SlideShare a Scribd company logo
www.evault.com © 2013 EVault, Inc. All Rights Reserved.
Technical Brief: Secure, Efficient
Data Deduplication for Endpoint Protection
White Paper
Data deduplication is a key to managing bandwidth impact and storage
growth. But not all deduplication is the same: many deduplication processes
expose data to security risks and, rather than improving bandwidth, actually
further restrict it. The result is that many organizations are forced to choose
between the benefits of deduplication or the continuous security and privacy
offered by data encryption.
The problem is in the way many data deduplication processes work with data encryption.
Data deduplication is implemented through an algorithm that analyzes data blocks
across an entire data store. The process identifies duplicate blocks in the target archive
and eliminates them, on the client side, before the data is transmitted. The remaining
data blocks are then reduced in size (compressed) to minimize storage and reduce
bandwidth consumption. To further reduce the amount of data being transmitted, the
deduplication process may then be applied across multiple data sources.
But data deduplication can run into a problem when it encounters data encryption—
a process that ensures information can be read only by authorized users. When data is
encrypted on the source, using different encryption keys, the encryption renders them
differently than the typical deduplication process, creating device-specific data blocks
unrecognized by the source as duplicates. Traditional data deduplication processes do
not eliminate these encrypted duplicates, thus rendering the process ineffective.
As noted above, this leaves organizations with a choice: get the full benefits of data
deduplication to minimize bandwidth impact and manage storage growth, or get the full
benefits of data encryption. But not both.
EVault Secure Deduplication Addresses
Gaps in Security, Reduces Bandwidth Impact
EVault®
Endpoint Protection includes a client-side data deduplication process that goes
several steps further than other deduplication processes to ensure data safety and
minimize bandwidth and storage impact. Its goal is to ensure end-to-end data security
and privacy while using the most efficient backup processes possible.
The solution’s unique encryption and deduplication processes remove the traditional
vulnerabilities by deduplicating data after encryption—data does not have to be
decrypted in order to be deduplicated across the target environment—and by
implementing additional safeguards for encryption keys. Its block- and device-level
encryption system never allows for data exposure; data remains encrypted from device
to final storage.
White Paper
Technical Brief:
Secure, Efficient
Data Deduplication for
Endpoint Protection
EVault Endpoint Protection assigns encryption keys based on “scope”—data blocks
within an assigned company, team, or user group that enable the deduplication
algorithm to identify data blocks across multiple sources right at the device. This
secure global deduplication process never exposes data and it minimizes impact on
the network and storage.
Additionally, these scoped blocks can be identified only by a unique encrypted
encryption key for each data block. No single or shared key exposes data, minimizing
vulnerabilities across the organization.
Each data block is completely processed on the client side. To maintain security, no
data analysis is even possible on the server; it just files the data in the data store. Other
data deduplication technologies decrypt data on the server (compromising security,
privacy, multitenancy, and so on), deduplicate data only from individual data sources
(which lacks the benefits of global deduplication), or introduce key management
vulnerabilities (single or shared keys that expose data to unauthorized entities).
How It Works
EVault Endpoint Protection secure deduplication processes disassemble each file into a
set of variable-length blocks that are then processed as follows:
1.	 Selective decompression of data. Each data block is selectively
compressed using standard compression techniques. The process is
“selective” in that compression is applied only if the original version of the
block is larger than the compressed version. The smallest version of the
block is then passed onto the next stage.
2.	 Associating environments (scoping). The compressed data block is
then “scoped” based on the configuration of the environment set by
the administrator. Scoping allows for explicit data separation between
organizational boundaries in a shared environment. It can be configured
from enterprise to individual levels, drawing required boundaries in the vault
where data is stored. Configurations may include teams or departments.
3.	 Encryption key assignment of data blocks. After scoping rules have been
applied, a unique block encryption key is generated based on the scoping
rules. This key is then used to apply AES 256-bit encryption to the block.
The result is an encrypted data DNA block.
4.	 Encrypting the encryption key. The block encryption key is then itself
encrypted and any clear text representation of the key is removed.
5.	 True global deduplication. All encryption processing thus far has been
based on scope, and all data DNA blocks are identical within the scope.
This allows the data to be deduplicated across the target archive, so only a
single instance of any particular data block is ever sent to the archive.
6.	 Indexing. After data duplication, each file can be represented by a simple
index that associates a list of unique data blocks with their order of
arrangement, and identifies the block encryption key required to completely
reassemble an instance of the original data. Every data source will maintain
its own unique index of its data, but will share all the encrypted data DNA
blocks (subject to scoping rules). No further analysis of the data can be
performed once it has been dispatched by the client.
2013.11.0003_wp_us (updated 11/11/2013)
White Paper
Technical Brief:
Secure, Efficient
Data Deduplication for
Endpoint Protection
Headquarters | 201 3rd Street | Suite 400 | San Francisco, CA 94103 | 877.901.DATA (3282) | www.evault.com
NL (EMEA HQ) +31 (0) 73 648 1400 | FR & S. Europe +33 (0) 1 73 00 17 00 | DE +49 89 1430 5410 | UK +44 (0) 1932 445 370
BR 0800 031 3352 | LATAM Evault_latin_america@evault.com | APAC APACTeam@evault.com
EVault and the EVault logo are registered trademarks, and cloud-connected and
“the best case for the worst case” are trademarks, of EVault, Inc.
The Only Endpoint Protection Solution
That Doesn’t Trade Deduplication for Security
With EVault Endpoint Protection, you don’t need to choose between the economic
benefits of data deduplication and your security requirements. You get it all.
As bandwidth limitations continue to rise and compliance requirements tighten,
minimizing bandwidth impact, maximizing storage savings, and maintaining privacy
all become increasingly important. Only the secure global data deduplication used by
EVault Endpoint Protection can deduplicate encrypted data, providing enterprises and
MSPs with the full economic benefits of data deduplication (freeing up bandwidth and
storage capacity) without sacrificing data security or privacy.
Take the Next Step
To learn more about EVault®
backup and recovery services,
call us at 1.877.901.DATA (3282), email us at concierge@evault.com,
or visit us at www.evault.com.

