Whitepaper - Vormetric Data Security Platform
Whitepaper - Vormetric Data Security Platform
Unstructured
Files
Structured Application-
Databases Layer
Security
Intelligence
Big Data
Collection
Vormetric
Data Security SIEM
Cloud Manager Integration
KMIP
Compliant Certificate
Keys Storage
Vormetric.com
Data Sheet
Vormetric Data Security Platform
PLATFORM PRODUCTS
Vormetric Data Security Manager
Offers centralized management of keys and policies for the entire suite of products
available within the Vormetric Data Security Platform. It is available as a virtual or FIPS
140-2 physical appliance.
Vormetric.com
Data Sheet
Vormetric Data Security Platform
KMIP
DSM
Web GUI CLI / API
DSM
Policy and key
Management
Vormetric Data Security Manager
Vormetric.com
Data Sheet
Vormetric Data Security Platform
Number of CPUs 2
RAM (GB) 4
Hard Disk (GB) 80
DSM Enterprise—Physical VOR-DSM-AP50-ENT Physical appliance. No agent management limit. FIPS 140-2 Level 2.
DSM Enterprise—Virtual VOR-DSM-VM50-ENT Virtual appliance. No agent management limit. FIPS 140-2 Level 2.
Option to upgrade from an existing DSM 25 to DSM Enterprise
Upgrade DSM 25 to Enterprise VOR-AO-ENT (physical or virtual).
FIPS 140-2 Level 3 Upgrade VOR-AO-HSM00-PL-P Upgrade physical appliance to FIPS 140-2 Level 3 validation.
Must be selected at time of order.
Vormetric.com
Data Sheet
Vormetric Data Security Platform
Vormetric Transparent
Encryption Specifications
Vormetric Transparent Encryption enables data-at-rest encryption, Key Benefits
privileged user access control, and the collection of security • Broadest platform support in industry:
intelligence logs for structured databases and unstructured Windows, Linux, and Unix operating
systems
files —including those residing in physical, big data, and cloud
• Easy to deploy; no application
environments. By leveraging this transparent approach, your customization required
organization can implement encryption, without having to make • High performance encryption
changes to your applications, infrastructure, or business practices. • Strong encryption and Suite B protocol
Unlike other encryption solutions, protection does not end after support
the encryption key is applied. Vormetric continues to enforce least- • Privileged user access control
• Log all permitted, denied and
privileged user policies to protect against unauthorized access by restricted access attempts from
users and processes, and it continues to log access. With these users, applications and processes
capabilities, you can ensure continuous
protection and control of your data.
Technical Specifications
The agent enforces granular least-privileged user access policies that protect data
from misuse by privileged users and advanced persistent threat (APT) attacks.
Granular policies can be applied by user, process, file type, time of day, and other
parameters. Enforcement options are very granular; they can be used to control not
only permission to access clear-text data, but what file-system commands are
available to a user.
Vormetric.com
Data Sheet
Vormetric Data Security Platform
Vormetric Application
Encryption Specifications
Use Vormetric Application Encryption any time you need to do Key Benefits
application-layer encryption of a specific field or column in a
database, big data node, or PaaS environment. Vormetric • Leverage proven, Vormetric high-
performance encryption and key
Application Encryption is a library that simplifies the integration management
of encryption with existing corporate applications. The library • Broad application and platform support
provides a set of documented, standards-based APIs that can be • Centralize control of application-layer
encryption and file system encryption
used to perform cryptographic and key management operations. • Stop malicious DBAs, cloud
Vormetric
Vormetric Application
Application Encryption
Encryption eliminates the time, complexity, administrators, hackers, and authorities
and risk of developing and implementing an in-house encryption with subpoenas from accessing
Compliance without the complexity valuable data
and key management solution.
Technical Specifications
Vormetric
Application Application Encryption • Supported Environments: Microsoft.NET
VAE
www.acme.com
2.0 and higher, JAVA 6 and 7, and C
Web Server Application
Server • Standards: OASIS PKCS#11 APIs
Encryption Key • Encryption: AES
Request / Response
at initial request
• Operating Systems: Windows 2008,
2012 and Linux
Database or Big Data DSM
• Performance: over 50,000 credit card
size encryption transactions per second
• Policy and Key Administration: Vormetric
REDUCING APPLICATION-LAYER ENCRYPTION Data Security Manager
COMPLEXITY AND COSTS
Application-layer encryption is typically employed when compliance or regulatory
mandates require encryption of specific fields at the application layer, before data is
stored. Vormetric Application Encryption reduces the complexity and costs
associated with meeting this requirement, simplifying the process of adding
encryption capabilities to existing applications. Developers can use libraries for
Java, .NET, or C to facilitate communication between applications and the
Vormetric Application Encryption Agent. This agent encrypts data and returns the
resulting cipher text to the application, using the same proven high-performance
encryption and reliable key management capabilities that are employed by
Vormetric Transparent Encryption. All policy and key management is done through
the DSM, simplifying the data security operations environment by reducing the
number of administrative consoles that administrators have to learn and maintain.
