SlideShare a Scribd company logo
CUSTOMER SPOTLIGHT
                                                                                          Bloombase® Spitfire StoreSafe™
                                                                                           Storage Security Server
A Government                                                                              Bloombase® Spitfire KeyCastle™
                                                                                           Key Management Server
Border Control
Agency
                                             Government organization secures privacy of sensitive personal border con-
                                             trol data of a data warehouse system using Bloombase® Spitfire StoreSafe™
                                             storage encryption and Bloombase® Spitfire KeyCastle™ key management
                                             security solution



AT A GLANCE

 ABOUT THE CUSTOMER                            WHY BLOOMBASE SOLUTIONS

 • Government agency controlling               • Enabled customer to leverage exist-
   border entrance of people and issue          ing hardware and software
   of personal identification and travel       • Provided comprehensive key and
   documents                                    encrypted storage management
 • Employees: More than 12,000                 • Platform and application neutral
                                               • Scalable and extensible
 SUMMARY                                       • Custom cipher support


 To protect privacy of sensitive personal      IMPLEMENTATION HIGHLIGHTS
 information of an off-the-shelf business
 intelligence and reporting system             Was first organization in public sector
 according to regional personal data           to institute an end-to-end persistence
 privacy laws                                  data protection from data extraction,
                                               transform and load (ETL), data ware-
 KEY CHALLENGES                                housing, reporting, backup and archi-
                                               val
 • No change to end user, administrator
  and operator workflow                        KEY BENEFITS
 • No significant degradation of system
  throughput and response                      • Immediate information privacy    regu-     Overview
 • Off-the-shelf data warehouse system           latory compliance
  cannot be altered                            • Transparent deployment                     A border control government organization runs an intelligence
 • No coding required                          • High encryption performance
 • No hardware, system and application
                                                                                            system to keep track of entrance and exit of people for collection
                                               • No system response degradation
  change                                       • Highly available and fault-tolerant
                                                                                            and analysis of movement habits of travelers.
 • Deployment and data migration can
  be committed in phases                       EXISTING ENVIRONMENT                         According to personal data privacy laws, such intelligence infor-
 • Supports storage media including                                                         mation are under strict control and required to be secured by
  SCSI disks, magnetic tapes and virtual       • No data encryption in place                strong encryption for all at-rest data on storage media including
  tape libraries (VTL)                         • Physical isolation of system hardware
 • Protects cooked and uncooked/raw
                                                                                            hard disks, optical disks, magnetic tapes, etc.
                                                in data center
  filesystems with a single solution
                                                                                            Working under tight time constraints, the customer is required to
                                               HARDWARE
 PROJECT OBJECTIVES                                                                         implement effective data protection measures of the system,
                                               • IBM p-Series servers                       which has been in operation for 5 years, in within 3 months’ time.
 • Encrypts dynamic database data              • EMC Symmetrix SAN                          With stringent constraints including no change to system infra-
   stored in storage area network (SAN)        • Brocade FC SAN switch                      structure and user/operator workflow as well as the requirement
   and backup tapes                            • IBM tape library
 • Protects filesystem objects, relational
                                                                                            to maintain the same level of service (system response, availabil-
                                               • HP Integrity Server
   databases, uncooked volume and                                                           ity, capacity, etc), end customer selected Bloombase® Spitfire
   backup media                                                                             StoreSafe™ enterprise storage security server to provide on-the-
                                               OPERATING SYSTEM
 • Interoperable with existing informa-                                                     fly encryption of their sensitive persistence data and Bloombase®
   tion lifecycle management (ILM)                                                          Spitfire KeyCastle™ key management server for full lifecycle
                                               • IBM AIX 5.3
   system for automatic data persistence
                                               • Redhat Enterprise Linux 4                  management of their cryptographic keys.
 SOLUTIONS AND SERVICES                        SOFTWARE
 • Spitfire   KeyCastle™ key management
                                                                                            An Ambitious Trial Project
                                               • IBM OnDemand Content Manager
   server
                                               • IBM DB2 Universal Database                 The business intelligence system has been in operation for more
 • Spitfire StoreSafe™ enterprise storage
                                               • IBM Tivoli Storage Manager (TSM)
   security server                                                                          than 5 years. Like many core business operations systems in the
                                                                                            IT infrastructure of this customer, the system is mission-critical.
As a pilot project for data protection, the encryp-                            dated or less frequently accessed reports to tape                              staging storage and the report repository.
              tion solution has to prove fault-tolerant, highly                              libraries for archival, freeing up fast disk storage
              available and disaster-recovery ready.                                         space for new and frequently accessed reports.                                 To customer’s biggest frustration, their proof-of-
                                                                                             On the other hand, if user retrieves a report that                             concept tests on filesystem encryption products
              Border traveler information are submitted to the                               OnDemand finds archived, TSM will be triggered                                 did not work out either. Yes, filesystem encryp-
              system timely around the clock which contains                                  to restore the report contents from backup tapes                               tion works fine with incoming data staging
              sensitive personal information including travel-                               back to SAN disk for user’s retrieval.                                         storage, database files and log files, however,
              ers’ names, personal identification numbers                                                                                                                   filesystem encryption failed to work with the
              such as identity card numbers, visa numbers                                                                                                                   report repository where the filesystem is un-
              and passport identifiers etc., date and time of                                                                                                               cooked, in other words, raw or no filesystem.
              gate-in and gate-out, etc. Such information are