More Related Content

What's hot

Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
Guellord Mpia
 
Encryption 2021
Encryption 2021Encryption 2021
Encryption 2021
JoeOrlando16
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET Journal
 
Desktop support qua
Desktop support quaDesktop support qua
Desktop support qua
maheshnimbalkar
 
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
JPJ1405   Decentralized Access Control With Anonymous Authentication of Data ...JPJ1405   Decentralized Access Control With Anonymous Authentication of Data ...
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
chennaijp
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
ijsrd.com
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
IJERA Editor
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
 
Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2
Rishikesh Pathak
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital business
Ulf Mattsson
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
 
A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.
prudhvikumar madithati
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Nexgen Technology
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET Journal
 
Oruta
OrutaOruta
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
Jerome J. Penna
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Adz91 Digital Ads Pvt Ltd
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
LeMeniz Infotech
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
LeMeniz Infotech
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution
Harriet Schneider
 

What's hot (20)

Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
 
Encryption 2021
Encryption 2021Encryption 2021
Encryption 2021
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
Desktop support qua
Desktop support quaDesktop support qua
Desktop support qua
 
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
JPJ1405   Decentralized Access Control With Anonymous Authentication of Data ...JPJ1405   Decentralized Access Control With Anonymous Authentication of Data ...
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2Secure distributed deduplication systems with improved reliability 2
Secure distributed deduplication systems with improved reliability 2
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital business
 
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
 
A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.A hybrid cloud approach for secure authorized deduplication.
A hybrid cloud approach for secure authorized deduplication.
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
 
Oruta
OrutaOruta
Oruta
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution
 

Similar to Secure deduplication-evault-endpoint-protection

Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
Exclusive Networks ME
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
IRJET Journal
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
Iaetsd Iaetsd
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
Papitha Velumani
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
Anusha Chavan
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...
Damir Delija
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
MSMuthu5
 
FINAL REVIEW.pptx
FINAL REVIEW.pptxFINAL REVIEW.pptx
FINAL REVIEW.pptx
webdevelope
 
a hybrid cloud approach for secure authorized reduplications
a hybrid cloud approach for secure authorized reduplicationsa hybrid cloud approach for secure authorized reduplications
a hybrid cloud approach for secure authorized reduplications
swathi78
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
Procore Technologies
 
V5 i7 0169
V5 i7 0169V5 i7 0169
Deployment websese
Deployment webseseDeployment websese
Deployment websese
thanglx
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.s
karthi j
 
