•  Technik (+49) 089 420447-30
  •  Diese E-Mail-Adresse ist vor Spambots geschützt! Zur Anzeige muss JavaScript eingeschaltet sein!   |
  •  Vertrieb (+49) 089 420447-20
  •  Diese E-Mail-Adresse ist vor Spambots geschützt! Zur Anzeige muss JavaScript eingeschaltet sein!

Testversion anfordern

Sie möchten das Produkt testen?
Gerne stellen wir Ihnen eine Testversion zur Verfügung.
Bitte nehmen Sie Kontakt mit uns auf.

Testversion anfordern

SafeNet-Logo

DataSecure img

SafeNet DataSecure Product Brief

Datenblatt - PDF

SafeNet DataSecure

Überblick

SafeNet DataSecure appliances are the heart of all SafeNet data encryption and control solutions . Using hardware-based encryption, DataSecure appliances cover the broadest variety of data types. They provide a unified platform with data encryption and granular access control capabilities that can be applied to databases, applications, mainframe environments, and individual files. By providing centralized management of keys, policies, and essential functions, DataSecure simplifies administration, helps ensure compliance, and maximizes security.

Key Management

With DataSecure, all cryptographic keys are kept in the centralized, hardened appliance to simplify administration while helping ensure tight security for the broadest array of data types. Key versioning streamlines the time-consuming task of key rotation

Policy Management

Administrators can set authentication and authorization policies that dictate which application, database, or file servers can be accessed by particular users in the clear. When combined with strong authentication, this policy-driven security provides a vital layer of protection. DataSecure also offers granular access controls to help you comply with the separation of duties required in many security mandates. An administrator can create a policy that prevents certain users from accessing sensitive data without interfering with their day-to-day system administration duties.

Logging, Auditing, and Reporting

When encrypting data within an enterprise, data, keys, and logs are often accessed, encrypted, managed, and generated on multiple devices, in multiple locations. To reduce the cost and complexity of security management, DataSecure provides a single, centralized interface for logging, auditing, and reporting access to data and keys. A centralized mechanism increases security and helps you ensure compliance with industry mandates and government regulations.

Specifications

Performance

  • Processes more than 100,000 encryptions per second
  • Scalable to hundreds of thousands of encryptions per second via clustering of multiple DataSecure platforms
  • Less than 100 microseconds latency

Security Algorithms

  • AES, 3DES, DES, RSA (signatures and encryption), RC4, HMAC SHA-I – SHA512, SEED

Asymmetric Key Sizes

  • 512, 1024, 2048

Symmetric Key Sizes

  • 40, 56, 128, 168, 192, 256

Certificate Management

  • Multiple certificates, built-in certificate authority, manage certificate requests, certificate revocation list (CRL) support

API Support

  • .NET, MSCAPI, JCE, ICAPI, PKCS#11

Network Management

  • SNMP (v1, v2, and v3), NTP, URL health check, signed secure logs, syslog, automatic log rotation, secure encrypted and integrity checked backups and upgrades, extensive statistics

System Administration

  • Secure Web-based GUI, secure shell (SSH), console

Web and Application Servers Supported

  • Oracle, IBM, BEA, IIS, Apache, Sun ONE, JBoss, and more

Databases Supported

  • Oracle, Microsoft SQL Server, IBM DB2 

Mainframes Supported

  • IBM z/OS

File Servers Supported

  • Microsoft, Red Hat Linux, Cent0S Linux

Features & Benefits

Features:

  • Comprehensive data protection—Achieve comprehensive data protection with granular encryption capabilities that can be integrated at the database, application, drive, folder, or file level.
  • Centralized management—Simplify security administration, ensure regulatory compliance, and maximize overall security with centralized management of cryptographic keys and policies as well as logging, auditing, and reporting functions.
  • Multiple Credentials – establishes a separation of duties to prevent any one administrator from making critical configuration changes without additional approvals of other administrators.
  • Deployment options—Select an appliance to address entry-level needs or accommodate the highest level of cryptographic processing.

Benefits:

  • Growth enabled—Pursue new business opportunities and forge new partnerships with the confidence that your critical information is persistently protected.
  • Data ownership defined—Maintain ownership of data throughout its lifecycle, wherever it resides.
  • Productivity empowered—Encrypt information transparently, without disrupting business operations, computing performance, or the end-user experience.

Unsere Philosophie

Unser Ziel ist es, Sie bei der Lösung besonderer Sicherheitsprobleme im Internet, bei IT-Netzwerken sowie bei der Telekommunikation zu unterstützen.

Dieses Ziel erreichen wir durch die Qualität und Aktualität unserer Sicherheitsprodukte sowie durch Kompetenz und Einsatzbereitschaft unseres Teams.

Kontaktmöglichkeiten

Kontakt Vertrieb (Angebote,
Lizenzen, Bestellungen, uvm.)
  • (+49) 089 420447-20
  • Diese E-Mail-Adresse ist vor Spambots geschützt! Zur Anzeige muss JavaScript eingeschaltet sein!
Kontakt Technik (Support,
Hilfe bei Einstellungen, uvm.)
  • (+49) 089 420447-30
  • Diese E-Mail-Adresse ist vor Spambots geschützt! Zur Anzeige muss JavaScript eingeschaltet sein!

Weitere Firmendetails

CyProtect AG - Internet Security

 

Adresse
Schatzbogen 58
81829 München
Deutschland
Fax
  • (+49) 089 420447 79

Kontaktformular

Email:
Betreff:
Nachricht:
Wie viele Stunden hat ein Tag?