the SSD Buyers Guide - click to see article
SSD buyers guide
ssd myths - endurance - click to read article
SSD myths - endurance ..
storage interface chips and controllers ..
storage chips & controllers

storage search
10 years - "leading the way to the new storage frontier"

What are Digital Vaults?

click to see profile for Cyber-Ark Software
October 31, 2005 article by Calum Macleod, European Director Cyber-Ark Software
See also:- Will Hard Disks Get Faster?
Adding Trust to Storage Drives
Solid State Disks Buyers Guide
Virtual Tape: Can You Afford to Ignore It?
A Storage Architecture Guide (9 year old classic)
Flash Memory vs. Hard Disk Drives - Which Will Win?
Editor's intro:- Digital Vaults enable users across the internet to share access to sensitive information in a simple secure way. Calum Macleod - European Director of Cyber-Ark gives a brief overview on digital vaults and looks at why they are growing in popularity.
d2d ad - click for more info
STORAGE Security
Security on
Megabyte used one of Gunnar's goblin hammers
to stop pesky goblin minions and other pests
from interfering with his bits and bytes.
A major challenge that is faced by all organisations selecting IT technology is trying to clearly understand how a particular solution may address the challenges they are tasked with solving. And this often involves trying to understand what various vendors mean when using generic terminology.

The term "Digital Vault" has come to the fore in the last few months and now several vendors are offering technology under the umbrella of digital vaulting. So what should you understand? A simple acid test to apply to anything claiming to be a digital vault is the following. Does the digital vault hide items from those who have no right to see them, and does it ensure that those with access rights are monitored every step of the way.

The term vault should be used because it relates to the vault in the physical world. Every enterprise relies on few priceless items that must never be lost or exposed. The danger of losing or exposing these priceless items is vital to the enterprise's business continuity and can even threaten its very existence. In today's business world, a large percentage of those items is in digital format. Most business enterprises today will still use the physical vault to securely store copies of the critical data, but this is impractical when on the one hand you are required to make that data available on a day to day basis for those who need to view, and modify the data, and at the same time you are required to keep it under "lock and key" so that those who are not entitled to see it are kept away from it.
Bringing it back to the physical world analogy; the physical vault can only be accessed by those who have privileges to do so, and once in the vault, only those safety deposit boxes that you have the right to open should be made available to you. For those who saw the the Bourne Identity (movie), you may remember the scene when the hero enters the bank and gains access to the vault. He is then provided access to his private safety deposit box - well the digital vault needs to mirror this physical scenario. So the digital vault should be a mirror image of the physical vault. Critical data needs to be stored in a secure location, and should be visible only to those with the rights to see it.

Another key factor in identifying a Digital Vault should be its ability to mimic all existing security processes and procedures in the organisation for handling sensitive information. For example, most organisations will have clearly defined policies and procedures defining how sensitive physical items are handled. For example, who has access to the physical vault, and the security boxes? Are individuals allowed to access on their own, or is a dual control mechanism in place, for example dual keys? Does staff have to be authorized to enter, and are there times of day when access is permitted. These and many more procedures are found in organisations, and a Digital Vault must be able to address these procedures as is. It is not advisable to try and redefine policies and procedures to fit technology - the technology has to fit.

A digital vault by its very nature is going to provide some standard services to ensure that its contents are protected, such as being a long-term repository, highly secured regardless of overall network security and regardless of the physical topology of the network. It must offer an effective way to protect and control critical information, and it allows an organisation to focus its defense resources to a vault at any location. It is easier for an organisation to defend one point effectively that to try and defend a complete network. The Digital Network Vault is also a secure storage area, but should not be confused with secure storage. In much the same way as a physical vault will reside within a building, the digital vault can utilize corporate storage systems. The Vault protects the information when it resides inside the Vault, and the data is secured from all major security risks over a network environment.

Cyber-Ark's Vaulting Technology makes it possible for companies to create an instant WAN to securely connect and collaborate with their partners, subcontractors, and customers over the Internet. End users need only a Web browser to access a highly secured vault. Information is secured via HTTPS and Cyber-Ark's specialized encryption, and companies can choose to integrate other authentication methods, including public key infrastructure, RSA security, or Windows Domain authentication. With Inter-Business Vault, security managers can create highly-specific access rights, so that users see only the vaults they're authorized to access, as well as limit how long individual users and Vaults are active. ...Cyber-Ark Software profile
Disk Jockey - handheld hard disk tool
Disk Jockey handheld USB / SATA
disk copier / eraser / tester / mirroring tool
from Diskology

storage search banner

1.0" SSDs 1.8" SSDs 2.5" SSDs 3.5" SSDs rackmount SSDs PCIe SSDs SATA SSDs
SSDs all flash SSDs hybrid drives flash memory RAM SSDs SAS SSDs Fibre-Channel SSDs is published by ACSL