ENCRYPTION’S EVOLUTION IN TODAY’S GDPR COMPLIANT WORLD Mark Christie, Senior Systems Engineer, StorMagic Kevin Mooney, Solutions Engineering Manager, Fornetix SIMPLIFYING STORAGE AT THE EDGE
DATA SECURITY AT THE EDGE Top reasons for security • Regulations – GDPR, HIPAA, PCI DSS, SOX • Threats – data breaches, cyber attacks, ransomware 50% Protecting edge sites can be difficult & expensive • Potentially less physical security than the datacenter 20% • Encryption even more important Not all HCI solutions offer encryption 2018 2020 (Predicted) • Datacenter-class solutions may not offer it % of enterprises • OR … .could be very expensive for the edge purchasing encryption products 2
ENCRYPTION IS CRITICAL 25.6% Probability a company will have a major data breach Source: Ponemon Institute Heavy Use of Encryption Is Rising: Sources: Sophos, US Census 3
WHERE ARE ALL THE KEYS? Encrypted Data in Transit Voice, email, chat, website, network, files Encrypted Data at Rest Storage, databases, IoT devices, hard drives, files, applications 4
TODAY’S SPEAKERS Mark Christie Senior Systems Engineer at StorMagic With more than a decade of experience in technical systems engineering, his primary responsibilities at StorMagic include global customer support, product testing, software release management and documentation, and pre-sales demonstrations and support. Kevin Mooney Solutions Engineering Manager at Fornetix Kevin is an experienced Solutions Architect with a passion for cyber security and integration programming. Expert in identity management, cryptographic key management, application delivery, and enterprise architecture. 5
WHAT TO ENCRYPT? Data-at-rest Encryption is becoming more important for many customers to protect sensitive data, including: Intellectual Property (IP) • Blueprints, specifications and designs Financial • Credit card details Personally Identifiable Information (PII) • Medical records, X-ray images, social security number, driver's license, passport details. Legal documents 6
WHY ENCRYPT? Protecting data is governed by different regulatory, risk or compliance requirements • HIPAA - Health Insurance Portability and Accountability Act - US healthcare • FIPS 140-2 - Federal Information Processing Standard - US Defense & Federal • GDPR - EU General Data Protection Regulation (GDPR) • Sarbanes-Oxley (SOX) - Finance • PCI DSS - Payment Card Industry Data Security Standard (PCI DSS) – Finance • UK Data Protection Bill (DPB) • Others : HITECH, EPCS, FISMA, ISO, GLBA 7
GDPR • Personally identifiable information of European Union citizens • Applies even if the company is not located within an EU country • Fines start at 2% of gross revenue or €10 million, whichever is higher 8
SvSAN SOLVES PAIN AT THE EDGE • Virtualizes disk, flash and memory • Software only: runs on any hardware • Start with 2 node clusters with no single point of failure FLEXIBLE SIMPLE COST EFFECTIVE Today’s needs, future proofed Set and forget Lightest footprint, lowest cost 9
SLASHING THE COST OF DATA ENCRYPTION ACHIEVE MILITARY-GRADE DATA SECURITY AND SAVE 85% SIMPLE – Secure data without the hassle • 100% software approach – FIPS 140-2 compliant • Data destruction on failed drives not needed COST-EFFECTIVE – 85% less than competitors • No OS or hypervisor-level encryption required • No special hardware FLEXIBLE – Many use cases • Single site, stretched clusters or 100’s of edge sites • Encrypt any volume and data inflight between servers 10
SINGLE SITE - SME DATACENTER • Storage high availability • Agility through software • Scale up with commodity hardware • Add performance through flash and memory caching • Eliminate single points of failure 11
EDGE SITES - CENTRALIZED SHARED KMS • Centralized management & deployment • Single, shared remote witness • Powerful automation tools and scripts • Integrates with vCenter and SCOM • Eliminate remote site security concerns 12
WORKS WITH ANY HARDWARE Any storage type vSphere & Hyper-V Any x86 server 13
WHY DO YOU NEED A THIRD-PARTY KEY MANAGER? External Key Management Solutions protect your data when storage devices or entire storage systems can be physically accessed by an intruder, are lost, or stolen. Some of the features and advantages of external key management solutions include: • Centralized, consistent key management • The ability to easily meet compliance mandates • The separation of duties 14
FORNETIX HAS BUILT A KEY MANAGEMENT SOLUTION that enables a unified approach to data security through deploying and enforcing encryption across the entire organization.
Data-at-Rest Data-in-Motion SaaS Storage Encryptors Internet-of-Things Disk Cloud Networking CASB PKI Database SAN / NAS Tape Backups Proxy / Balancer SEDs Software Virtual Machines Web Servers Virtual SSH With unified encryption management, you have the ability to store and control all your encryption keys across all your environments whether it's on premise storage, virtualization, or cloud.
MAJOR TAKEAWAYS • Security at the edge is becoming more important • GDPR is here and it’s critical to adhere to • Not all HCI solutions offer encryption • The StorMagic/Fornetix solution makes this all very easy 17
THANK YOU FOR JOINING US! ANY QUESTIONS? StorMagic Free Trial: Mark Christie: stormagic.com/trial mark_christie@stormagic.com Fornetix Free Trial: Kevin Mooney: fornetix.com/free-ko kmooney@fornetix.com 18
Recommend
More recommend