              collected from various border control units from                                                                                                              Customer did not prefer extra software to be
              within the whole state and temporarily stored at                                   "Bloombase Spitfire™ enterprise                                            installed on their AIX application servers due to
              a staging storage area of the system. An extrac-                                   security solution brings you key                                           their server capacity and audit requirements.
              tion-transform-load (ETL) worker processes the                                     management, file protection,                                               The average processing time for report genera-
              staging area for incoming traveler information.                                                                                                               tion has to be kept within 30 seconds.
              The ETL worker triggers a content filter to scan                                   database protection, raw disk
              for potential hazards. Viral and malicious con-                                    encryption and backup encryp-
              tents are rejected and moved to parking area for                                                                                                              Turning Challenge into Op-
                                                                                                 tion in a single solution at low
              examination or disposal. Clean files are parsed,
              contents extracted and loaded into a relation                                      total cost of ownership (TCO)”                                             portunity
              database system powered by IBM DB2 Universal
                                                                                                                                                                            Apart from support issues of various encryption
              Database System.
                                                                                                                                                                            products end customer considered, there were a
                                                                                                                                                                            number of issues remained unsolved: an all-in-
              End users of the system define reports to be run                               Thanks to IBM OnDemand Content Manager, DB2
                                                                                                                                                                            one cryptographic key management system, a
              and at what timely manner via IBM OnDemand                                     UDB and TSM, the intelligence system works
                                                                                                                                                                            scalable encryption platform that can scale up
              Content Manager management console. When-                                      seamlessly and at the best performance one
                                                                                                                                                                            easily as to cope with growing needs of the
              ever an analysis task is executed in the system,                               could get from an IBM Power platform fueled
                                                                                                                                                                            system, a cryptographic platform that supports a
              a report file will be generated and stored at an                               with EMC Symmetrix SAN. However, when talk-
                                                                                                                                                                            rich set of ciphers and in some special occa-
              uncooked storage area managed by IBM Tivoli                                    ing about data protection, customer faces their
                                                                                                                                                                            sions, customer’s proprietary cipher algorithms,
              Storage Manager (TSM). IBM OnDemand Content                                    first challenge. The application is built on off-the
                                                                                                                                                                            last but not least, platform independence and
              Manager links the analysis task to the physical                                -shelf products that cannot be altered, therefore,
                                                                                                                                                                            application independence to support potential
              disk location(s) where the output reports are                                  there is no way one can introduce data crypto-
                                                                                                                                                                            future change of platform.
              stored. On user’s retrieval of analysis results,                               graphic processing at the application level.
              Content Manager reads the physical EMC stor-
                                                                                                                                                                            End customer finally turned to Bloombase®
              age area network (SAN) disk and presents the                                   Customer hit their second challenge when they
                                                                                                                                                                            Spitfire™ enterprise security solution installed
              information to users in a readable form, or as                                 stepped backward and considered database
                                                                                                                                                                            onto HP Integrity Servers to meet their stringent
              files to be exported for further analysis or report-                           encryption. Despite database encryption’s
                                                                                                                                                                            security requirements.
              ing use.                                                                       difficulty on deployment and the vast amount of
                                                                                             database objects to get encryption configured,
                                                                                                                                                                            Without the need to alter any of end users’ work-
              IBM TSM manages information lifecycle of the                                   database encryption products cannot solve data
                                                                                                                                                                            flow, application and hardware platform, Spitfire
              storage area by automatically offloading out-                                  privacy problems on the incoming sensitive
                                                                                                                                                                            StoreSafe™ virtualizes incoming data staging
                                                                                                                                                                            storage, DB2 data file repository and OnDemand
                                                                                                                                                                            Content Manager report repository as Spitfire
                                                                                                                                                                            StoreSafe™ file-based and block-based virtual
                                                                                                                                                                            storages.

