SlideShare a Scribd company logo
LEARN MORE AT ENTRUST.COM/HSM
Bloombase and Entrust
protect storage infrastructure
to mitigate data breaches
Joint solution secures sensitive information in
traditional and next-generation data centers
HIGHLIGHTS
• Discover sensitive information
across data-at-rest resources utilizing
artificial intelligence
• Provide dynamic access control of
structured/unstructured data using
machine learning
• Encrypt heterogeneous storage
and control access to trusted hosts
and applications
• Provide a FIPS 140-2 Level 3 platform
on-premises or as a service for
centralized key management and
security-hardened key protection
• Facilities compliance with data privacy
and security regulations
The problem: sensitive big data
is a prime target for cyber attacks
and data breaches
Organizations capture and store increasing
volume of data, including private and
sensitive data, for advanced analytics and
business intelligence purposes. This big-data
trend, combined with the growing amount
of data generated by Internet of things (IoT)
smart devices, backed by software-defined
Legacy server, UNIX/Linux
server, Windows server,
Virtual machine,
Cloud compute instance
Entrust nShield HSM
Trusted user
SMB, CIFS, NFS,
iSCSI, FCP, FCoE, S3,
REST, HTTP, etc.
Bad
guys
Header
Trailer
Disk array, Filer, VTL, Big
data storage, Windows
storage, Virtualized/HCI
storage, Cloud storage
Trusted
write
and
encrypt
Trusted
read
and
decrypt
CLEAR TEXT
Header
Trailer
^$8Yn+=@~
CLEAR
TEXT
^$8Yn
+=@~
Bloombase StoreSafe secures sensitive information in
traditional and next generation datacenters with Entrust
nShield® HSMs deployed on-premises or as a service.
LEARN MORE AT ENTRUST.COM/HSM
data center (SDDC) technologies, highlights
data storage infrastructure as a prime target
for attack. Encryption protects data privacy,
however the techniques used to encrypt
data can vary among software applications
and storage technologies. With diverse
applications deployed across an increasingly
decentralized environment, effectively
protecting the growing volume of sensitive
data is crucial to ensure secure computing
of mission critical applications to achieve
business automation.
The challenge: securing
heterogeneous storage
environments with a holistic
protection approach
Enterprises are migrating from on-premises
disk systems to cloud-based storage
services to better-manage the increasing
need of data capacity. The trend has been
accompanied by a shift from selective
encryption of data classified as sensitive, to
a policy that encrypts everything in storage.
The degree to which organizations can
trust this approach depends directly on the
protection of cryptographic keys. Encryption
keys underpin security, and safeguarding and
managing them is critically important.
As more data gets encrypted, more keys
need to be secured and managed to protect
data in storage and to ensure it can be
decrypted when needed.
The solution: Bloombase and
Entrust together deliver high
performance and enhanced
security to heterogeneous storage
infrastructures
Leveraging artificial intelligence (AI) and
deep machine learning (ML) technologies,
Bloombase StoreSafe provides autonomous
discovery, dynamic access control, and
lifecycle cryptographic protection of
sensitive data-at-rest, both structured and
unstructured, managed in on-premises
storage systems and off-premises cloud
storage services. Its application-transparent
and protocol-preserving features enable it
to protect the entire spectrum of storage
infrastructures from on-premises, to
virtualized, big data repositories, and cloud
storage services. Bloombase StoreSafe
operates as a storage proxy, encrypting data
before it is physically stored, and deciphering
the stored ciphertext on the fly only when
presented to trusted applications and
hosts. The schema guarantees operational
transparency and maximum interoperability,
while ensuring that unauthorized parties are
unable to access the sensitive information
without breaking encryption.
Bloombase customers can leverage
trusted cryptography solutions from
Entrust to facilitate compliance with
regulatory requirements. Depending on
the deployment environment, customers
can integrate Bloombase StoreSafe
with nShield hardware security module
(HSM). nShield HSMs provides a FIPS
140-2 Level 3 environment for tamper-
evident and tamper-resistant protection
