SlideShare a Scribd company logo
1 of 2
Download to read offline
Hitachi Data Systems and Bloombase application-transparent encryption
solution:
n Safeguards data with industry-standard cryptography.
n Protects against outbound data exposure threats.
n Allows both on- and off-premises deployment.
n Meets confidentiality, regulatory compliance requirements.
DATASHEET
Mitigate Catastrophic Data
Exposure Vulnerabilities
For any enterprise, unauthorized data
exposure remains a critical, yet unresolved
problem. The causes can be both inten-
tional (hardware theft, espionage and so on)
and unintentional (media loss, viral attacks,
and so on). The unbridled rate at which
global businesses are taking advantage of
off-premises cloud and managed services
is only going to exacerbate the problem:
These offerings can increase the risk of
exposure, regardless of the number of net-
work defenses in place.
The Increasing Complexities
of Protecting Stored Data
A paradigm shift in the approach to data
management is evident: There is a move
away from managing a restrictive set of
critical data stored in a structured relational
database management system (RDBMS)
to the management and storage of virtually
everything and anything. There is also a
concomitant shift in the way data is stored:
from on-premises storage infrastructure
to off-premises cloud, platform as a ser-
vice (PaaS), managed service provider
(MSP), and so on. Although the use of
data encryption is vital for the protection
of information, database-level encryption
does not work with unstructured data for
Bloombase StoreSafe Data-at-Rest Security for Hitachi Content Platform
analytics applications. Furthermore, propri-
etary point-based encryption tool kits are
hard to maintain and difficult to integrate
into existing applications and software-as-
a-service (SaaS) environments. Then, there
is storage-based encryption, which involves
hardware infrastructure changes and rein-
vestment, often resulting in vendor lock-in
and posing challenges for cloud-based
models.
To combat these data vulnerability
challenges, Hitachi Data Systems and
Bloombase are offering a joint solution
based on Hitachi Content Platform (HCP)
and Bloombase StoreSafe (see Figure 1).
Bloombase StoreSafe:
Maximum Storage Security,
Minimum Effort Required
Bloombase StoreSafe is an agentless,
turnkey encryption solution for data-
at-rest applications. Its nondisruptive,
application-transparent and protocol-
preserving features make it ideally suited
to protecting a plethora of storage infra-
structures. It secures infrastructures from
on-premises storage systems [including
SAN, NAS, DAS, disk storage systems,
tape library, virtual tape library (VTL) and
object stores, for instance] to virtualization
(hypervisor data stores), big data (Hadoop)
and even off-premises cloud storage (AWS
S3 and EBS, OpenStack Swift and Cinder,
Google Cloud Storage, and Microsoft®
Azure™
Storage, for example).
Bloombase StoreSafe operates as a stor-
age proxy over heterogeneous networked
storage environments. To the network, the
solution looks like a virtual LUN, a network
share, VTL storage target or even a RESTful
storage service endpoint. As applications
make data storage requests, Bloombase
StoreSafe automatically and transparently
encrypts the plain text before it is physically
persisted in the storage medium. Likewise,
decryption of cipher text is performed on
the fly as data is requested from the per-
sistent storage, presenting the clear text
to the requesting application as if it were
Figure 1. The new Hitachi Data Systems and
Bloombase application-transparent security
solution safeguards data with industry-
standard cryptography.
DATASHEET
© Hitachi Data Systems Corporation 2014. All rights reserved. HITACHI is a trademark or registered trademark of Hitachi, Ltd. Microsoft and Azure are trademarks or registered
trademarks of Microsoft Corporation. All other trademarks, service marks, and company names are properties of their respective owners.
DS-354-A DG October 2014
Corporate Headquarters
2845 Lafayette Street
Santa Clara, CA 95050-2639 USA
www.HDS.com community.HDS.com
Regional Contact Information
Americas: +1 408 970 1000 or info@hds.com
Europe, Middle East and Africa: +44 (0) 1753 618000 or info.emea@hds.com
Asia Pacific: +852 3189 7900 or hds.marketing.apac@hds.com
never encrypted. This schema guarantees
operational transparency and maximum
interoperability. Unauthorized clients
accessing data from a StoreSafe protected
persistent storage will be unable to interpret
the protected cipher text.
Supporting a host of industry-standard pro-
tocols, StoreSafe is application transparent,
operating-system agnostic, portable across
storage technologies and vendor neutral.
