bull trustway dataprotect securing your end to end ......2 securing your end to end infrastructure...

6
Securing your end to end infrastructure with unified encryption Bull Trustway DataProtect

Upload: others

Post on 23-May-2020

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Bull Trustway DataProtect Securing your end to end ......2 Securing your end to end infrastructure with unified encryption Data security of users becomes a priority for all CIOs. In

Securing your end to end infrastructure with unified encryption

Bull Trustway DataProtect

Page 2: Bull Trustway DataProtect Securing your end to end ......2 Securing your end to end infrastructure with unified encryption Data security of users becomes a priority for all CIOs. In

Cyberattacks, negative consequences, impact on the brand image… We live in a world full of threats… And Data is becoming the new gold! Security of your sensitive data, regardless of location, is essential for a smooth functioning of your business processes and the development of your organization. How to be sure regarding confidential handling of sensitive information, or industrial or commercial secrets and keep your client, partner and shareholder confidence? How to deal with new regulations and European directives on privacy data protection?

How to ensure data security and bring compliance?

• Simple scalability and on demand growth• Fully Managed Service• Cohesive Security• Cloud oreinted model• Strong Compliance with Low Audit Cost• Increased Security, Business Agility and Lower IT Costs

Single Pane Glass

2 Securing your end to end infrastructure with unified encryption

Data security of users becomes a priority for all CIOs. In a regulatory environment strengthened day by day, their concern is to guarantee data confidentiality whether in a datacenter, or in the cloud, or on-premises…

The growing volume of data spread across different environments creates more and more threats. It’s essential to trust in your information system. Trust underlies every exchange between customers and suppliers, the State and its citizens... And while new technologies are facilitating these exchanges, new risks are threatening to weaken them.

Companies, public sector, international institutions... no organization is immune to malicious acts, from the worst kind of

sabotage and spying, to extortion and scams. Along with the direct cost of such incidents there is the loss of credibility to deal with.

Moreover, the impact of new regulations on data protection shows the importance of an optimal security for your company, but also for your customers, suppliers and partners.

Atos, through its cyber security solutions, is your expert in security for all your data protection regardless its location.

With Trustway DataProtect, Atos brings a highly secured solution which allows you to be compliant with strictest regulations on data protection for each business process such as GDPR, HIPAA, PCI DSS…

Trustway DataProtect will suit every demand from protecting hardware key management, file, application, virtual machine, database and tokenization.

Based on our Hardware Security Module (HSM) Trustway Proteccio® certified under the Common Critria EAL4+ and FIPS140-2 Level 3 (the later in progress), Trustway DataProtect ensures a total data security in all environments, in compliance with your enterprise security policy.

With its wide-ranging technology expertise and its R&D centers dedicated to cybersecurity in Europe, Atos helps you to build a secure infrastructure for an efficient, proportionate and sustainable cybersecurity policy.

Today - Silos Tomorrow - Unified

• Costly and Complex Administration• Inconsistent Security Policy Enforcement• No Repeatable Process• Inhibited Data and Business Workflow• Audit Challenges

This... or not even doing it yet

Applications and Web Server

SQL & No SQL Databases

File Servers

Mainframes

Storage

Backup Media

Virtual

Cloud

Key Management

SecurityPolicy

Management

Compliance

On Premise

Unified Data Protection Platform

Crypto Foundation

Page 3: Bull Trustway DataProtect Securing your end to end ......2 Securing your end to end infrastructure with unified encryption Data security of users becomes a priority for all CIOs. In

3Securing your end to end infrastructure with unified encryption

A data encryption solution adapted to your needs

Trustway DataProtect offers a comprehensive data encryption solution to guarantee data security and the control over the data access.

Trustway DataProtect safeguards data from both anticipated and unforeseen threats. These measures serve as demonstrable evidence that the organisation is active and diligent in their stewardship of this data, and that data subjects are unlikely to suffer damage should their data fall into the hands of unauthorized users.

This unified data encryption solution protects you from all risks of cyberattacks in connecting your equipment on-premises, in a datacenter, to virtual environments or in the cloud.

A unified solution also gives you an important Return on Investment (ROI) if such attacks occur. Indeed, the administration and management of the security policy in a centralized way reduces the cost of deployment, supervision, training, management and process definition. Thus, a single solution for your entire infrastructure also reduces audit costs.

Likewise, in the context of the General Data Protection Regulation (GDPR) which provides, in the case of leakage of personal data, penalties ranging from 2% to 4% of

the annual turnover of your company, this is worth investing in Trustway DataProtect that is protecting the entire life cycle of your data.

Based on a 100 % European certified Hardware Security Module (HSM) architecture, Trustway DataProtect guarantees the security of all your data.

Regardless of their location, be they stored in a database, file server, application, traditional or virtualized data center, or public cloud environment, your sensitive data are secured from compromise.

Trustway VPN

Trustway Key Manager

HSM Trustway Proteccio

Trustway File Encryption

Trustway VM Encryption

Trustway DB Encryption

Trustway DB Encryption

Trustway App Encryption

Trustway App Encryption

Trustway Tokenization

Trustway Tokenization

T

T

Trustway DataProtect: Risk management

Access control

Attacks by application account hijacking, data theft/leak, etc.

Data dump

Privileged access

Low configurations

Attacks by application vulnerability, data dump, etc.

Wire-taping

Hard disk theft

Side-channels

Attacks by material theft, wiretapping, monitoring, etc.

File copy

Rogue access

Identify theft attacks, root access abuse, brute-force attack, etc.