of cryptographic keys. Customers can
deploy nShield Connect HSMs on-premises
or as a service to enable compliance with
regulatory requirements for multi-national
business and government agencies.
Why use Entrust nShield with
Bloombase StoreSafe?
Bloombase StoreSafe data-at-rest security
technology coupled with the nShield HSMs
offer an unprecedented combination of a
turn-key, non-disruptive, and application
transparent stored data encryption solution
with a powerful and centralized key
management system for traditional and next-
generation data center environments.
Bloombase and Entrust protect storage
infrastructure to mitigate data breaches
Encryption keys handled outside the
cryptographic boundary of a certified HSM
are significantly more vulnerable to attack,
which can lead to compromise of critical
keys. HSMs offer a proven and auditable way
to secure valuable cryptographic material.
nShield HSMs integrate with Bloombase
StoreSafe to provide comprehensive logical
and physical protection of keys.
nShield Connect HSMs enables Bloombase
customers to:
• Secure keys within carefully designed
cryptographic boundaries that use robust
access control mechanisms, so keys are
only used for their authorized purpose
• Ensure key availability by using
sophisticated management, storage,
and redundancy features to guarantee
they are always accessible when
needed by the encrypted storage
systems and services
• Deliver superior performance to support
real-time high-bandwidth storage
cryptographic applications
nShield Connect HSMs provide a hardened,
tamper-resistant environment for performing
secure cryptographic processing, key
protection, and key management. With
Entrust HSMs you can:
• Provide a tightly controlled tamper
resistant environment for safekeeping
and managing encryption keys
• Enforce key use policies, separating
security functions from administrative
tasks
• Interface with applications using
industry-standard APIs (PKCS#11,
OpenSSL, JCE, CAPI, CNG, nCore,
and nShield Web Services when used
in conjunction with Web Services
Option Pack)
Entrust HSMs
Entrust nShield HSMs are among the
highest-performing, most secure and
easy-to-integrate HSM solutions available,
facilitating regulatory compliance and
delivering the highest levels of data and
application security for enterprise, financial
and government organizations. Our unique
Security World key management architecture
provides strong, granular controls over
access and usage of keys.
BLOOMBASE
Bloombase StoreSafe delivers data-at-rest
security for sensitive information managed
in traditional data centers and hybrid
cloud environment. The purpose-built
scalable architecture:
• Protects on-premises storage systems
including SAN, NAS, DAS, tape library,
and virtual tape library (VTL), regardless
of complexity and heterogeneity of the
storage infrastructure and protocol
• Secures data in RESTful cloud storage
service endpoints, hypervisor datastores,
content addressable storage (CAS), and
object stores
• Helps organizations mitigate data
exfiltration threats and meet data privacy
regulatory mandates
www.bloombase.com
Learn more
To find out more about Entrust nShield
HSMs visit entrust.com/HSM. To learn more
about Entrust’s digital security solutions for
identities, access, communications and data
visit entrust.com
Bloombase and Entrust protect storage
infrastructure to mitigate data breaches
Entrust keeps the world moving safely by enabling trusted
identities, payments and data protection. Today more than ever,
people demand seamless, secure experiences, whether they’re
crossing borders, making a purchase, accessing e-government
services or logging into corporate networks. Entrust offers an
unmatched breadth of digital security and credential issuance
solutions at the very heart of all these interactions. With more
than 2,500 colleagues, a network of global partners, and
customers in over 150 countries, it’s no wonder the world’s most
entrusted organizations trust us.
ABOUT ENTRUST CORPORATION
Entrust is a trademark, registered trademark, and/or service mark of Entrust Corporation in the United
States and/or other countries. ©2020 Entrust Corporation. All rights reserved. October 2020 • PLB9469 Bloombase Storage Protextion SB USL V6
Contact us:
HSMinfo@entrust.com
To find out more about
Entrust nShield HSMs
HSMinfo@entrust.com
entrust.com/HSM