Purpose-built, StoreSafe is a software appli-
ance adapted for deployment on commodity
hardware servers in both physical data centers
and virtual data centers. It can be deployed on
hypervisors and private clouds, or as compute
instances on cloud infrastructures.
Hitachi Content Platform:
Enterprise-Class Cloud Storage
Hitachi Content Platform is an unstructured
content object store that facilitates access
and retention of data in a multitenant envi-
ronment. Through HCP, applications interact
with content over standard network storage
protocols. Organizations can quickly provision
storage across different on- and off-premises
data center topologies while retaining the free-
dom to move data quickly and automatically.
An intelligent, object storage system, HCP
supports multiple tiers of storage for a wide
range of structured and unstructured con-
tent. It also offers a multitenant architecture
and object versioning, all in a single platform.
Other features include:
■■ Content immutability via “write once, read
many” (WORM) capabilities.
■■ Content retention at the storage layer.
■■ Encryption of data against unauthorized
access.
■■ Deduplication capabilities: compression;
built-in data protection, verification and
repair; bi-directional tier to cloud.
■■ Replication services for disaster recovery.
■■ High scalability, up to 80PB.
Data Protection Services
Hitachi Data Systems offers various data protection and replication services that sim-
plify and accelerate local and remote data replication and disaster recovery solutions.
These solutions enable normal business operations to resume in minutes, rather than
hours or days, following a primary site outage. They help you meet your service levels
quicker and with lower risk.
HCP and StoreSafe: Security,
Flexibility and Performance
The Bloombase StoreSafe solution integrates
with anything from traditional storage systems
to next-generation object storage solutions
like Hitachi Content Platform. StoreSafe pro-
vides robust and reliable privacy protection
for content management, retention, backup
and archival applications with HCP. StoreSafe
supports transparent encryption protection of
HCP data content over network storage pro-
tocols including NFS, CIFS, HTTP, WebDAV,
AWS S3 and other RESTful storage services.
This allows existing HCP applications to auto-
matically encrypt business-sensitive data as
they write through StoreSafe. Likewise, by
retrieving secure HCP content via StoreSafe,
encrypted information is automatically
deciphered and presented to trusted HCP
applications as plain text. Without needing
to modify the business logic of HCP applica-
tions, organizations can immediately ensure
that their business-sensitive information is
managed by HCP securely and meets data
privacy regulatory compliance requirements.
StoreSafe realizes true separation of duties
(SoD) without impacting storage administra-
tors and operators. Data is stored in standard
volumes, shares, files and objects and are
encrypted or decrypted on the fly without
supervision and transparently. StoreSafe
seamlessly protects both on- and off-
premises at-rest data, regardless of the
complexity of the heterogeneous storage
infrastructure or storage medium. It can just
as easily protect data in content addressed
storage (CAS) such as object stores, tape
libraries, VTLs and various cloud storage ser-
vices. Enterprises can mitigate data leakage
threats and still meet data privacy and regula-
tory compliance requirements cost effectively.
Because of its transparent, agentless storage
proxy schema, the solution is futureproof and
ensures easy integration with any storage
technology.
Highly scalable, StoreSafe is built for high
availability and mission-critical applications. It
offers high-speed AES encryption and indus-
try standard IEEE 1619 compliant storage
security. StoreSafe leverages Intel’s AES-NI
cryptographic accelerator to dynamically even
out encryption workloads. There is a built-in
pluggable cipher algorithm architecture that
facilitates adaptation and enables compliance
with specific national and vertical market
security requirements. Other supported
standards include built-in NIST FIPS 140-2
certified key management and support for
PKCS#11 hardware security modules (HSM)
and OASIS KMIP compliant key managers.
Together, Hitachi Data
Systems and Bloombase
deliver unique transparent
encryption protection. They
enable business applications
to secure unstructured data
contents seamlessly with
validated cryptographic technologies at zero
operational change. These capabilities give
applications a trusted data environment for
day-to-day storage and long-term archival. To
learn more, contact your HDS or Bloombase
representative or visit www.HDS.com.
LEARN MORE
HDS and
Bloombase