                                                                                                                                                                            Spitfire StoreSafe™ virtual storage offers a
                                                                                                                                                                            secure virtual plain updateable view of the their
                                                                                                                                                                            encrypted contents replica physically persisted
                                                                                                                                                                            on disks. Thus, system and application remain
                                                                                                                                                                            unchanged and access Spitfire StoreSafe™
                                                                                                                                                                            secured storage contents as if they are normal
                                                                                                                                                                            files and disks, but in reality, the sensitive data
                                                                                                                                                                            are secured by strong encryption. Only when
                                                                                                                                                                            OnDemand Content Manager and DB2 UDB
                                                                                                                                                                            request for storage contents will trigger Spitfire
                                                                                                                                                                            StoreSafe™ to decrypt the ciphered sensitive
                                                                                                                                                                            data and when data are stored by Content Man-
                                                                                                                                                                            ager or database records committed to DB2 will
                                                                                                                                                                            trigger Spitfire StoreSafe™ to encrypt the sensi-
                                                                                                                                                                            tive contents before they are physically written
                                                                                                                                                                            to EMC SAN disk.

                                                                                                                                                                            Spitfire StoreSafe™ enabled the customer to
                                                                                                                                                                            migrate their whole data storage in phases
                                                                                                                                                                            minimizing cutover windows and thus service
                                                                                                                                                                            availability. TSM managed encrypted raw volume
                                                                                                                                                                            as normal volumes without change with benefit
                                                                                                                                                                            that data archived to backup tapes are in their
                                                                                                                                                                            original secure ciphered form.

                                                                                                                                                                            End customer enjoyed end-to-end data privacy
                                                                                                                                                                            using Bloombase Spitfire™ security platform
                                                                                                                                                                            meeting the toughest national data security
                                                                                                                                                                            requirements at low total cost of ownership
                                                                                                                                                                            (TCO).




© 2006 Bloombase Technologies. All rights reserved. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their
respective logos are trademarks or registered trademarks of Bloombase Technologies Ltd in Hong Kong, China and in several other countries all over the world. All other product and
service names mentioned are the trademarks of their respective companies.

The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors
or omissions contained herein.

4AA0-0696EEP 09/2006

More Related Content

PDF
IBM System Storage SAN Volume Controller
PDF
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
PDF
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
PPT
How to evaluate data protection technologies - Mastercard conference
PDF
SUSE Linux Enterprise Server for System z SP1
PDF
IBM Tivoli Storage Productivity Center
PDF
Terremark Backup Custom Storage Pre Press
PDF
Run Book Automation with PlateSpin Orchestrate
IBM System Storage SAN Volume Controller
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
How to evaluate data protection technologies - Mastercard conference
SUSE Linux Enterprise Server for System z SP1
IBM Tivoli Storage Productivity Center
Terremark Backup Custom Storage Pre Press
Run Book Automation with PlateSpin Orchestrate

What's hot (17)

PDF
Symantec Appliances Strategy Launch
PDF
SANsymphony V
PDF
IBM XIV Storage System series
PDF
Visual Storage Intelligence™ Case Story Final
PPT
Vna for indexing & storing dicom & non dicom objects - peter lange - ibm
PPTX
Webinar: Unifying storage for EMC & NetApp
PDF
IBM PureFlex System storage resources
PDF
Windows Hosting Service-Level Description
PDF
Novell File Management Suite Use Cases
PDF
Shared Oracle Hosting (Linux)
PDF
File Access in Novell Open Enterprise Server 2 SP2
PPTX
Agentless backup is not a myth
PDF
Vm6 v mex
PPTX
Mct summit na what's new in forefront endpoint protection 2012 beta
PDF
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
PDF
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
PDF
TS7680 ProtecTIER for z/OS Datasheet
Symantec Appliances Strategy Launch
SANsymphony V
IBM XIV Storage System series
Visual Storage Intelligence™ Case Story Final
Vna for indexing & storing dicom & non dicom objects - peter lange - ibm
Webinar: Unifying storage for EMC & NetApp
IBM PureFlex System storage resources
Windows Hosting Service-Level Description
Novell File Management Suite Use Cases
Shared Oracle Hosting (Linux)
File Access in Novell Open Enterprise Server 2 SP2
Agentless backup is not a myth
Vm6 v mex
Mct summit na what's new in forefront endpoint protection 2012 beta
Bloombase Turnkey Data At-Rest Security Compliance Solution for EMC Celerra
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
TS7680 ProtecTIER for z/OS Datasheet
Ad