More Related Content

PDF
8549 bloombase ss_usl_v1
PDF
iaetsd Using encryption to increase the security of network storage
PDF
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
PDF
4 aa6 8278enw
PDF
Data security to protect pci data flow ulf mattsson - insecure-mag-40
PDF
Five steps to secure big data
PDF
Block chain health record
PDF
Data Backup and Storage
8549 bloombase ss_usl_v1
iaetsd Using encryption to increase the security of network storage
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
4 aa6 8278enw
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Five steps to secure big data
Block chain health record
Data Backup and Storage

What's hot (19)

PDF
Brochure Imperva Vormetric
PDF
NTXISSACSC3 - Security at the Point of Storage by Todd Barton
PDF
The past, present, and future of big data security
PDF
Cloud computing tp ny
PDF
Veritas-Information-Governance-Solution-Brochure-EN
PPTX
Securing data today and in the future - Oracle NYC
PDF
Brochure Imperva Securesphere Vormetric Encryption
PDF
Cloud data governance, risk management and compliance ny metro joint cyber...
DOCX
Data Security
PPTX
Encryption 2021
PPTX
Data security
PDF
Data centric security key to digital business success - ulf mattsson - bright...
PDF
Cyber security providers adopt strategic defences
PDF
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
PDF
PaaSword-Business Cases
PDF
Self-Protecting Information for De-Perimiterised Electronic Relationships
PDF
Audit Log Protection: Avoiding a False Sense of Security
PPTX
Data security
PPTX
Data security
Brochure Imperva Vormetric
NTXISSACSC3 - Security at the Point of Storage by Todd Barton
The past, present, and future of big data security
Cloud computing tp ny
Veritas-Information-Governance-Solution-Brochure-EN
Securing data today and in the future - Oracle NYC
Brochure Imperva Securesphere Vormetric Encryption
Cloud data governance, risk management and compliance ny metro joint cyber...
Data Security
Encryption 2021
Data security
Data centric security key to digital business success - ulf mattsson - bright...
Cyber security providers adopt strategic defences
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
PaaSword-Business Cases
Self-Protecting Information for De-Perimiterised Electronic Relationships
Audit Log Protection: Avoiding a False Sense of Security
Data security
Data security
Ad

Similar to Bloombase storage-protection-entrust-hsm-sb (20)

PDF
bloombase-storage-protection-entrust-hsm-sb.pdf
PDF
Bloombase store safe bloombase, inc. - oracle cloud marketplace
PDF
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
PDF
4 aa6 8278enw
PDF
Bloombase transparent at-rest data encryption security for Dell EqualLogic
PDF
BLBS-Bloombase-StoreSafe-Sales-Cheat-Sheet-FY25Q1-USLET-EN-R12.pdf
PDF
Dell Technologies Telecom Self Cert - Bloombase StoreSafe.pdf
PDF
Bloombase store safe mf solution brief 2017 pdf
PDF
H13521 so-bloombase-solution-overview
PDF
H13521 so-bloombase-solution-overview
PDF
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
PDF
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
PDF
Bloombase StoreSafe Optimization with 5th Gen Intel® Xeon® Scalable processors
PDF
Bloombase store safe 1pager mf solution brief template 2017
PDF
Thales bloombase store_safe_sb
PDF
Hitachi datasheet-hcp-and-bloombase-storesafe
PDF
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
PDF
Eskm & bloombase integration data security oct 16
PDF
Bloombase store safe mf solution brief 2018 r0.91
PDF
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
bloombase-storage-protection-entrust-hsm-sb.pdf
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Blbs sb-bloombase-turnkey-data-at-rest-security-compliance-solution-for-emc-v...
4 aa6 8278enw
Bloombase transparent at-rest data encryption security for Dell EqualLogic
BLBS-Bloombase-StoreSafe-Sales-Cheat-Sheet-FY25Q1-USLET-EN-R12.pdf
Dell Technologies Telecom Self Cert - Bloombase StoreSafe.pdf
Bloombase store safe mf solution brief 2017 pdf
H13521 so-bloombase-solution-overview
H13521 so-bloombase-solution-overview
Blbs an-bloombase-store safe-oracle-ibm-hacmp-application-notes-uslet-en-r2
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Bloombase StoreSafe Optimization with 5th Gen Intel® Xeon® Scalable processors
Bloombase store safe 1pager mf solution brief template 2017
Thales bloombase store_safe_sb
Hitachi datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Eskm & bloombase integration data security oct 16
Bloombase store safe mf solution brief 2018 r0.91
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
Ad

More from Bloombase (20)