More Related Content

What's hot

The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012Валерий Коржов
 
Object storage
Object storageObject storage
Object storageronpoul
 
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva
 
How e fpga future proofs data centers
How e fpga future proofs data centersHow e fpga future proofs data centers
How e fpga future proofs data centersdonnabrown085
 
Stackscale, infrastructure, bare-metal and private cloud
Stackscale, infrastructure, bare-metal and private cloudStackscale, infrastructure, bare-metal and private cloud
Stackscale, infrastructure, bare-metal and private cloudDavid Carrero Fdez-Baillo
 
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM India Smarter Computing
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionInka Traktman
 
Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)SP Home Run Inc.
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword EU Project
 
Storage Training July 10
Storage Training July 10Storage Training July 10
Storage Training July 10Fiaz27
 
Transceiver – How They Help Support Big Data in Data Centers?
 Transceiver – How They Help Support Big Data in Data Centers? Transceiver – How They Help Support Big Data in Data Centers?
Transceiver – How They Help Support Big Data in Data Centers?Fern Xu
 
Cloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix OverviewCloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix OverviewNirvanix
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storagePreludedx
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQDruva
 
Webinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File SystemWebinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File SystemStorage Switzerland
 
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Adnene Guabtni
 

What's hot (20)

F017414853
F017414853F017414853
F017414853
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
 
Object storage
Object storageObject storage
Object storage
 
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
Druva inSync: Enterprise Endpoint Data Protection & Governance (Data Sheet)
 
How e fpga future proofs data centers
How e fpga future proofs data centersHow e fpga future proofs data centers
How e fpga future proofs data centers
 
Stackscale, infrastructure, bare-metal and private cloud
Stackscale, infrastructure, bare-metal and private cloudStackscale, infrastructure, bare-metal and private cloud
Stackscale, infrastructure, bare-metal and private cloud
 
Infrastructure Training Session
Infrastructure Training SessionInfrastructure Training Session
Infrastructure Training Session
 
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
IBM TS7610 ProtecTIER Deduplication Appliance Express – Enterprise Level Tech...
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protection
 
Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)Should Colocation Data Centers Fear Consolidation? (SlideShare)
Should Colocation Data Centers Fear Consolidation? (SlideShare)
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges
 
Storage Training July 10
Storage Training July 10Storage Training July 10
Storage Training July 10
 
Transceiver – How They Help Support Big Data in Data Centers?
 Transceiver – How They Help Support Big Data in Data Centers? Transceiver – How They Help Support Big Data in Data Centers?
Transceiver – How They Help Support Big Data in Data Centers?
 
Cloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix OverviewCloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix Overview
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storage
 
inSync FAQ
inSync FAQinSync FAQ
inSync FAQ
 
Webinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File SystemWebinar: The Four Requirements of a Cloud-Era File System
Webinar: The Four Requirements of a Cloud-Era File System
 
Database security
Database securityDatabase security
Database security
 
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
 

Viewers also liked

Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sbBloombase
 
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Bloombase
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Bloombase
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewBloombase
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeBloombase
 
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...Bloombase
 

Viewers also liked (7)

Thales bloombase store_safe_sb
Thales bloombase store_safe_sbThales bloombase store_safe_sb
Thales bloombase store_safe_sb
 
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
Blbs tn-bloombase-cryptographic-module-nist-fips-140-2-certification-uslet-en-r2
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15Bloombase integration with eskm final w alliance cert logo 4_9_15
Bloombase integration with eskm final w alliance cert logo 4_9_15
 
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overviewH13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
 
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...Hdsit 128031   secure unstructured cloud data on hitachi content platform (hc...
Hdsit 128031 secure unstructured cloud data on hitachi content platform (hc...
 

Similar to Hitachi datasheet-hcp-and-bloombase-storesafe

4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageIaetsd Iaetsd
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase
 
Hitachi Content Platform Datasheet
Hitachi Content Platform DatasheetHitachi Content Platform Datasheet
Hitachi Content Platform DatasheetHitachi Vantara
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16Bloombase
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Exclusive Networks ME
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
Bloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sbBloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sbBloombase
 
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerJerome J. Penna
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopVoltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopHPE Security - Data Security
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0 TTEC
 

Similar to Hitachi datasheet-hcp-and-bloombase-storesafe (20)

4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
Hitachi Content Platform Datasheet
Hitachi Content Platform DatasheetHitachi Content Platform Datasheet
Hitachi Content Platform Datasheet
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
Eskm & bloombase integration data security oct 16
Eskm & bloombase integration   data security oct 16Eskm & bloombase integration   data security oct 16
Eskm & bloombase integration data security oct 16
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
Bloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sbBloombase storage-protection-entrust-hsm-sb
Bloombase storage-protection-entrust-hsm-sb
 
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
Maginatics @ SDC 2013: Architecting An Enterprise Storage Platform Using Obje...
 
