Feeds

Do you need a storage security appliance?

Feeling alright with Decru

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

The Register's new Enterprise Storage Channel

Despite the high profile that all security matters currently hold, little attention has been paid to the protection of data storage platforms at source. It is into this arena that a small US vendor, Decru, has started to make a mark.

Based in Redwood City, California, Decru was founded in April 2001 with the aim of producing security appliances designed to protect information held on networked data storage systems from any unauthorised access.

The utilisation of networked storage platforms has grown enormously in the last few years with both Networked Attached Storage (NAS) and Storage Area Networks (SAN) being increasingly deployed to handle the storage requirements of mission critical systems. Indeed, most predictions of future usage indicate that direct attached storage (DASD) will rapidly be superseded in importance on networked storage platforms.

These new storage architectures allow much more sophisticated management of data to take place and it is increasingly common for data held on either NAS or SAN devices to be replicated elsewhere in the name of business continuance. Clearly with data volumes growing alarmingly and data being replicated around the globe the potential for unauthorised access is rising. All data stored on storage devices is, by default, held in clear text format - meaning that if you can see the disk you can read the data.

Decru offers two appliances to help address security concerns with its DataFort E440 for NAS platforms and DataFort FC440 for SAN systems. These devices encrypt and decrypt data utilising a custom hardware engine, 256-bit AES technology and a True Random Number Generator to scramble data. Importantly, the devices are claimed to operate at 'wire' speed to ensure that the device itself does not become a bottleneck.

With the safety and security of information matters of paramount importance, it will be interesting to see if Decru manages to pull in sales from its key target customers, especially in the finance and governmental sectors; with little recognition outside of the US the company will need to partner with some resellers in the short term. Equally, with vendor consolidation very much a fact of everyday business life, it is likely that if Decru succeeds in raising its profile sufficiently, one or another of the major storage vendors may take a look at both the technology and the company.

© IT-Analysis.com

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.