Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Networking
    • Storage

    HP Joins the Key Management, Encryption Club

    By
    Chris Preimesberger
    -
    October 30, 2007
    Share
    Facebook
    Twitter
    Linkedin

      Hewlett-Packard Oct. 29 joined the ranks of the storage “keymasters” by introducing a new data center security appliance that centralizes control of a companys key management and encryption.

      The announcement was made at Storage Networking World/Europe in Frankfurt, Germany.

      The HP StorageWorks Secure Key Manager consolidates key management for encryption devices deployed throughout enterprise and midsize businesses. Security is improved by providing a single control point across the data center, HP Storage Marketing Director Patrick Eitenbichler told eWEEK.

      HP thus joins market leaders IBM, Sun StorageTek, EMC and NetApp in the data center key management space. IBM and Sun StorageTek have long had their own key management software options, while EMC obtained its key management software through the acquisition of RSA for $2.1 billion last year.

      NetApp joined the group with the purchase of Decru for $272 million in 2005.

      Secure Key Manager offers identity-based access, administration and logging—which provide auditable security measures for customers under government compliance mandates in financial, health care and retail industries, Eitenbichler said.

      With lifetime key archival and automatic multisite key replication, Secure Key Manager provides high-availability clustering and failover capabilities to safeguard keys and reduce bottlenecks during high-transaction periods, Eitenbichler added.

      HP fortifies storage virtualization security. Read more here.

      How important was it for HP to fill this hole in its product line?

      “I would say it was a hole—but not necessarily a gaping hole [in the product line]—for an extended period of time,” Stephanie Balouras, storage analyst at Forrester Research, told eWEEK.

      “Most vendors have focused more specifically on providing the actually encrypting devices or tools. As these started to proliferate is when everyone realized that the vendor who can provide key management is the vendor thats really relevant in security.”

      HPs “holistic approach” to addressing enterprisewide security is evident in Secure Key Manager, said Jon Oltsik, senior analyst at Enterprise Strategy Group, in Milford, Mass.

      “HP clearly understands all of the complexities in securing a corporate infrastructure and is one of the first vendors to deliver a comprehensive solution to address security concerns for the enterprise and midsize corporate data center,” Oltsik said.

      This software package has been submitted for rigorous U.S. government FIPS 140-2 security validation, Eitenbichler said.

      At the Frankfurt conference, HP also announced its new StorageWorks 9000 Virtual Library System, which provides scalable backup and recovery of data, along with a new notebook security feature.

      Read more here about HPs identity management suite.

      The StorageWorks 9000 Virtual Library provides scalable backup and recovery that accelerates performance in complex storage-area network environments, Eitenbichler said. The Virtual Library uses a two-stage backup with initial backups to disk, followed by data encryption and migration to tape.

      Finally, HP introduced a new drive encryption feature for HP ProtectTools that encodes all information on hard drives in notebook PCs so that it becomes unreadable to an unauthorized person. This feature ensures that sensitive information cannot be accessed if the notebook or hard drive is lost or stolen, Eitenbichler said.

      For more information about HP storage security, go here.

      Check out eWEEK.coms for the latest news, reviews and analysis on enterprise and small business storage hardware and software.

      Avatar
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor-in-Chief of eWEEK and responsible for all the publication's coverage. In his 16 years and more than 5,000 articles at eWEEK, he has distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×