Viewers also liked (17)

PDF
trender WOMM - Case Studies
PPTX
Advanced english i uvm guadalajara norte essay i 3 rd parcial
DOCX
PPTX
내가 바라는 우리학교
PDF
Dieta e prevenção cvd versão slideshare
PDF
Making the most of 2.2
PDF
2010 Mercedes CLS Class Los Angeles
PDF
S1.part.1.install and-settings
PPT
Body rider-fan-bike.ppt
PDF
Future of Digital Profiles
PPT
The European Climate Change Adaptation Platform: CLIMATE-ADAPT - Dr. Margaret...
PPTX
Les évolutions humanitaires: annexe
PPT
M&L 2012 - Scientific Imagery in Higher Education - by Ruth Kerr, Ilaria Merciai
PPT
Informal emma sci com 2013 nhm
PDF
Ethnographic Reading Summaries
PDF
M&E Logic Model1
PDF
"Preparing for SBAC: Addressing Online Testing Challenges with your Students"
trender WOMM - Case Studies
Advanced english i uvm guadalajara norte essay i 3 rd parcial
내가 바라는 우리학교
Dieta e prevenção cvd versão slideshare
Making the most of 2.2
2010 Mercedes CLS Class Los Angeles
S1.part.1.install and-settings
Body rider-fan-bike.ppt
Future of Digital Profiles
The European Climate Change Adaptation Platform: CLIMATE-ADAPT - Dr. Margaret...
Les évolutions humanitaires: annexe
M&L 2012 - Scientific Imagery in Higher Education - by Ruth Kerr, Ilaria Merciai
Informal emma sci com 2013 nhm
Ethnographic Reading Summaries
M&E Logic Model1
"Preparing for SBAC: Addressing Online Testing Challenges with your Students"
Ad

Similar to Customer Success - A Government Security Agency (20)

PDF
Customer Success - A Government Organization
PDF
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
PPTX
Vormetric - Gherkin Event
PDF
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
PDF
IBM Infosphere Guardium - Database Security
PDF
Issa chicago next generation tokenization ulf mattsson apr 2011
PDF
New Solutions for Security and Compliance in the Cloud
PDF
Bloombase transparent at-rest data encryption security for Dell EqualLogic
PDF
ISSA: Cloud data security
PPT
Guardium value proposition for fss pn 12 02-10
PDF
Oracle Optimized Datacenter - Storage
PDF
Ppt security-database-overview-11g r2
PDF
IBM InfoSphere Guardium overview
PDF
Symantec Data Insight 3.0
PDF
Momentum Infocare Corporate Presentation
PDF
20121108 vmug london event nimble sorage for vdi
PDF
Hitachi ID Solutions Supporting SOX Compliance
PPT
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
PPTX
Sådan undgår du misbrug af kundedata og fortrolig information
PPTX
Brave new world of encryption v1
Customer Success - A Government Organization
Customer Success - A Public Order Enforcement Government Agency in Asia-Pacific
Vormetric - Gherkin Event
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
IBM Infosphere Guardium - Database Security
Issa chicago next generation tokenization ulf mattsson apr 2011
New Solutions for Security and Compliance in the Cloud
Bloombase transparent at-rest data encryption security for Dell EqualLogic
ISSA: Cloud data security
Guardium value proposition for fss pn 12 02-10
Oracle Optimized Datacenter - Storage
Ppt security-database-overview-11g r2
IBM InfoSphere Guardium overview
Symantec Data Insight 3.0
Momentum Infocare Corporate Presentation
20121108 vmug london event nimble sorage for vdi
Hitachi ID Solutions Supporting SOX Compliance
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Sådan undgår du misbrug af kundedata og fortrolig information
Brave new world of encryption v1

