Transcript
Page 1: Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper  to protect enterprise data at rest

www.Vormetric.com

Vormetric Encryption Architecture Overview

Protecting Enterprise Data at Rest with Encryption, Access Controls, and Auditing

Page 2: Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper  to protect enterprise data at rest

Data is Your Business

Slide No: 2

!Data security breaches are harmful to any organization of any size.

Page 3: Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper  to protect enterprise data at rest

Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. Slide No: 3

2012 DATA BREACH INVESTIGATION REPORTA study conducted by the Verizon RISK Team with cooperation from global policing agencies.

34% 35%94%

People

Servers People

Devices Servers

Page 4: Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper  to protect enterprise data at rest

Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Protect private and confidential info.

Slide No: 4

Global Compliance

PCI DSS

HITECH Act

UK Data Protection Act

South Korea’s PIPA

And more …

Server Defense-in-Depth Controls

Page 5: Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper  to protect enterprise data at rest

Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Data is Everywhere

Slide No: 5

Unstructured dataFile SystemsOffice documents,PDF, Vision, Audio & otherFax/Print ServersFile Servers

Business Application Systems (SAP, PeopleSoft, Oracle Financials, In-house, CRM, eComm/eBiz, etc.)Application Server

Remote locations & systems

Storage & Backup SystemsSAN/NASBackup Systems

Data CommunicationsVoIP SystemsFTP/Dropbox ServerEmail Servers

Structured dataDatabase Systems(SQL, Oracle, DB2, Informix, MySQL)Database Server

Security & Other Systems(Event logs, Error logsCache, Encryption keys, & other secrets)Security Systems

!Data exists in different formats, states, and locations.Traditional Controls are not designed to secure it.

Page 6: Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper  to protect enterprise data at rest

Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Data Security Simplified

Slide No: 6

TransparentMust be transparent to business processes, end users, and applications

Data type neutral – any data, anywhere

StrongPrivileged users should not have access to sensitive data

Firewall your data – approved users and applications allowed, deny all others.

EfficientSLA, User, and Application performance must remain acceptable

Encryption overhead can approach zero

EasyEasy to Understand

Easy to Implement

Easy to Manage

Page 7: Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper  to protect enterprise data at rest

Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Vormetric Data Security

Slide No: 7

Encryption Agent

Unstructured

Encryption Agent

DatabaseSQL Server

2008 / 2012 TDE

Key Agent

Oracle 11gR2 TDE

Key Agent

Data Security Manager

Vormetric Key Vault

Vormetric Encryption

Vormetric Key Management

Page 8: Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper  to protect enterprise data at rest

Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Vormetric Encryption Architecture

Slide No: 8

Users

Application

Database

OS

File System

SAN, NAS, DAS Storage

FS Agent

Policy is used to restrict access to sensitive data by user and process information provided by the OS.

SSL/TLS

Page 9: Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper  to protect enterprise data at rest

Protect Server Data

Copyright 2012 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. Slide No: 9

DAS SAN NAS VM CLOUD

Log FilesPassword filesConfig FilesArchive

File ShareArchiveContentMulti Needs

Data FilesTransaction LogsExportsBackup

IIS APACHE WebLogic

DB2 Oracle SQL Sybase MySQL

File Servers FTP Servers Email Servers Others

Log FilesPassword filesConfig filesArchive

ERP CRM Payment CMS Custom Apps

Page 10: Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper  to protect enterprise data at rest

We Secure The Data That Runs Your Business

Download Whitepaper

Page 11: Protecting Enterprise Data at Rest: Vormetric Encryption Architecture Overview Whitepaper  to protect enterprise data at rest

www.Vormetric.com

Vormetric Encryption Architecture Overview

Protecting Enterprise Data at Rest with Encryption, Access Controls, and Auditing


Recommended