DataSecure i450 is a high performance appliance at the heart of data encryption and control
Download Product Brief
SafeNet DataSecure appliances are the heart of all SafeNet data encryption and control solutions . Using hardware-based encryption, DataSecure appliances cover the broadest variety of data types. They provide a unified platform with data encryption and granular access control capabilities that can be applied to databases, applications, mainframe environments, and individual files. By providing centralized management of keys, policies, and essential functions, DataSecure simplifies administration, helps ensure compliance, and maximizes security.
With DataSecure, all cryptographic keys are kept in the centralized, hardened appliance to simplify administration while helping ensure tight security for the broadest array of data types. Key versioning streamlines the time-consuming task of key rotation
Policy Management
Administrators can set authentication and authorization policies that dictate which application, database, or file servers can be accessed by particular users in the clear. When combined with strong authentication, this policy-driven security provides a vital layer of protection. DataSecure also offers granular access controls to help you comply with the separation of duties required in many security mandates. An administrator can create a policy that prevents certain users from accessing sensitive data without interfering with their day-to-day system administration duties.
Logging, Auditing, and Reporting
When encrypting data within an enterprise, data, keys, and logs are often accessed, encrypted, managed, and generated on multiple devices, in multiple locations. To reduce the cost and complexity of security management, DataSecure provides a single, centralized interface for logging, auditing, and reporting access to data and keys. A centralized mechanism increases security and helps you ensure compliance with industry mandates and government regulations.
View Specification
Resource Library
Performance
-
Processes more than 100,000 encryptions per second
-
Scalable to hundreds of thousands of encryptions per second via clustering of multiple DataSecure platforms
-
Less than 100 microseconds latency
Security Algorithms
-
AES, 3DES, DES, RSA (signatures and encryption), RC4, HMAC SHA-I – SHA512, SEED
Asymmetric Key Sizes
Symmetric Key Sizes
-
40, 56, 128, 168, 192, 256
Certificate Management
-
Multiple certificates, built-in certificate authority, manage certificate requests, certificate revocation list (CRL) support
API Support
-
.NET, MSCAPI, JCE, ICAPI, PKCS#11
Network Management
-
SNMP (v1, v2, and v3), NTP, URL health check, signed secure logs, syslog, automatic log rotation, secure encrypted and integrity checked backups and upgrades, extensive statistics
System Administration
Web and Application Servers Supported
-
Oracle, IBM, BEA, IIS, Apache, Sun ONE, JBoss, and more
Databases Supported
-
Oracle, Microsoft SQL Server, IBM DB2
Mainframes Supported
File Servers Supported
- Microsoft, Red Hat Linux, Cent0S Linux
View Feature & Benefits
Resource Library
Features:
-
Comprehensive data protection—Achieve comprehensive data protection with granular encryption capabilities that can be integrated at the database, application, drive, folder, or file level.
-
Centralized management—Simplify security administration, ensure regulatory compliance, and maximize overall security with centralized management of cryptographic keys and policies as well as logging, auditing, and reporting functions.
-
Multiple Credentials – establishes a separation of duties to prevent any one administrator from making critical configuration changes without additional approvals of other administrators.
-
Deployment options—Select an appliance to address entry-level needs or accommodate the highest level of cryptographic processing.
Benefits:
-
Growth enabled—Pursue new business opportunities and forge new partnerships with the confidence that your critical information is persistently protected.
-
Data ownership defined—Maintain ownership of data throughout its lifecycle, wherever it resides.
-
Productivity empowered—Encrypt information transparently, without disrupting business operations, computing performance, or the end-user experience.
View How to Buy
Resource Library