Vormetric.com
Data Sheet
Vormetric Data Security Platform
keys from all Vormetric products, and securely store and inventory • Operational efficiency, continuous
third-party keys and certificates. The product provides a high availability, secure storage, and inventory
of certificates and encryption keys
availability, standards-based, FIPS 140-2 validated key manage-
• Alerts offer proactive notifications of
ment platform that can secure keys for Microsoft TDE, Oracle TDE,
certificate and key expiration
and KMIP-compliant devices. By consolidating key management,
• Reports provide status and
this product fosters consistent policy implementation across characteristic information, audit support
multiple systems, reducing training and maintenance costs.
Technical specifications
Integrated Vormetric Keys and Policies TDE Keys
Manage Security Objects
Oracle Tablespace Encryption Keys
• X.509 certificates
Encrypted Tablespaces • Symmetric and asymmetric
SQL Server Database Encryption Keys encryption keys
DSM
Administration
Encrypted Database
• Secure-web, CLI, API
Vormetric.com
Data Sheet
Vormetric Data Security Platform
Vormetric Security
Intelligence Specifications
Vormetric Security Intelligence are granular event logs that produce Key Benefits
an auditable trail of permitted and denied access attempts from
• Increased visibility of sensitive
users and processes, delivering unprecedented insight into file data access
access activities. Logging occurs at the file system level, removing • Accelerated APT and insider threat
the threat of an unauthorized user gaining stealthy access to detection
sensitive data. These logs can inform of unusual or improper data • Export logs in all major log formats:
Syslog RFC5424, CEF, and LEEF
access and accelerate the detection of insider threats, hackers, and
• Fast integration with Vormetric SIEM
advanced persistent threats (APT) that have bypassed perimeter partners
security. With the availability of pre-defined dashboards and • Consolidated and consistent
reports, Vormetric Security Intelligence easily integrates with SIEM compliance and audit reporting
systems to produce compliance and security reports. SIEM Partner Integration
Data protected by
Vormetric Transparent Encryption
SIEM
• Vormetric Splunk App
Vormetric • HP ArcSight CEF Certified
Data Security Manager
SmartConnector
Big Data SAN / NAS
• IBM QRadar Vormetric Device
Vormetric SIEM Partners
Support Module
Identify unusual file
access patterns
Cloud File About Vormetric
Systems
Accelerate detection of
insider threats and APTs
Granular security RFC5424 Logs Create compliance
Vormetric (@Vormetric) is the industry
intelligence logs
on file access
CEF Logs
LEEF Logs
and audit reports leader in data security solutions that span
VMs Databases
physical, virtual and cloud environments.
Data is the new currency and Vormetric
PROVIDING SECURITY INTELLIGENCE helps over 1400 customers, including 17
of the Fortune 25 and many of the world’s
Vormetric Security Intelligence provides logs that detail which processes and most security conscious government or-
users have accessed protected data. Sharing these logs with a SIEM platform helps ganizations, to meet compliance require-
uncover anomalous process and user access patterns, which can prompt further ments and protect what matters — their
sensitive data — from both internal and
investigation. For example, an administrator or process may suddenly access much
external threats. For more information,
larger volumes of data than normal, or attempt to do an unauthorized download of
please visit: www.vormetric.com.
files. Such inconsistent usage patterns could point to an APT attack or malicious
insider activities. Traditionally, SIEMs relied on logs from firewalls, IPSs, and NetFlow Global EMEA
devices. Because this intelligence is captured at the network perimeter, these Headquarters Headquarters
approaches leave a commonly exploited blind spot: They don’t provide any visibility 2545 N. 1st Street, 200 Brook Drive
into the activity occurring on servers. Vormetric Security Intelligence fills this blind San Jose, CA 95131 Green Park, Reading,
spot, helping accelerate the detection of APTs and insider threats. Tel: +1.888.267.3732 RG2 6UB
Fax: +1.408.844.8638 United Kingdom
COMPLIANCE REPORTING www.vormetric.com Tel: +44.118.949.7711
Fax: +44.118.949.7001
In order to adhere to many compliance mandates and regulations, many organizations
must be able to prove that data protection is in place and operational. Vormetric APAC Headquarters
Security Intelligence is commonly used to prove to an auditor that encryption, key 27F, Trade Tower, 159 -1
management, and access policies are working effectively. The detailed logs are Samsung-dong,
shared and reviewed to specify when users and processes accessed data, under Gangnam-gu, Seoul. (135-729)
which polices, and if access requests were allowed or denied. The logs will even Tel: +82.2.6007.2662
expose when a privileged user leverages a command like “switch user” in order to www.vormetric.co.kr
attempt to imitate another user.
©2014 Vormetric, Inc. All rights reserved.
Vormetric.com