More from Bloombase (20)

PDF
Bloombase Delivers AI-Powered Threat Detection and PQC Encryption
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Dell Technologies Telecom Self Cert - Bloombase StoreSafe.pdf
PDF
Bloombase_StoreSafe_und_Utimaco_ESKM_KI_gest__tzter_Datenschutz.pdf
PDF
Bloombase StoreSafe Optimization with 5th Gen Intel® Xeon® Scalable processors
PDF
Bring Context and Clarity to Your Device Certificates with Guardium Key Lifec...
PDF
2023 Accelerate with IBM TS7770 07182023 Final.pdf
PDF
Using Fortanix Data Security Manager with Bloombase Storesafe.pdf
PDF
BLBS-PROD-Bloombase-KeyCastle-Compatibility-Matrix-USLET-EN-R21.pdf
PDF
BLBS-PROD-Bloombase-KeyCastle-Technical-Specifications-USLET-EN-R10.pdf
PDF
BLBS-PROD-Bloombase-StoreSafe-Technical-Specifications-USLET-EN-R21.pdf
PDF
BLBS-PROD-Bloombase-StoreSafe-Compatibility-Matrix-USLET-EN-R26.pdf
PDF
BLBS-Bloombase-StoreSafe-Sales-Cheat-Sheet-FY25Q1-USLET-EN-R12.pdf
PDF
BLBS-TN - Bloombase StoreSafe - Utimaco Enterprise Secure Key Manager (ESKM) ...
PDF
BLBS-TN - Bloombase StoreSafe - Utimaco General Purpose Hardware Security Mod...
PDF
bloombase-storage-protection-entrust-hsm-sb.pdf
PDF
a50009291enw - Letter.pdf
PDF
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
PDF
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
PDF
Post-Quantum Security with NVIDIA DPUs and Morpheus
Bloombase Delivers AI-Powered Threat Detection and PQC Encryption
Assigned Numbers - 2025 - Bluetooth® Document
Dell Technologies Telecom Self Cert - Bloombase StoreSafe.pdf
Bloombase_StoreSafe_und_Utimaco_ESKM_KI_gest__tzter_Datenschutz.pdf
Bloombase StoreSafe Optimization with 5th Gen Intel® Xeon® Scalable processors
Bring Context and Clarity to Your Device Certificates with Guardium Key Lifec...
2023 Accelerate with IBM TS7770 07182023 Final.pdf
Using Fortanix Data Security Manager with Bloombase Storesafe.pdf
BLBS-PROD-Bloombase-KeyCastle-Compatibility-Matrix-USLET-EN-R21.pdf
BLBS-PROD-Bloombase-KeyCastle-Technical-Specifications-USLET-EN-R10.pdf
BLBS-PROD-Bloombase-StoreSafe-Technical-Specifications-USLET-EN-R21.pdf
BLBS-PROD-Bloombase-StoreSafe-Compatibility-Matrix-USLET-EN-R26.pdf
BLBS-Bloombase-StoreSafe-Sales-Cheat-Sheet-FY25Q1-USLET-EN-R12.pdf
BLBS-TN - Bloombase StoreSafe - Utimaco Enterprise Secure Key Manager (ESKM) ...
BLBS-TN - Bloombase StoreSafe - Utimaco General Purpose Hardware Security Mod...
bloombase-storage-protection-entrust-hsm-sb.pdf
a50009291enw - Letter.pdf
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
Post-Quantum Security with NVIDIA DPUs and Morpheus

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Getting Started with Data Integration: FME Form 101
PPTX
A Presentation on Touch Screen Technology
PDF
August Patch Tuesday
PDF
Hybrid model detection and classification of lung cancer
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Enhancing emotion recognition model for a student engagement use case through...
Web App vs Mobile App What Should You Build First.pdf
1. Introduction to Computer Programming.pptx
WOOl fibre morphology and structure.pdf for textiles
Accuracy of neural networks in brain wave diagnosis of schizophrenia
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Encapsulation_ Review paper, used for researhc scholars
Getting Started with Data Integration: FME Form 101
A Presentation on Touch Screen Technology
August Patch Tuesday
Hybrid model detection and classification of lung cancer
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A comparative study of natural language inference in Swahili using monolingua...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Group 1 Presentation -Planning and Decision Making .pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Customer Success - A Government Security Agency