Phase1
Phase1Phase1
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
IRJET Journal
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
Emmanuel Oshogwe Akpeokhai
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and compliance
FITSFSd
 
Abstract
AbstractAbstract
Encryption technology
Encryption technologyEncryption technology
Encryption technology
Sivakumarraju Gangaraju
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
IJARIIT
 

Similar to Secure deduplication-evault-endpoint-protection (20)

Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 
FINAL REVIEW.pptx
FINAL REVIEW.pptxFINAL REVIEW.pptx
FINAL REVIEW.pptx
 
a hybrid cloud approach for secure authorized reduplications
a hybrid cloud approach for secure authorized reduplicationsa hybrid cloud approach for secure authorized reduplications
a hybrid cloud approach for secure authorized reduplications
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
Ensuring d.s
Ensuring d.sEnsuring d.s
Ensuring d.s
 
Phase1
Phase1Phase1
Phase1
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and compliance
 
Abstract
AbstractAbstract
Abstract
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...A robust and verifiable threshold multi authority access control system in pu...
A robust and verifiable threshold multi authority access control system in pu...
 

Recently uploaded

BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAANBUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
cahgading001
 
A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
Bruce Bennett
 
Learnings from Successful Jobs Searchers
Learnings from Successful Jobs SearchersLearnings from Successful Jobs Searchers
Learnings from Successful Jobs Searchers
Bruce Bennett
 
Leave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employeesLeave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employees
Sreenivas702647
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
Ghh
 
Tape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdfTape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdf
KateRobinson68
 
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
NWEXAM
 
Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024
SnapJob
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
Bruce Bennett
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
FauzanHarits1
 
Lbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdfLbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdf
ashiquepa3
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
kakomaeric00
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
Ghh
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
taqyea
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
2zjra9bn
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
Thomas GIRARD BDes
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
2zjra9bn
 
IT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a RoadmapIT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a Roadmap
Base Camp
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
dsnow9802
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
GabrielleSinaga
 

Recently uploaded (20)

BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAANBUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
BUKU PENJAGAAN BUKU PENJAGAAN BUKU PENJAGAAN
 
A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
 
Learnings from Successful Jobs Searchers
Learnings from Successful Jobs SearchersLearnings from Successful Jobs Searchers
Learnings from Successful Jobs Searchers
 
Leave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employeesLeave-rules.ppt CCS leave rules 1972 for central govt employees
Leave-rules.ppt CCS leave rules 1972 for central govt employees
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
 
Tape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdfTape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdf
 
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
 
Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
 
Lbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdfLbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdf
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
 
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
一比一原版布拉德福德大学毕业证(bradford毕业证)如何办理
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
 
IT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a RoadmapIT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a Roadmap
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
 

