BrightSoft Technologies

SafeNet DataSecure

SafeNet DataSecure is a single corporate data protection platform, which is in the heart of all decisions SafeNet encryption and verification of data. DataSecure solution for hardware data encryption and support a wide range of data in various formats.
DataSecure platform allows you to encrypt and control access to data in the database (DBMS), applications, regular files and folders, as well as on the mainframe. Thanks to a centralized key management, security policies and core functions, the solution DataSecure simplifies administration, provides sootvetsivie internal and external standards and legislation, as well as increases the real level of security.

    Features and benefits

    Features

  • Continuous data protection. The device implements the principle of continuous protection at all stages of life cycle data, securely encrypting data at the database, applications, disk, folder or file
  • Centralized management. Single management platform cryptographic keys and security policies, as well as the function logging, auditing, and reporting make it easier to build security, the passage of the audit, as well as improve overall security.
  • Separation of duties. The platform allows administrators to set Razdelna duty to avoid situations where the critical configuration settings are changed without the approval of other administrators.
  • Integration options. By the choice of available modifications for small and medium businesses, as well as a model with a maximum capacity kriptomodulya.
  • Benefits

  • Growth opportunities. SafeNet DataSecure scaled to fit the growing business needs, protecting hundreds of millions of records. Increasing the number of customers, new partners and business opportunities will not be restricted because of technological deficiencies.
  • Control over the data. To maintain control over access to data throughout the life cycle, wherever these may be located at the moment.
  • High level of performance. Encryption is transparent to users and business processes, without degrading the performance of existing platforms.
  • Specifications

    Cryptographic algorithms

  • AES, 3DES, DES, RSA (digital signature and encryption), RC4, HMAC SHA-I - SHA512, SEED
  • Asymmetric key sizes: 512, 1024, 2048
  • Sizes of symmetric keys: 40, 56, 128, 168, 192, 256
  • Performance

  • Management of multiple keys and certificates
  • Supports a large number of business applications, devices and users at an affordable price
  • Meeting the requirements of internal and external security policies
  • Simplifies the user experience.
  • Benefits iKey:

  • More than 100,000 encryption operations per second
  • SScaling up to several hundred thousand with clustering
  • Latency of less than 100 microseconds
  • Supported Platforms
  • Databases

  • Oracle 8i, 9i, 10g, 11g
  • Microsoft SQL Server 2000, 2003, 2005, 2008
  • IBM DB2 v8, v9, z / OS
  • Teradata on MP-RAS, Linux.
  • Operating Systems

  • Windows
  • Solaris
  • HPUX
  • AIX
  • Linux (RHEL, SUSE Linux Enterprise Server)
  • Program Interface (API)

  • . NET
  • ICAPI
  • JCE
  • MSCAPI
  • PKCS # 11
  • XML
  • Applications

  • Oracle, IBM, BEA, IIS, Apache, Sun ONE, JBoss, etc.
  • Mainframes

  • z / OS
  • File servers

  • Microsoft, Red Hat Linux, CentOS Linux
  • Managing Certificates

  • Built Certification Authority (CA), control the certificate request, support for Certificate Revocation List (CRL)
  • Network Features

  • SNMP (v1, v2 and v3), NTP, check fidelity URL, signed by encrypting the log files, syslog, automatic rotation of log files, secure backups and new software, detailed statistics
  • Administration

  • Zaschischnny Web-based, secure shell (SSH), console
  • Standards Compliance

  • Complies with FIPS 140-2, Level 2