Escolar Documentos
Profissional Documentos
Cultura Documentos
www.Vormetric.com
Presentation Overview
Slide No: 2
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
Integrated
Slide No: 3
Third Party
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
!
3
Slide No: 4
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
What is needed is a powerful, integrated solution that can enable IT to Ensure the availability, security, and manageability of encryption keys Across the enterprise.
Backup
Storage Key State Management
Generation
Authentication
Restoration
Auditing Security
Slide No: 5
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
Interoperability Standards
PKCS#11
Public Key Cryptographic Standard used by Oracle Transparent Data Encryption (TDE)
EKM
Cryptographic APIs used by Microsoft SQL server to provide database encryption and secure key management
OASIS KMIP
Single comprehensive protocol defined by consumers of enterprise key management systems
!
Slide No: 6
Even though vendors may agree on basic cryptographic techniques and standards, compatibility between key management implementation is not guaranteed.
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
Disparate Systems
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
Requires firms in USA to publicly acknowledge a data breech although it can damage their reputation.
Gramm Leach Bliley Act (GLBA)
U.S. Health I.T. for Economic and Clinical Health (HITECH) Act
Includes a breach notification clause for which encryption provides safe harbor in the event of a data breach.
Slide No: 8
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
Manage Vormetric
Encryption
Agents
Symmetric: AES, 3DES, ARIA Asymmetric: RSA 1024, RSA 2048, RSA 4096 Other: Unvalidated security materials (passwords, etc.).
Slide No: 10
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
Key Vault
Licensable Option on DSM Web based or API level interface for import and export of keys Supports Symmetric, Asymmetric, and Other Key materials Reporting on key types
Oracle 11g R2 TDE (Tablespace Encryption) MSSQL 2008 R2 Enterprise TDE (Tablespace Encryption)
Slide No: 11
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
Master Encryption keys are stored on the local system in a file with the data by default.
Slide No: 12
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
Key Agent
Vormetric DSM acts as Network HSM for securing keys for Oracle and Microsoft TDE Vormetric Key Agent is installed on the database server
Slide No: 13
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
Slide No: 14
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
Slide No: 15
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
Protecting the enterprises valuable digital assets from accidental or intentional misuse are key goals for every IT team today
A centralized enterprise key management solution is critical to ensuring all sensitive enterprise data is secure and available.
Slide No: 16
Copyright 2012 Vormetric, Inc. Proprietary and Confidential. All rights reserved.
Centrally Manage Encryption Keys Oracle TDE, SQL Server TDE and Vormetric.
Download Whitepaper
Click - to - tweet
www.Vormetric.com