PDF
Bloombase Delivers AI-Powered Threat Detection and PQC Encryption
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Bloombase_StoreSafe_und_Utimaco_ESKM_KI_gest__tzter_Datenschutz.pdf
PDF
Bring Context and Clarity to Your Device Certificates with Guardium Key Lifec...
PDF
2023 Accelerate with IBM TS7770 07182023 Final.pdf
PDF
Using Fortanix Data Security Manager with Bloombase Storesafe.pdf
PDF
BLBS-PROD-Bloombase-KeyCastle-Compatibility-Matrix-USLET-EN-R21.pdf
PDF
BLBS-PROD-Bloombase-KeyCastle-Technical-Specifications-USLET-EN-R10.pdf
PDF
BLBS-PROD-Bloombase-StoreSafe-Technical-Specifications-USLET-EN-R21.pdf
PDF
BLBS-PROD-Bloombase-StoreSafe-Compatibility-Matrix-USLET-EN-R26.pdf
PDF
BLBS-TN - Bloombase StoreSafe - Utimaco Enterprise Secure Key Manager (ESKM) ...
PDF
BLBS-TN - Bloombase StoreSafe - Utimaco General Purpose Hardware Security Mod...
PDF
a50009291enw - Letter.pdf
PDF
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
PDF
Post-Quantum Security with NVIDIA DPUs and Morpheus
PDF
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
PDF
HPE - Additional license authorizations
PDF
HPE - Enable Productivity and Security In Your NonStop Environment
PDF
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
PDF
The connection forweb p12
Bloombase Delivers AI-Powered Threat Detection and PQC Encryption
Assigned Numbers - 2025 - Bluetooth® Document
Bloombase_StoreSafe_und_Utimaco_ESKM_KI_gest__tzter_Datenschutz.pdf
Bring Context and Clarity to Your Device Certificates with Guardium Key Lifec...
2023 Accelerate with IBM TS7770 07182023 Final.pdf
Using Fortanix Data Security Manager with Bloombase Storesafe.pdf
BLBS-PROD-Bloombase-KeyCastle-Compatibility-Matrix-USLET-EN-R21.pdf
BLBS-PROD-Bloombase-KeyCastle-Technical-Specifications-USLET-EN-R10.pdf
BLBS-PROD-Bloombase-StoreSafe-Technical-Specifications-USLET-EN-R21.pdf
BLBS-PROD-Bloombase-StoreSafe-Compatibility-Matrix-USLET-EN-R26.pdf
BLBS-TN - Bloombase StoreSafe - Utimaco Enterprise Secure Key Manager (ESKM) ...
BLBS-TN - Bloombase StoreSafe - Utimaco General Purpose Hardware Security Mod...
a50009291enw - Letter.pdf
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
Post-Quantum Security with NVIDIA DPUs and Morpheus
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations
HPE - Enable Productivity and Security In Your NonStop Environment
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
The connection forweb p12

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Big Data Technologies - Introduction.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Review of recent advances in non-invasive hemoglobin estimation
Big Data Technologies - Introduction.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Network Security Unit 5.pdf for BCA BBA.
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Monthly Chronicles - July 2025
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Digital-Transformation-Roadmap-for-Companies.pptx
20250228 LYD VKU AI Blended-Learning.pptx

