-04
E B
 
Datasheet Virbak Abio V32
Datasheet Virbak Abio V32Datasheet Virbak Abio V32
Datasheet Virbak Abio V32
powerguy73
 
IBM's Cloud Storage Options
IBM's Cloud Storage OptionsIBM's Cloud Storage Options
IBM's Cloud Storage Options
Tony Pearson
 
Enterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected EnvironmentsEnterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected Environments
Precisely
 
Achieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved EconomicsAchieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved EconomicsPatrick Berghaeger
 

Similar to Customer Success - A Government Security Agency (20)

Customer Success - A Government Organization
Customer Success - A Government OrganizationCustomer Success - A Government Organization
Customer Success - A Government Organization
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)
 
Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4Inter connect2016 yss1841-cloud-storage-options-v4
Inter connect2016 yss1841-cloud-storage-options-v4
 
S100298 pendulum-swings-orlando-v1804a
S100298 pendulum-swings-orlando-v1804aS100298 pendulum-swings-orlando-v1804a
S100298 pendulum-swings-orlando-v1804a
 
Cloud computing simplified
Cloud computing simplifiedCloud computing simplified
Cloud computing simplified
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
 
Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...
Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...
Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Spectrum Scale final
Spectrum Scale finalSpectrum Scale final
Spectrum Scale final
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
 
Storage simplicity value_110810
Storage simplicity value_110810Storage simplicity value_110810
Storage simplicity value_110810
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Earthlink introduction and its overview eb 01-16-04
Earthlink introduction and its overview   eb  01-16-04 Earthlink introduction and its overview   eb  01-16-04
Earthlink introduction and its overview eb 01-16-04
 
Datasheet Virbak Abio V32
Datasheet Virbak Abio V32Datasheet Virbak Abio V32
Datasheet Virbak Abio V32
 
IBM's Cloud Storage Options
IBM's Cloud Storage OptionsIBM's Cloud Storage Options
IBM's Cloud Storage Options
 
Enterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected EnvironmentsEnterprise Security in Mainframe-Connected Environments
Enterprise Security in Mainframe-Connected Environments
 
Achieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved EconomicsAchieving Storage Agility and Improved Economics
Achieving Storage Agility and Improved Economics
 

More from Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
Bloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
Bloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
Bloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
Bloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
Bloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
Bloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
Bloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
Bloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
Bloombase
 

More from Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Customer Success - A Government Security Agency

