+ All Categories
Home > Documents > ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step...

ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step...

Date post: 11-Jun-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
13
ENCRYPTION AND DATA REDUCTION: LOVE OR HATE? Horia Constantinescu - Regional Sales Manager SEE [email protected]
Transcript
Page 1: ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step introducedwith the integration. 6.When the host reads the data, the FlashArray decrypts

ENCRYPTION AND DATA REDUCTION:

LOVE OR HATE?

Horia Constantinescu - Regional Sales Manager SEE

[email protected]

Page 2: ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step introducedwith the integration. 6.When the host reads the data, the FlashArray decrypts

© 2019 PURE STORAGE INC.2

ZBs

CORE/EDGE/CLOUD

THINGS

REAL-TIME INTELLIGENCE

MACHINES

IT’S A WHOLE NEW WORLD OF DATA…

Almost half of revenue in enterprises is now being driven through digital.

47%

Of businesses say data is so valuable it should be an asset on the balance sheet.

67%

Agree AI will be a game-changer in the way we think about and process data.

83%

Page 3: ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step introducedwith the integration. 6.When the host reads the data, the FlashArray decrypts

© 2019 PURE STORAGE INC.3

ACCELERATE ALL APPLICATIONSTIER 1APPS

DELIVER A "NEW FAST" FOR TIER 1

APPS

DRIVE HIGHER SCALE & EFFICIENCY FOR WEBSCALE APPS

WEBSCALE APPS

CONSOLIDATE ON ALL-FLASH

ANALYTICSTIER 2APPSVMs / CONTAINERS

>_NVMe-oF

SITE 2

ACTIVE/ACTIVE

MAKE ENTERPRISE BUSINESS

CONTINUITY EFFORTLESS

ACTIVECLUSTER

Page 4: ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step introducedwith the integration. 6.When the host reads the data, the FlashArray decrypts

© 2019 PURE STORAGE INC.4© 2017 PURE STORAGE INC. CONFIDENTIAL DOCUMENT, DO NOT SHARE OR DISTRIBUTE.

THREE CORE PRINCIPLES

EFFORTLESS EVERGREEN

STORAGE ADMINISTRATION SHOULD BE A TASK, NOT A FULL

TIME JOB. NO MANDATED TRAINING

COURSE.

FULL-STACK AUTOMATION.MAKE HYBRID CLOUD A REALITY.

WE’RE WATCHING THE ARRAY FOR YOU, WE SEE THINGS BEFORE THEY HAPPEN. PREDICTIVE

SUPPORT.

BEST DATA REDUCTION IN THE BUSINESS. PROVEN. ALWAYS-ON.

DO WHAT YOU LIKE, WHEN YOU LIKE.

RUN MIXED WORKLOADS. PREDICTABLE & CONSISTENT

PERFORMANCE.

NO OUT-OF-HOURS WORK REQUIRED FOR ANY TYPE OF

MAINTENANCE OR CONFIGURATION.

BUY AN ARRAY ONCE, NEVER BUY ANOTHER ONE TO REPLACE

IT. EVER.

NEVER RE-BUY SOMETHING YOU ALREADY HAD.

NO HIDDEN COSTS, NO ENFORCED UPGRADES,

TRANSPARENT PRICING.

DESIGNED FOR THE FUTURE.

ALSO AVAILABLE “AS-A-SERVICE”, PAY-PER-GB USED

WELCOME TO YOUR DATA-CENTRIC ARCHITECTURE

EFFICIENT

Page 5: ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step introducedwith the integration. 6.When the host reads the data, the FlashArray decrypts

© 2019 PURE STORAGE INC.5

5:110:12X BETTER DATA REDUCTION

AVERAGE DATA REDUCTION RATE (COMPRESSION + DEDUPLICATION ONLY)

POWERS BEST IN CLASS POWER, COOLING, AND FOOTPRINT EFFICIENCY

AVERAGE TOTAL REDUCTION (COMPRESSION + DEDUPLICATION + THIN

PROVISIONING)

Page 6: ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step introducedwith the integration. 6.When the host reads the data, the FlashArray decrypts

© 2019 PURE STORAGE INC.6

Historically host data encryption and array data reduction are like oil and

water – they simply don’t mix.

Page 7: ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step introducedwith the integration. 6.When the host reads the data, the FlashArray decrypts

© 2019 PURE STORAGE INC.7

IDC research published in the 2019Thales Data Threat Report-GlobalEdition states that 60% oforganizations have incurred at leastone data breach and 30%experienced their most recent breachwithin the past 12 months.

Page 8: ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step introducedwith the integration. 6.When the host reads the data, the FlashArray decrypts

© 2019 PURE STORAGE INC.8

• A recent audit of Baltimore's ITdepartment found that the agencylost important data during thisyear's ransomware attack due topoor storage practices.

• As a result, data that wassupposed to aid in the analysis offour performance measures —metrics meant to determine if theagency was meeting its goals inan efficient and cost-effectivemanner — could not be accountedfor throughout the 2017-18 fiscalyears, according to the report.

Page 9: ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step introducedwith the integration. 6.When the host reads the data, the FlashArray decrypts

© 2019 PURE STORAGE INC.9

STORAGE COSTS OF ENCRYPTED DATA

• Simplest metric: $/GB• What GB?

• Encrypting data to meet compliance requirements andprotect your business, increases the cost of storage.

• D@RE – data at rest – usually additional cost (free withPure)

• Host / application based encryption• Additional cost for CPU cycles• Additional cost for encryption license• Additional cost for storage – all flash advantages canceled

Page 10: ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step introducedwith the integration. 6.When the host reads the data, the FlashArray decrypts

© 2019 PURE STORAGE INC.10

Page 11: ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step introducedwith the integration. 6.When the host reads the data, the FlashArray decrypts

© 2019 PURE STORAGE INC.11

END-TO-END DATA ENCRYPTION WITH DATA REDUCTION

Vormetric Transparent Encryption can overcome the data reduction or security compromise with Pure Storage.

Page 12: ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step introducedwith the integration. 6.When the host reads the data, the FlashArray decrypts

© 2019 PURE STORAGE INC.12

1.The Vormetric File System agent is installed on a LINUX host2.The host checks out an encryption key from the Vormetric Data Security Manager (DSM)3.The FlashArray registers as a KMIP client with the DSM and checks out the host encryption key4.The host writes encrypted data to the FlashArray5.The FlashArray decrypts the data using the host key, reduces it, and re-encrypts it with the FlashArray key before writing it to flash.The un-encryption of data with the host key is an added step introduced with the integration.6.When the host reads the data, the FlashArray decrypts the data using the FlashArray key and re-encrypts with the host key prior to sending thedata to the host. The re-encryption of data is an added step introduced with the integration.

Page 13: ENCRYPTION AND DATA REDUCTION: LOVE OR …...encryption of data with the host key is an added step introducedwith the integration. 6.When the host reads the data, the FlashArray decrypts

© 2019 PURE STORAGE INC.13

https://blog.purestorage.com/end-to-end-data-encryption-with-data-reduction-from-thales-pure-storage/

https://go.thalesesecurity.com/rs/480-LWA-970/images/pure-storage-and-thales-esecurity-sb.pdf

https://go.thalesesecurity.com/rs/480-LWA-970/images/2019-DTR-Global-USL-Web.pdf

RESOURCES


Recommended