  • 1. CUSTOMER SPOTLIGHT Bloombase® Spitfire StoreSafe™ Storage Security Server A Government Bloombase® Spitfire KeyCastle™ Key Management Server Border Control Agency Government organization secures privacy of sensitive personal border con- trol data of a data warehouse system using Bloombase® Spitfire StoreSafe™ storage encryption and Bloombase® Spitfire KeyCastle™ key management security solution AT A GLANCE ABOUT THE CUSTOMER WHY BLOOMBASE SOLUTIONS • Government agency controlling • Enabled customer to leverage exist- border entrance of people and issue ing hardware and software of personal identification and travel • Provided comprehensive key and documents encrypted storage management • Employees: More than 12,000 • Platform and application neutral • Scalable and extensible SUMMARY • Custom cipher support To protect privacy of sensitive personal IMPLEMENTATION HIGHLIGHTS information of an off-the-shelf business intelligence and reporting system Was first organization in public sector according to regional personal data to institute an end-to-end persistence privacy laws data protection from data extraction, transform and load (ETL), data ware- KEY CHALLENGES housing, reporting, backup and archi- val • No change to end user, administrator and operator workflow KEY BENEFITS • No significant degradation of system throughput and response • Immediate information privacy regu- Overview • Off-the-shelf data warehouse system latory compliance cannot be altered • Transparent deployment A border control government organization runs an intelligence • No coding required • High encryption performance • No hardware, system and application system to keep track of entrance and exit of people for collection • No system response degradation change • Highly available and fault-tolerant and analysis of movement habits of travelers. • Deployment and data migration can be committed in phases EXISTING ENVIRONMENT According to personal data privacy laws, such intelligence infor- • Supports storage media including mation are under strict control and required to be secured by SCSI disks, magnetic tapes and virtual • No data encryption in place strong encryption for all at-rest data on storage media including tape libraries (VTL) • Physical isolation of system hardware • Protects cooked and uncooked/raw hard disks, optical disks, magnetic tapes, etc. in data center filesystems with a single solution Working under tight time constraints, the customer is required to HARDWARE PROJECT OBJECTIVES implement effective data protection measures of the system, • IBM p-Series servers which has been in operation for 5 years, in within 3 months’ time. • Encrypts dynamic database data • EMC Symmetrix SAN With stringent constraints including no change to system infra- stored in storage area network (SAN) • Brocade FC SAN switch structure and user/operator workflow as well as the requirement and backup tapes • IBM tape library • Protects filesystem objects, relational to maintain the same level of service (system response, availabil- • HP Integrity Server databases, uncooked volume and ity, capacity, etc), end customer selected Bloombase® Spitfire backup media StoreSafe™ enterprise storage security server to provide on-the- OPERATING SYSTEM • Interoperable with existing informa- fly encryption of their sensitive persistence data and Bloombase® tion lifecycle management (ILM) Spitfire KeyCastle™ key management server for full lifecycle • IBM AIX 5.3 system for automatic data persistence • Redhat Enterprise Linux 4 management of their cryptographic keys. SOLUTIONS AND SERVICES SOFTWARE • Spitfire KeyCastle™ key management An Ambitious Trial Project • IBM OnDemand Content Manager server • IBM DB2 Universal Database The business intelligence system has been in operation for more • Spitfire StoreSafe™ enterprise storage • IBM Tivoli Storage Manager (TSM) security server than 5 years. Like many core business operations systems in the IT infrastructure of this customer, the system is mission-critical.
  • 2. As a pilot project for data protection, the encryp- dated or less frequently accessed reports to tape staging storage and the report repository. tion solution has to prove fault-tolerant, highly libraries for archival, freeing up fast disk storage available and disaster-recovery ready. space for new and frequently accessed reports. To customer’s biggest frustration, their proof-of- On the other hand, if user retrieves a report that concept tests on filesystem encryption products Border traveler information are submitted to the OnDemand finds archived, TSM will be triggered did not work out either. Yes, filesystem encryp- system timely around the clock which contains to restore the report contents from backup tapes tion works fine with incoming data staging sensitive personal information including travel- back to SAN disk for user’s retrieval. storage, database files and log files, however, ers’ names, personal identification numbers filesystem encryption failed to work with the such as identity card numbers, visa numbers report repository where the filesystem is un- and passport identifiers etc., date and time of cooked, in other words, raw or no filesystem. gate-in and gate-out, etc. Such information are collected from various