Cleversafe.PPTX
Cleversafe.PPTXCleversafe.PPTX
Cleversafe.PPTX
 
Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4Bloombase sb pc_11.18_s_bedits_sd - final r4
Bloombase sb pc_11.18_s_bedits_sd - final r4
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopVoltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in Hadoop
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0
 

More from Bloombase

Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Bloombase
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usenBloombase
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletBloombase
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-editionBloombase
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Bloombase
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiBloombase
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyerBloombase
 
Additional license authorizations
Additional license authorizationsAdditional license authorizations
Additional license authorizationsBloombase
 

More from Bloombase (20)

Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 
Xsb03030 usen
Xsb03030 usenXsb03030 usen
Xsb03030 usen
 
Ibpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbookletIbpstc30951 wdg ib_mbooklet
Ibpstc30951 wdg ib_mbooklet
 
Resource guide-30th-edition
Resource guide-30th-editionResource guide-30th-edition
Resource guide-30th-edition
 
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
Blbs sb-bloombase-store safe-intelligent-storage-firewall-for-amazon-web-serv...
 
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdiHitachi interoperability-guide-hcp-hcp-anywhere-hdi
Hitachi interoperability-guide-hcp-hcp-anywhere-hdi
 
Arcsight connector supported_products_flyer
Arcsight connector supported_products_flyerArcsight connector supported_products_flyer
Arcsight connector supported_products_flyer
 
4aa5 2782
4aa5 27824aa5 2782
4aa5 2782
 
Additional license authorizations
Additional license authorizationsAdditional license authorizations
Additional license authorizations
 
4aa5 3404
4aa5 34044aa5 3404
4aa5 3404
 

Recently uploaded

Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 

Recently uploaded (20)

Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 

Hitachi datasheet-hcp-and-bloombase-storesafe

  • 1. Hitachi Data Systems and Bloombase application-transparent encryption solution: n Safeguards data with industry-standard cryptography. n Protects against outbound data exposure threats. n Allows both on- and off-premises deployment. n Meets confidentiality, regulatory compliance requirements. DATASHEET Mitigate Catastrophic Data Exposure Vulnerabilities For any enterprise, unauthorized data exposure remains a critical, yet unresolved problem. The causes can be both inten- tional (hardware theft, espionage and so on) and unintentional (media loss, viral attacks, and so on). The unbridled rate at which global businesses are taking advantage of off-premises cloud and managed services is only going to exacerbate the problem: These offerings can increase the risk of exposure, regardless of the number of net- work defenses in place. The Increasing Complexities of Protecting Stored Data A paradigm shift in the approach to data management is evident: There is a move away from managing a restrictive set of critical data stored in a structured relational database management system (RDBMS) to the management and storage of virtually everything and anything. There is also a concomitant shift in the way data is stored: from on-premises storage infrastructure to off-premises cloud, platform as a ser- vice (PaaS), managed service provider (MSP), and so on. Although the use of data encryption is vital for the protection of information, database-level encryption does not work with unstructured data for Bloombase StoreSafe Data-at-Rest Security for Hitachi Content Platform analytics applications. Furthermore, propri- etary point-based encryption tool kits are hard to maintain and difficult to integrate into existing applications and software-as- a-service (SaaS) environments. Then, there is storage-based encryption, which involves hardware infrastructure changes and rein- vestment, often resulting in vendor lock-in and posing challenges for cloud-based models. To combat these data vulnerability challenges, Hitachi Data Systems and Bloombase are offering a joint solution based on Hitachi Content Platform (HCP) and Bloombase StoreSafe (see Figure 1). Bloombase StoreSafe: Maximum Storage Security, Minimum Effort Required Bloombase StoreSafe is an agentless, turnkey encryption solution for data- at-rest applications. Its nondisruptive, application-transparent and protocol- preserving features make it ideally suited to protecting a plethora of storage infra- structures. It secures infrastructures from on-premises storage systems [including SAN, NAS, DAS, disk storage systems, tape library, virtual tape library (VTL) and object stores, for instance] to virtualization (hypervisor data stores), big data (Hadoop) and even off-premises cloud storage (AWS S3 and EBS, OpenStack Swift and Cinder, Google Cloud Storage, and Microsoft® Azure™ Storage, for example). Bloombase StoreSafe operates as a stor- age proxy over heterogeneous networked storage environments. To the network, the solution looks like a virtual LUN, a network share, VTL storage target or even a RESTful storage service endpoint. As applications make data storage requests, Bloombase StoreSafe automatically and transparently encrypts the plain text before it is physically persisted in the storage medium. Likewise, decryption of cipher text is performed on the fly as data is requested from the per- sistent storage, presenting the clear text to the requesting application as if it were Figure 1. The new Hitachi Data Systems and Bloombase application-transparent security solution safeguards data with industry- standard cryptography.
  • 2. DATASHEET © Hitachi Data Systems Corporation 2014. All rights reserved. HITACHI is a trademark or registered trademark of Hitachi, Ltd. Microsoft and Azure are trademarks or registered trademarks of Microsoft Corporation. All other trademarks, service marks, and company names are properties of their respective owners. DS-354-A DG October 2014 Corporate Headquarters 2845 Lafayette Street Santa Clara, CA 95050-2639 USA www.HDS.com community.HDS.com Regional Contact Information Americas: +1 408 970 1000 or info@hds.com Europe, Middle East and Africa: +44 (0) 1753 618000 or info.emea@hds.com Asia Pacific: +852 3189 7900 or hds.marketing.apac@hds.com never encrypted. This schema guarantees operational transparency and maximum interoperability. Unauthorized clients accessing data from a StoreSafe protected persistent storage will be unable to interpret the protected cipher text. Supporting a host of industry-standard pro- tocols, StoreSafe is application transparent, operating-system agnostic, portable across storage technologies and vendor neutral. Purpose-built, StoreSafe is a software appli- ance adapted for deployment on commodity hardware servers in both physical data centers and virtual data centers. It can be deployed on hypervisors and private clouds, or as compute instances on cloud infrastructures. Hitachi Content Platform: Enterprise-Class Cloud Storage Hitachi Content Platform is an unstructured content object store that facilitates access and retention of data in a multitenant envi- ronment. Through HCP, applications interact with content over standard network storage protocols. Organizations can quickly provision storage across different on- and off-premises data center topologies while retaining the free- dom to move data quickly and automatically. An intelligent, object storage system, HCP supports multiple tiers of storage for a wide range of structured and unstructured con- tent. It also offers a multitenant architecture and object versioning, all in a single platform. Other features include: ■■ Content immutability via “write once, read many” (WORM) capabilities. ■■ Content retention at the storage layer. ■■ Encryption of data against unauthorized access. ■■ Deduplication capabilities: compression; built-in data protection, verification and repair; bi-directional tier to cloud. ■■ Replication services for disaster recovery. ■■ High scalability, up to 80PB. Data Protection Services Hitachi Data Systems offers various data protection and replication services that sim- plify and accelerate local and remote data replication and disaster recovery solutions. These solutions enable normal business operations to resume in minutes, rather than hours or days, following a primary site outage. They help you meet your service levels quicker and with lower risk. HCP and StoreSafe: Security, Flexibility and Performance The Bloombase StoreSafe solution integrates with anything from traditional storage systems to next-generation object storage solutions like Hitachi Content Platform. StoreSafe pro- vides robust and reliable privacy protection for content management, retention, backup and archival applications with HCP. StoreSafe supports transparent encryption protection of HCP data content over network storage pro- tocols including NFS, CIFS, HTTP, WebDAV, AWS S3 and other RESTful storage services. This allows existing HCP applications to auto- matically encrypt business-sensitive data as they write through StoreSafe. Likewise, by retrieving secure HCP content via StoreSafe, encrypted information is automatically deciphered and presented to trusted HCP applications as plain text. Without needing to modify the business logic of HCP applica- tions, organizations can immediately ensure that their business-sensitive information is managed by HCP securely and meets data privacy regulatory compliance requirements. StoreSafe realizes true separation of duties (SoD) without impacting storage administra- tors and operators. Data is stored in standard volumes, shares, files and objects and are encrypted or decrypted on the fly without supervision and transparently. StoreSafe seamlessly protects both on- and off- premises at-rest data, regardless of the complexity of the heterogeneous storage infrastructure or storage medium. It can just as easily protect data in content addressed storage (CAS) such as object stores, tape libraries, VTLs and various cloud storage ser- vices. Enterprises can mitigate data leakage threats and still meet data privacy and regula- tory compliance requirements cost effectively. Because of its transparent, agentless storage proxy schema, the solution is futureproof and ensures easy integration with any storage technology. Highly scalable, StoreSafe is built for high availability and mission-critical applications. It offers high-speed AES encryption and indus- try standard IEEE 1619 compliant storage security. StoreSafe leverages Intel’s AES-NI cryptographic accelerator to dynamically even out encryption workloads. There is a built-in pluggable cipher algorithm architecture that facilitates adaptation and enables compliance with specific national and vertical market security requirements. Other supported standards include built-in NIST FIPS 140-2 certified key management and support for PKCS#11 hardware security modules (HSM) and OASIS KMIP compliant key managers. Together, Hitachi Data Systems and Bloombase deliver unique transparent encryption protection. They enable business applications to secure unstructured data contents seamlessly with validated cryptographic technologies at zero operational change. These capabilities give applications a trusted data environment for day-to-day storage and long-term archival. To learn more, contact your HDS or Bloombase representative or visit www.HDS.com. LEARN MORE HDS and Bloombase