User independence and transparent processing
No user
training required. Data to be stored are encrypted and data to be
read are decrypted automatically under the covers requiring no
change on user workflow
Transparent encryption and decryption
High performance
and intelligent cryptographic engine sensing network traffic for
storage data and carry out cryptographic operations based on
user-predefined rules
Effortless and riskless deployment and implementation
No application change required. No complex system integration. No
user workflow change. No administration and operation change
Flexible and secure access control
Finer-grain user access
control and time-window-based access suiting all enterprise needs
Multi-user support and resource sharing
Users protect their
own digital assets by their own encryption keys. Resource sharing
made possible without sacrificing security
Seamless integration with KeyCastle appliance
Where
encryption keys are required to be stored and managed in dedicated
hardware - Bloombase StoreSafe integrates with Bloombase KeyCastle appliance
seamlessly for maximum encryption key security
High availability and clustering
Highly scalable and multiple
Bloombase StoreSafe boxes running in a cluster for failover in mission-critical
systems and load-balancing for high-throughput storage systems