Home > Products > Bloombase StoreSafe

Bloombase StoreSafe - Enterprise Storage Security

Overview | Business Benefits | Specifications | Resources

Technical Specifications

 

Bloombase StoreSafe is built using state-of-the-art cryptographic technologies and industrial standards including Public Key Infrastructure (PKI) and strong encryption.

Download Specifications

You need Adobe Acrobat Reader to read our digital product brochure.

 

Cryptographic Security

  • Industry-proven cryptographic processing engine
  • NIST FIPS-197 AES 128, 192, 256-bit cipher
  • IEEE 1619-compliant AES XTS block cipher
  • Japan NTT/Mitsubishi Electric Camellia 128, 192, 256-bit cipher
  • Korean Data Encryption Standard (SEED) and ARIA block ciphers
  • Chinese National SCB2(SM1), SSF33, SSF28 encryption and decryption
  • NIST FIPS-46-3 3DES and DES ciphers
  • CAST5 and CAST6 cipher
  • IDEA cipher
  • RC2, RC5 and RC6 block ciphers
  • RC4 stream cipher
  • Blowfish and Twofish ciphers
  • Serpent and Skipjack ciphers
  • 128, 256, 512, 1024 and 2048 bit public key cryptography
  • RSA and DSA public key cryptography
  • SHA-1, MD5 and Chinese National SCH(SM3) hash generation
  • Hardware ASIC cryptographic acceleration (optional)
  • Obfuscation and data shuffling for simple data hiding

Storage Systems

  • Direct Attached Storage (DAS)
  • Network Attached Storage (NAS)
  • Storage Area Network (SAN)
  • Tape library, tape drive and virtual tape library (VTL)
  • Content Addressable Storage (CAS)
  • Cloud Storage
  • Object Store

Privacy Control

  • Automated file-based and block-based encryption on storage device and file write operations
  • Automated decryption on storage device and file read operations on trusted hosts and clients
  • Multiple key encryption
  • Fix-sized file header regardless of actual file size for file-based protection
  • No additional storage required for block-based protection

Access Control

  • Fine grain read/write/create/delete/list access control
  • Time-window-based access control
  • Zero alteration to actual storage contents
  • Zero impact to performance

Integrity Control

  • Automated filesystem object digital signature generation
  • File integrity verification
  • Multiple key digital signature generation
  • Fix-sized file header regardless of actual file size

Write-Once-Read-Many (WORM)

  • Write-once-read-many feature resembling non-rewritable optical media supporting secure archival of data
    eliminating potential risks being overwritten by intention or accidental operation
  • For storage archival, compliance, dynamic capacity management and information lifecycle management
    (ILM)
  • Policy based engine dynamically adapts to changing demands in data requirements, by moving files automatically and transparently to appropriate tiered storage
  • Rule based configuration for permanently delete and/or shred file contents

Authentication and authorization

  • User-based and role-based authentication and authorization
  • Generic Lightweight Directory Access Protocol (LDAP) and Microsoft Active Directory (MSAD) authentication
    and authorization
  • Host-based authentication and authorization
  • Microsoft NT Lan Manager (NTLM) authentication
  • Challenge Handshake Authentication Protocol (CHAP) based discovery and authentication

Key Management

  • Multiple certificate authority (CA) support
  • Hardware true random (optional) or software pseudo-random key generation, inquiry and deletion
  • Built-in certificate request and revocation check (CRL/OCSP)
  • X.509 and PKCS#12 DER and PEM key import and export
  • Key Usage Profiling
  • RDBMS and Generic LDAP Support and Integration
  • Industry Standard PKCS#11
  • NIST FIPS-140-1 level 2 cryptographic module support (optional)
  • Automatic Certificate Retrieval via HTTP or LDAP
  • Certificate Validity Check
  • Certificate Revocation Check via HTTP or LDAP
  • Certificate Revocation List (CRL)
  • Certificate Revocation List Distribution Point (CRLDP)
  • Online Certificate Status Protocal (OCSP)
  • CRL scheduled download, caching and automatic retry
  • OCSP scheduled request, caching and automatic retry

Hardware Security Module Support

  • AEP Networks Keyper
  • Oracle Sun Crypto Accelerator
  • Sophos Utimaco SafeGuard CryptoServer
  • Thales nShield
  • HP Atalla
  • IBM 4758 Cryptographic CoProcessor
  • IBM eServer Cryptographic Accelerator
  • IBM Crypto Express2
  • IBM CP Assist for Cryptographic Function
  • Cavium NITROX XL
  • Other PKCS#11 compliant hardware security modules

Standard Support and Certification

  • IEEE 1619 standard-based mode
  • OASIS Key Management Interoperability Protocol (KMIP) support
  • NIST FIPS 140-2 compliant Bloombase Cryptographic Module

Management

  • Web based management console
  • Central administration and configuration
  • User security
  • Serial console
  • SNMP v1, v2c, v3
  • syslog, auto log rotation and auto archive
  • Heartbeat and keep alive

Disaster Recovery

  • Configurations backup and restore
  • FIPS-140 hardware security module recovery key or software recovery key vault for settings restoration
  • Customer-defined recovery quorum (e.g. 2 of 5)
  • FIPS-140 hardware security module operator key or operator pin for daily Bloombase KeyCastle operation
  • High-availability option for active-active or active-standby operation
  • Stateless active-standby failover

Platform Support

  • Bloombase OS
  • Solaris
  • HP-UX
  • OpenVMS
  • IBM AIX
  • IBM z/OS
  • IBM i5/OS
  • Linux
  • Microsoft Windows
  • Mac OS X

Virtual Platform Support

  • VMware ESX/ESXi
  • VMServer
  • Red Hat KVM
  • Citrix XenServer
  • Microsoft Hyper-V
  • IBM PowerVM
  • Oracle VM

Hardware Support

  • i386-base architecture
  • AMD 32 and 64 architecture
  • Intel Itanium-2 architecture
  • IBM Power6 architecture
  • IBM PureFlex System
  • PA-RISC architecture
  • UltraSPARC architecture

The specification and outlook of the model may vary and is for reference only


Secure Your Data Now

Protect your data with Bloombase transparent encryption.

Bloombase Demonstrations

See how Bloombase protects your digital assets.

Bloombase SupPortal

Get technical support from Bloombase Supportal and Knowledgebase.