  • 1. CUSTOMER SPOTLIGHT Bloombase® Spitfire StoreSafe™ Storage Security Server A Government Bloombase® Spitfire KeyCastle™ Key Management Server Border Control Agency Government organization secures privacy of sensitive personal border con- trol data of a data warehouse system using Bloombase® Spitfire StoreSafe™ storage encryption and Bloombase® Spitfire KeyCastle™ key management security solution AT A GLANCE ABOUT THE CUSTOMER WHY BLOOMBASE SOLUTIONS • Government agency controlling • Enabled customer to leverage exist- border entrance of people and issue ing hardware and software of personal identification and travel • Provided comprehensive key and documents encrypted storage management • Employees: More than 12,000 • Platform and application neutral • Scalable and extensible SUMMARY • Custom cipher support To protect privacy of sensitive personal IMPLEMENTATION HIGHLIGHTS information of an off-the-shelf business intelligence and reporting system Was first organization in public sector according to regional personal data to institute an end-to-end persistence privacy laws data protection from data extraction, transform and load (ETL), data ware- KEY CHALLENGES housing, reporting, backup and archi- val • No change to end user, administrator and operator workflow KEY BENEFITS • No significant degradation of system throughput and response • Immediate information privacy regu- Overview • Off-the-shelf data warehouse system latory compliance cannot be altered • Transparent deployment A border control government organization runs an intelligence • No coding required • High encryption performance • No hardware, system and application system to keep track of entrance and exit of people for collection • No system response degradation change • Highly available and fault-tolerant and analysis of movement habits of travelers. • Deployment and data migration can be committed in phases EXISTING ENVIRONMENT According to personal data privacy laws, such intelligence infor- • Supports storage media including mation are under strict control and required to be secured by SCSI disks, magnetic tapes and virtual • No data encryption in place strong encryption for all at-rest data on storage media including tape libraries (VTL) • Physical isolation of system hardware • Protects cooked and uncooked/raw hard disks, optical disks, magnetic tapes, etc. in data center filesystems with a single solution Working under tight time constraints, the customer is required to HARDWARE PROJECT OBJECTIVES implement effective data protection measures of the system, • IBM p-Series servers which has been in operation for 5 years, in within 3 months’ time. • Encrypts dynamic database data • EMC Symmetrix SAN With stringent constraints including no change to system infra- stored in storage area network (SAN) • Brocade FC SAN switch structure and user/operator workflow as well as the requirement and backup tapes • IBM tape library • Protects filesystem objects, relational to maintain the same level of service (system response, availabil- • HP Integrity Server databases, uncooked volume and ity, capacity, etc), end customer selected Bloombase® Spitfire backup media StoreSafe™ enterprise storage security server to provide on-the- OPERATING SYSTEM • Interoperable with existing informa- fly encryption of their sensitive persistence data and Bloombase® tion lifecycle management (ILM) Spitfire KeyCastle™ key management server for full lifecycle • IBM AIX 5.3 system for automatic data persistence • Redhat Enterprise Linux 4 management of their cryptographic keys. SOLUTIONS AND SERVICES SOFTWARE • Spitfire KeyCastle™ key management An Ambitious Trial Project • IBM OnDemand Content Manager server • IBM DB2 Universal Database The business intelligence system has been in operation for more • Spitfire StoreSafe™ enterprise storage • IBM Tivoli Storage Manager (TSM) security server than 5 years. Like many core business operations systems in the IT infrastructure of this customer, the system is mission-critical.
  • 2. As a pilot project for data protection, the encryp- dated or less frequently accessed reports to tape staging storage and the report repository. tion solution has to prove fault-tolerant, highly libraries for archival, freeing up fast disk storage available and disaster-recovery ready. space for new and frequently accessed reports. To customer’s biggest frustration, their proof-of- On the other hand, if user retrieves a report that concept tests on filesystem encryption products Border traveler information are submitted to the OnDemand finds archived, TSM will be triggered did not work out either. Yes, filesystem encryp- system timely around the clock which contains to restore the report contents from backup tapes tion works fine with incoming data staging sensitive personal information including travel- back to SAN disk for user’s retrieval. storage, database files and log files, however, ers’ names, personal identification numbers filesystem encryption failed to work with the such as identity card numbers, visa numbers report repository where the filesystem is un- and passport identifiers etc., date and time of cooked, in other words, raw or no filesystem. gate-in and gate-out, etc. Such information are collected from various border control units from Customer did not prefer extra software to be within the whole state and temporarily stored at "Bloombase Spitfire™ enterprise installed on their AIX application servers due to a staging storage area of the system. An extrac- security solution brings you key their server capacity and audit requirements. tion-transform-load (ETL) worker processes the management, file protection, The average processing time for report genera- staging area for incoming traveler information. tion has to be kept within 30 seconds. The ETL worker triggers a content filter to scan database protection, raw disk for potential hazards. Viral and malicious con- encryption and backup encryp- tents are rejected and moved to parking area for Turning Challenge into Op- tion in a single solution at low examination or disposal. Clean files are parsed, contents extracted and loaded into a relation total cost of ownership (TCO)” portunity database system powered by IBM DB2 Universal Apart from support issues of various encryption Database System. products end customer considered, there were a number of issues remained unsolved: an all-in- End users of the system define reports to be run Thanks to IBM OnDemand Content Manager, DB2 one cryptographic key management system, a and at what timely manner via IBM OnDemand UDB and TSM, the intelligence system works scalable encryption platform that can scale up Content Manager management console. When- seamlessly and at the best performance one easily as to cope with growing needs of the ever an analysis task is executed in the system, could get from an IBM Power platform fueled system, a cryptographic platform that supports a a report file will be generated and stored at an with EMC Symmetrix SAN. However, when talk- rich set of ciphers and in some special occa- uncooked storage area managed by IBM Tivoli ing about data protection, customer faces their sions, customer’s proprietary cipher algorithms, Storage Manager (TSM). IBM OnDemand Content first challenge. The application is built on off-the last but not least, platform independence and Manager links the analysis task to the physical -shelf products that cannot be altered, therefore, application independence to support potential disk location(s) where the output reports are there is no way one can introduce data crypto- future change of platform. stored. On user’s retrieval of analysis results, graphic processing at the application level. Content Manager reads the physical EMC stor- End customer finally turned to Bloombase® age area network (SAN) disk and presents the Customer hit their second challenge when they Spitfire™ enterprise security solution installed information to users in a readable form, or as stepped backward and considered database onto HP Integrity Servers to meet their stringent files to be exported for further analysis or report- encryption. Despite database encryption’s security requirements. ing use. difficulty on deployment and the vast amount of database objects to get encryption configured, Without the need to alter any of end users’ work- IBM TSM manages information lifecycle of the database encryption products cannot solve data flow, application and hardware platform, Spitfire storage area by automatically offloading out- privacy problems on the incoming sensitive StoreSafe™ virtualizes incoming data staging storage, DB2 data file repository and OnDemand Content Manager report repository as Spitfire StoreSafe™ file-based and block-based virtual storages. Spitfire StoreSafe™ virtual storage offers a secure virtual plain updateable view of the their encrypted contents replica physically persisted on disks. Thus, system and application remain unchanged and access Spitfire StoreSafe™ secured storage contents as if they are normal files and disks, but in reality, the sensitive data are secured by strong encryption. Only when OnDemand Content Manager and DB2 UDB request for storage contents will trigger Spitfire StoreSafe™ to decrypt the ciphered sensitive data and when data are stored by Content Man- ager or database records committed to DB2 will trigger Spitfire StoreSafe™ to encrypt the sensi- tive contents before they are physically written to EMC SAN disk. Spitfire StoreSafe™ enabled the customer to migrate their whole data storage in phases minimizing cutover windows and thus service availability. TSM managed encrypted raw volume as normal volumes without change with benefit that data archived to backup tapes are in their original secure ciphered form. End customer enjoyed end-to-end data privacy using Bloombase Spitfire™ security platform meeting the toughest national data security requirements at low total cost of ownership (TCO). © 2006 Bloombase Technologies. All rights reserved. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase Technologies Ltd in Hong Kong, China and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. 4AA0-0696EEP 09/2006