border control units from Customer did not prefer extra software to be within the whole state and temporarily stored at "Bloombase Spitfire™ enterprise installed on their AIX application servers due to a staging storage area of the system. An extrac- security solution brings you key their server capacity and audit requirements. tion-transform-load (ETL) worker processes the management, file protection, The average processing time for report genera- staging area for incoming traveler information. tion has to be kept within 30 seconds. The ETL worker triggers a content filter to scan database protection, raw disk for potential hazards. Viral and malicious con- encryption and backup encryp- tents are rejected and moved to parking area for Turning Challenge into Op- tion in a single solution at low examination or disposal. Clean files are parsed, contents extracted and loaded into a relation total cost of ownership (TCO)” portunity database system powered by IBM DB2 Universal Apart from support issues of various encryption Database System. products end customer considered, there were a number of issues remained unsolved: an all-in- End users of the system define reports to be run Thanks to IBM OnDemand Content Manager, DB2 one cryptographic key management system, a and at what timely manner via IBM OnDemand UDB and TSM, the intelligence system works scalable encryption platform that can scale up Content Manager management console. When- seamlessly and at the best performance one easily as to cope with growing needs of the ever an analysis task is executed in the system, could get from an IBM Power platform fueled system, a cryptographic platform that supports a a report file will be generated and stored at an with EMC Symmetrix SAN. However, when talk- rich set of ciphers and in some special occa- uncooked storage area managed by IBM Tivoli ing about data protection, customer faces their sions, customer’s proprietary cipher algorithms, Storage Manager (TSM). IBM OnDemand Content first challenge. The application is built on off-the last but not least, platform independence and Manager links the analysis task to the physical -shelf products that cannot be altered, therefore, application independence to support potential disk location(s) where the output reports are there is no way one can introduce data crypto- future change of platform. stored. On user’s retrieval of analysis results, graphic processing at the application level. Content Manager reads the physical EMC stor- End customer finally turned to Bloombase® age area network (SAN) disk and presents the Customer hit their second challenge when they Spitfire™ enterprise security solution installed information to users in a readable form, or as stepped backward and considered database onto HP Integrity Servers to meet their stringent files to be exported for further analysis or report- encryption. Despite database encryption’s security requirements. ing use. difficulty on deployment and the vast amount of database objects to get encryption configured, Without the need to alter any of end users’ work- IBM TSM manages information lifecycle of the database encryption products cannot solve data flow, application and hardware platform, Spitfire storage area by automatically offloading out- privacy problems on the incoming sensitive StoreSafe™ virtualizes incoming data staging storage, DB2 data file repository and OnDemand Content Manager report repository as Spitfire StoreSafe™ file-based and block-based virtual storages. Spitfire StoreSafe™ virtual storage offers a secure virtual plain updateable view of the their encrypted contents replica physically persisted on disks. Thus, system and application remain unchanged and access Spitfire StoreSafe™ secured storage contents as if they are normal files and disks, but in reality, the sensitive data are secured by strong encryption. Only when OnDemand Content Manager and DB2 UDB request for storage contents will trigger Spitfire StoreSafe™ to decrypt the ciphered sensitive data and when data are stored by Content Man- ager or database records committed to DB2 will trigger Spitfire StoreSafe™ to encrypt the sensi- tive contents before they are physically written to EMC SAN disk. Spitfire StoreSafe™ enabled the customer to migrate their whole data storage in phases minimizing cutover windows and thus service availability. TSM managed encrypted raw volume as normal volumes without change with benefit that data archived to backup tapes are in their original secure ciphered form. End customer enjoyed end-to-end data privacy using Bloombase Spitfire™ security platform meeting the toughest national data security requirements at low total cost of ownership (TCO). © 2006 Bloombase Technologies. All rights reserved. Bloombase, Spitfire, Keyparc, StoreSafe, and other Bloombase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Bloombase Technologies Ltd in Hong Kong, China and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. The information contained herein is subject to change without notice. The only warranties for Bloombase products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Bloombase shall not be liable for technical or editorial errors or omissions contained herein. 4AA0-0696EEP 09/2006