Title: Background to Vaulting Technology
1Background to Vaulting Technology Alon Cohen Feb
2004
2Protecting data in a Network environment - What
kind of risks does it face?
- Endless Security Risks, in 4 main categories
- Storage Based Security Attacks
- Host Based Security Attacks
- Application Based Security Attacks
- Network Based Security Attacks
My ERP
3How do we deal today with all these threats?
Storage Based Security Risks
Host Based Security Risks
What Technologies Should I Use? IPSec/SSL
VPN? Firewall? Dos/DDos Defensive
Tools? Proxy? Intrusion Detection? Content
Filtering? Anti-Virus? Which Vendor? Checkpoint?
Netscreen? Cisco? Microsoft? Symantec? Netwo
rk Associates?
What Technologies Should I Use? Access
Control? O/S Hardening? Host Based
Firewall? Intrusion Detection? Two Factors
Authentication? Which Vendor? Computer
Associates? Netegrity? Argus? Cisco? Microsoft
? Entercept? RSA?
What Technologies Should I Use? Storage
Encryption? LUN Masking? Storage Based
Zoning? HBA-Based Authentication? Which
Vendor? Brocade? Neoscale? Decru? Vormetric?
Orano? Permabit?
What Technologies Should I Use? Application
Scanners? Application Firewall? Application
Control? Which Vendor? Sanctum? Kavado? Foundst
one? Stratum8? Harris?
The Problem We actually need to combine all (or
most) of these! Security is a chain and its
strength is the strength of its weakest link.
Application Based Security Risks
Network Based Security Risks
4The Role of Perimeter Security
Perimeter Security only splits the world into two
networks the Internal Enterprise and the
Internet. Now we still need to secure the data
within each one of these networks, dealing with
Internal Risks and External Risks.
The Enterprise
The Internet
5Introducing Vaulting Technology
The Vault is a Safe Haven, highly secured
regardless of overall network security. No need
to deal with security risks related to the
Storage, the Host, the Application or the
Network, the Vault is designed and built to deal
with all these risks.
6Security becomes easy US Patent 6,356,941
710 Layers of Security are already there
8But not only security is improved so is
connectivity
Telecommuter
The Vault
InternalNetwork
Business partner
CIFS, FTP, SMTP, HTTP
CIFS, FTP, SMTP, HTTP
End-to-end Security, High-Performance, Worldwide
Accessibility and Distributed Admin.
Business partner
9