Secure deduplication-evault-endpoint-protection

  • 1. www.evault.com © 2013 EVault, Inc. All Rights Reserved. Technical Brief: Secure, Efficient Data Deduplication for Endpoint Protection White Paper Data deduplication is a key to managing bandwidth impact and storage growth. But not all deduplication is the same: many deduplication processes expose data to security risks and, rather than improving bandwidth, actually further restrict it. The result is that many organizations are forced to choose between the benefits of deduplication or the continuous security and privacy offered by data encryption. The problem is in the way many data deduplication processes work with data encryption. Data deduplication is implemented through an algorithm that analyzes data blocks across an entire data store. The process identifies duplicate blocks in the target archive and eliminates them, on the client side, before the data is transmitted. The remaining data blocks are then reduced in size (compressed) to minimize storage and reduce bandwidth consumption. To further reduce the amount of data being transmitted, the deduplication process may then be applied across multiple data sources. But data deduplication can run into a problem when it encounters data encryption— a process that ensures information can be read only by authorized users. When data is encrypted on the source, using different encryption keys, the encryption renders them differently than the typical deduplication process, creating device-specific data blocks unrecognized by the source as duplicates. Traditional data deduplication processes do not eliminate these encrypted duplicates, thus rendering the process ineffective. As noted above, this leaves organizations with a choice: get the full benefits of data deduplication to minimize bandwidth impact and manage storage growth, or get the full benefits of data encryption. But not both. EVault Secure Deduplication Addresses Gaps in Security, Reduces Bandwidth Impact EVault® Endpoint Protection includes a client-side data deduplication process that goes several steps further than other deduplication processes to ensure data safety and minimize bandwidth and storage impact. Its goal is to ensure end-to-end data security and privacy while using the most efficient backup processes possible. The solution’s unique encryption and deduplication processes remove the traditional vulnerabilities by deduplicating data after encryption—data does not have to be decrypted in order to be deduplicated across the target environment—and by implementing additional safeguards for encryption keys. Its block- and device-level encryption system never allows for data exposure; data remains encrypted from device to final storage.
  • 2. White Paper Technical Brief: Secure, Efficient Data Deduplication for Endpoint Protection EVault Endpoint Protection assigns encryption keys based on “scope”—data blocks within an assigned company, team, or user group that enable the deduplication algorithm to identify data blocks across multiple sources right at the device. This secure global deduplication process never exposes data and it minimizes impact on the network and storage. Additionally, these scoped blocks can be identified only by a unique encrypted encryption key for each data block. No single or shared key exposes data, minimizing vulnerabilities across the organization. Each data block is completely processed on the client side. To maintain security, no data analysis is even possible on the server; it just files the data in the data store. Other data deduplication technologies decrypt data on the server (compromising security, privacy, multitenancy, and so on), deduplicate data only from individual data sources (which lacks the benefits of global deduplication), or introduce key management vulnerabilities (single or shared keys that expose data to unauthorized entities). How It Works EVault Endpoint Protection secure deduplication processes disassemble each file into a set of variable-length blocks that are then processed as follows: 1. Selective decompression of data. Each data block is selectively compressed using standard compression techniques. The process is “selective” in that compression is applied only if the original version of the block is larger than the compressed version. The smallest version of the block is then passed onto the next stage. 2. Associating environments (scoping). The compressed data block is then “scoped” based on the configuration of the environment set by the administrator. Scoping allows for explicit data separation between organizational boundaries in a shared environment. It can be configured from enterprise to individual levels, drawing required boundaries in the vault where data is stored. Configurations may include teams or departments. 3. Encryption key assignment of data blocks. After scoping rules have been applied, a unique block encryption key is generated based on the scoping rules. This key is then used to apply AES 256-bit encryption to the block. The result is an encrypted data DNA block. 4. Encrypting the encryption key. The block encryption key is then itself encrypted and any clear text representation of the key is removed. 5. True global deduplication. All encryption processing thus far has been based on scope, and all data DNA blocks are identical within the scope. This allows the data to be deduplicated across the target archive, so only a single instance of any particular data block is ever sent to the archive. 6. Indexing. After data duplication, each file can be represented by a simple index that associates a list of unique data blocks with their order of arrangement, and identifies the block encryption key required to completely reassemble an instance of the original data. Every data source will maintain its own unique index of its data, but will share all the encrypted data DNA blocks (subject to scoping rules). No further analysis of the data can be performed once it has been dispatched by the client.
  • 3. 2013.11.0003_wp_us (updated 11/11/2013) White Paper Technical Brief: Secure, Efficient Data Deduplication for Endpoint Protection Headquarters | 201 3rd Street | Suite 400 | San Francisco, CA 94103 | 877.901.DATA (3282) | www.evault.com NL (EMEA HQ) +31 (0) 73 648 1400 | FR & S. Europe +33 (0) 1 73 00 17 00 | DE +49 89 1430 5410 | UK +44 (0) 1932 445 370 BR 0800 031 3352 | LATAM Evault_latin_america@evault.com | APAC APACTeam@evault.com EVault and the EVault logo are registered trademarks, and cloud-connected and “the best case for the worst case” are trademarks, of EVault, Inc. The Only Endpoint Protection Solution That Doesn’t Trade Deduplication for Security With EVault Endpoint Protection, you don’t need to choose between the economic benefits of data deduplication and your security requirements. You get it all. As bandwidth limitations continue to rise and compliance requirements tighten, minimizing bandwidth impact, maximizing storage savings, and maintaining privacy all become increasingly important. Only the secure global data deduplication used by EVault Endpoint Protection can deduplicate encrypted data, providing enterprises and MSPs with the full economic benefits of data deduplication (freeing up bandwidth and storage capacity) without sacrificing data security or privacy. Take the Next Step To learn more about EVault® backup and recovery services, call us at 1.877.901.DATA (3282), email us at concierge@evault.com, or visit us at www.evault.com.