EMC Makes Storage Security Push

EMC unveiled its data security strategy on Tuesday, including a new services offering and the availability of digital rights management software through its recent acquisition of Authentica.

Lost data tapes, database breaches and regulations requiring secure data retention moved storage security to the forefront last year. In response, EMC and other vendors have been scrambling to offer greater data security features. EMC promised greater emphasis on security at its annual analyst meeting last year, and also began reselling storage security gear.

“Despite significant investments in security personnel, processes and technology, few companies feel their information is truly secure,” Dennis Hoffman, EMC’s vice president of information security, said in a statement.

“The evolving threat environment has made it abundantly clear that the information many companies consider to be their most important asset is increasingly becoming a significant liability. And simply erecting physical security perimeters such as firewalls and antivirus gateways ignores the fact that information lives and moves throughout its life.”

Hoffman said EMC’s “information-centric” security strategy “is built upon the recognition that information security is becoming an information management problem.”

Companies need to understand their data and implement a risk-based approach to securing it that comprises both the information and the infrastructure that handles it, he said.

EMC said its four-part strategy secures information throughout its lifecycle, helping customers assess the security of their information, secure their infrastructure, protect their sensitive information, and manage security information and events to assure effectiveness and regulatory compliance.

The Hopkinton, Mass.-based storage giant said its new Assessment Service for Storage Security, based on the National Security Agency’s Information Assurance Methodology, evaluates the security of a customer’s SAN, NAS and content addressed storage (CAS) deployments. EMC technology solutions personnel analyze storage platforms, networks, management systems, access controls, applications and other elements of the IT infrastructure to locate potential security risks and propose solutions for critical components.

EMC said Authentica’s technology “provides a logical extension of EMC’s highly secure Documentum Enterprise Content Management platform,” allowing users to control access and use of unstructured data and content both inside and outside the enterprise.

Other offerings include:

EMC Documentum Trusted Content Services, which features repository encryption, electronic signatures, mandatory access control and digital shredding, among other features;

EMC Certified Data Erasure Services, which provide certified disk data sanitization to U.S. Department of Defense standards;

EMC NetWorker and Retrospect, backup software products that offer data encryption with advanced encryption standard (AES) 128-bit and AES 256-bit encryption on disk or tapes; and

EMC Centera, with content addressing and write once read many (WORM) design to assure the integrity and authenticity of data stored on and retrieved from the Centera platform.

Partnerships with NeoScale, Decru and CipherOptics provide encryption appliances to protect data at rest and in flight.

For more information, visit www.emc.com/security.

Back To Enterprise Storage Forum

Paul Shread
Paul Shread
eSecurity Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including an award-winning series on software-defined data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds a market analyst certification.

Latest Articles

Top SAN Performance Tools

Storage Area Networks (SANs) may no longer have the luster they once enjoyed in the marketplace. Cloud storage, virtualization, and object storage tend to...

RAID 5 vs. RAID 6

RAID 5 and RAID 6 are two different levels of Redundant Array of Independent Disks, a data storage technology for disk drives. RAID 5...

Best Enterprise Backup Software & Solutions 2021

Backup Software duplicates computer files & data in case of corruption, deletion or disaster. Compare Top Backup Solutions. Click here now.