< Back to list

Bloombase Spitfire StoreSafe Storage Security Server

Bloombase StoreSafe Enterprise Storage Security Server protects corporate and user persistence/storage data by strong encryption and patented watermarking technologies from confidential information disclosure and unauthorized tampering. Addressing security and corporate governance compliance requirements including GLB Act, SOX and Personal Privacy Ordinance, etc, Bloombase StoreSafe Storage Security Server is designed to transparently protect real-time storage data on-the-fly from unauthorized disclosure and alteration without sacrificing performance. Bloombase StoreSafe Storage Security Server is created to address growing security problems and paradigm shift of corporate digital data theft from company insiders since effective perimeter access control from outsiders and crackers. Internal corporate data disclosure affects company image and loss of confidential information can greatly harm enterprise goodwill and income. Bloombase StoreSafe Storage Security Server protects data in network-attached storage (NAS), storage-area-network (SAN), tape devices and direct attached storage (DAS) supporting virtually all hardware platforms and operating systems. Bloombase StoreSafe Storage Security Server is a virtual storage server to generate watermark or encrypt storage data as they are written to storage device and verify watermark or decrypt as they are read. Bloombase StoreSafe Storage Security Server is built-in with NIST-certified secure cryptographic ciphers including FIPS-197 AES, NTT/Mitsubishi Camellia, FIPS-46-3 3DES, DES, RC2, RC4 and CAST5. Upgrade of ciphers and watermarking modules can be done easily via a web-based user interface. Bloombase StoreSafe can run in a cluster to achieve high-availability. Bloombase StoreSafe Storage Security Server protects corporate websites, databases, corporate digital assets, user files, business and financial data, archives, invaluable intellectual property, user credentials and email storage from prying eyes and tampering.

Industry

Horizontal

Category

Security

Red Hat Certifications

This product has been certified to run on the following Red Hat products and technologies:

Target Product Level
Red Hat Enterprise Linux 7.x Self-Certified
Red Hat Enterprise Linux 6.x Self-Certified
Red Hat Enterprise Linux 5.x Self-Certified