Data

Applications

System

Hardware

Page 4: Bull Trustway DataProtect Securing your end to end ......2 Securing your end to end infrastructure with unified encryption Data security of users becomes a priority for all CIOs. In

Trustway DataProtect: a scalable solution

Trustway DataProtect integrates a large technologic partner ecosystem including: backup, storage and archive solutions, database encryption, SIEM tools, file and disk encryption, cloud services, cloud encryption, gateway (CASB)...

1. Trustway VM Encryption Amazon Web Services Microsoft Azure | VMware IBM SoftLayer

2. Trustway File Encryption IBM DB2 | Oracle Database Microsoft SQL Server Linux | Samba Windows ServerNovell Apache Hadoop Cassandra mongoDB | Docker Microsoft SharePoint Amazon EC2 & S3 | Chef

3. Trustway App Encryption IBM BEA Systems Sun Microsystems The Apache Software Foundation Oracle Java JBoss (by Red Hat)

4. Trustway DB Encryption IBM DB2

Oracle Database Microsoft SQL Server

5. Trustway Tokenisation IBM| SAP Software Solution

BEA Systems The Apache Software

Foundation | Sun Microsystems Oracle | Java

JBoss (by Red Hat)

6. Ecosystem Multiple programming languages

SOAP and REST interfaces KMIP interface | Tape Libraries

Storage | Cloud gateways Databases | Applications

7. Trustway Key Manager Key and crypto engine

Authentification and authorization

Key lifecycle management SNMP, NTP, SYSLOG

1. Virtual machines

2. File servers and shares

3. Web application servers

5. Application servers

6. Apps | GW | Tape | Disk | KMIP | TDE

7. Trustway Key Manager

4. Databases

Centralized key management platformTrustway Key Manager is a centralized administrative platform of key management. This compliant standardized interface KMIP allows you to manage keys on every environment (cloud, virtual, on-premises), to make SI audit and a meticulous access control. Trustway Key Manager ensures a single data encryption policy for your business and reduces compliance and audit costs.

Tokenize and secure your sensitive dataTrustway Tokenization solution protects sensitive information by replacing it with a surrogate value that preserves the length and format of the original data. This solution can be used to secure for instance credit cards, social security numbers, etc. It can be deployed across cloud, virtual and on-premises environments.

Protection of your databaseConnected to Trustway Key manager, Trustway DB Encryption brings to your organization a total protection of your database in the datacenter and the cloud thanks to a centralized control of data access and a regular key rotation. Data field to encrypt is directly selected by you.

Securing your filesConnected to Trustway Key manager, Trustway File Encryption ensures data security through fully automated file encryption of unstructured data contained in network drives and file servers. Your files can not be read by unauthorized users anymore.

Security of your applicationsConnected to Trustway Key Manager, Trustway App Encryption is a highly-secured application encryption’s solution which centralizes administration of application encryption policy and keys. This solution is suitable for a large range of web applications’ servers and company applications. Fully integrated to your applications, Trustway App encryption protects the data as soon as it is generated or manipulated to ensure the highest level of security.

Cloud data protectionConnected to Trustway Key manager, Trustway VM Encryption brings a complete cloud data protection. This solution guarantees to your organization a secure migration to the cloud, ensures only authorized users to access information, and meets compliance mandates. With Trustway VM Encryption you can now isolate and totally control your virtual machine instances during its complete life cycle (volume, snapshot & workload).

4 Securing your end to end infrastructure with unified encryption

Page 5: Bull Trustway DataProtect Securing your end to end ......2 Securing your end to end infrastructure with unified encryption Data security of users becomes a priority for all CIOs. In

5Securing your end to end infrastructure with unified encryption

Your infrastructure is evolving…Our solutions too!

Page 6: Bull Trustway DataProtect Securing your end to end ......2 Securing your end to end infrastructure with unified encryption Data security of users becomes a priority for all CIOs. In

CT

_J79

1_18

032

1_R

Y_B

_UN

IFIE

DE

NC

R

Atos is a global leader in digital transformation with approximately 100,000 employees in 73 countries and annual revenue of around € 13 billion. The European number one in Big Data, Cybersecurity, High Performance Computing and Digital Workplace, The Group provides Cloud services, Infrastructure & Data Management, Business & Platform solutions, as well as transactional services through Worldline, the European leader in the payment industry. With its cutting-edge technologies, digital expertise and industry knowledge, Atos supports the digital transformation of its clients across various business sectors: Defense, Financial Services, Health, Manufacturing, Media, Energy & Utilities, Public sector, Retail, Telecommunications and Transportation. The Group is the Worldwide Information Technology Partner for the Olympic & Paralympic Games and operates under the brands Atos, Atos Consulting, Atos Worldgrid, Bull, Canopy, Unify and Worldline. Atos SE (Societas Europaea) is listed on the CAC40 Paris stock index.

Bull is the Atos brand for its technology products and software, which are today distributed in over 50 countries worldwide.

Find out more about us https://atos.net/en/products/cyber-security/data-encryption#trustway-dataprotect

Let’s start a discussion together

© Atos March 2018 — All trademarks are the property of their respective owners. Atos, the Atos logo, Atos Codex, Atos Consulting, Atos Worldgrid, Bull, Canopy, equensWorldline, Unify, Worldline and Zero Email are registered trademarks of the Atos group. Atos reserves the right to modify this document at any time without notice. Some offerings or parts of offerings described in this document may not be available locally. Please contact your local Atos office for information regarding the offerings available in your country. This document does not represent a contractual commitment.

About Atos