Bloombase storage-protection-entrust-hsm-sb

  • 1. LEARN MORE AT ENTRUST.COM/HSM Bloombase and Entrust protect storage infrastructure to mitigate data breaches Joint solution secures sensitive information in traditional and next-generation data centers HIGHLIGHTS • Discover sensitive information across data-at-rest resources utilizing artificial intelligence • Provide dynamic access control of structured/unstructured data using machine learning • Encrypt heterogeneous storage and control access to trusted hosts and applications • Provide a FIPS 140-2 Level 3 platform on-premises or as a service for centralized key management and security-hardened key protection • Facilities compliance with data privacy and security regulations The problem: sensitive big data is a prime target for cyber attacks and data breaches Organizations capture and store increasing volume of data, including private and sensitive data, for advanced analytics and business intelligence purposes. This big-data trend, combined with the growing amount of data generated by Internet of things (IoT) smart devices, backed by software-defined Legacy server, UNIX/Linux server, Windows server, Virtual machine, Cloud compute instance Entrust nShield HSM Trusted user SMB, CIFS, NFS, iSCSI, FCP, FCoE, S3, REST, HTTP, etc. Bad guys Header Trailer Disk array, Filer, VTL, Big data storage, Windows storage, Virtualized/HCI storage, Cloud storage Trusted write and encrypt Trusted read and decrypt CLEAR TEXT Header Trailer ^$8Yn+=@~ CLEAR TEXT ^$8Yn +=@~ Bloombase StoreSafe secures sensitive information in traditional and next generation datacenters with Entrust nShield® HSMs deployed on-premises or as a service.
  • 2. LEARN MORE AT ENTRUST.COM/HSM data center (SDDC) technologies, highlights data storage infrastructure as a prime target for attack. Encryption protects data privacy, however the techniques used to encrypt data can vary among software applications and storage technologies. With diverse applications deployed across an increasingly decentralized environment, effectively protecting the growing volume of sensitive data is crucial to ensure secure computing of mission critical applications to achieve business automation. The challenge: securing heterogeneous storage environments with a holistic protection approach Enterprises are migrating from on-premises disk systems to cloud-based storage services to better-manage the increasing need of data capacity. The trend has been accompanied by a shift from selective encryption of data classified as sensitive, to a policy that encrypts everything in storage. The degree to which organizations can trust this approach depends directly on the protection of cryptographic keys. Encryption keys underpin security, and safeguarding and managing them is critically important. As more data gets encrypted, more keys need to be secured and managed to protect data in storage and to ensure it can be decrypted when needed. The solution: Bloombase and Entrust together deliver high performance and enhanced security to heterogeneous storage infrastructures Leveraging artificial intelligence (AI) and deep machine learning (ML) technologies, Bloombase StoreSafe provides autonomous discovery, dynamic access control, and lifecycle cryptographic protection of sensitive data-at-rest, both structured and unstructured, managed in on-premises storage systems and off-premises cloud storage services. Its application-transparent and protocol-preserving features enable it to protect the entire spectrum of storage infrastructures from on-premises, to virtualized, big data repositories, and cloud storage services. Bloombase StoreSafe operates as a storage proxy, encrypting data before it is physically stored, and deciphering the stored ciphertext on the fly only when presented to trusted applications and hosts. The schema guarantees operational transparency and maximum interoperability, while ensuring that unauthorized parties are unable to access the sensitive information without breaking encryption. Bloombase customers can leverage trusted cryptography solutions from Entrust to facilitate compliance with regulatory requirements. Depending on the deployment environment, customers can integrate Bloombase StoreSafe with nShield hardware security module (HSM). nShield HSMs provides a FIPS 140-2 Level 3 environment for tamper- evident and tamper-resistant protection of cryptographic keys. Customers can deploy nShield Connect HSMs on-premises or as a service to enable compliance with regulatory requirements for multi-national business and government agencies. Why use Entrust nShield with Bloombase StoreSafe? Bloombase StoreSafe data-at-rest security technology coupled with the nShield HSMs offer an unprecedented combination of a turn-key, non-disruptive, and application transparent stored data encryption solution with a powerful and centralized key management system for traditional and next- generation data center environments. Bloombase and Entrust protect storage infrastructure to mitigate data breaches
  • 3. Encryption keys handled outside the cryptographic boundary of a certified HSM are significantly more vulnerable to attack, which can lead to compromise of critical keys. HSMs offer a proven and auditable way to secure valuable cryptographic material. nShield HSMs integrate with Bloombase StoreSafe to provide comprehensive logical and physical protection of keys. nShield Connect HSMs enables Bloombase customers to: • Secure keys within carefully designed cryptographic boundaries that use robust access control mechanisms, so keys are only used for their authorized purpose • Ensure key availability by using sophisticated management, storage, and redundancy features to guarantee they are always accessible when needed by the encrypted storage systems and services • Deliver superior performance to support real-time high-bandwidth storage cryptographic applications nShield Connect HSMs provide a hardened, tamper-resistant environment for performing secure cryptographic processing, key protection, and key management. With Entrust HSMs you can: • Provide a tightly controlled tamper resistant environment for safekeeping and managing encryption keys • Enforce key use policies, separating security functions from administrative tasks • Interface with applications using industry-standard APIs (PKCS#11, OpenSSL, JCE, CAPI, CNG, nCore, and nShield Web Services when used in conjunction with Web Services Option Pack) Entrust HSMs Entrust nShield HSMs are among the highest-performing, most secure and easy-to-integrate HSM solutions available, facilitating regulatory compliance and delivering the highest levels of data and application security for enterprise, financial and government organizations. Our unique Security World key management architecture provides strong, granular controls over access and usage of keys. BLOOMBASE Bloombase StoreSafe delivers data-at-rest security for sensitive information managed in traditional data centers and hybrid cloud environment. The purpose-built scalable architecture: • Protects on-premises storage systems including SAN, NAS, DAS, tape library, and virtual tape library (VTL), regardless of complexity and heterogeneity of the storage infrastructure and protocol • Secures data in RESTful cloud storage service endpoints, hypervisor datastores, content addressable storage (CAS), and object stores • Helps organizations mitigate data exfiltration threats and meet data privacy regulatory mandates www.bloombase.com Learn more To find out more about Entrust nShield HSMs visit entrust.com/HSM. To learn more about Entrust’s digital security solutions for identities, access, communications and data visit entrust.com Bloombase and Entrust protect storage infrastructure to mitigate data breaches
  • 4. Entrust keeps the world moving safely by enabling trusted identities, payments and data protection. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, accessing e-government services or logging into corporate networks. Entrust offers an unmatched breadth of digital security and credential issuance solutions at the very heart of all these interactions. With more than 2,500 colleagues, a network of global partners, and customers in over 150 countries, it’s no wonder the world’s most entrusted organizations trust us. ABOUT ENTRUST CORPORATION Entrust is a trademark, registered trademark, and/or service mark of Entrust Corporation in the United States and/or other countries. ©2020 Entrust Corporation. All rights reserved. October 2020 • PLB9469 Bloombase Storage Protextion SB USL V6 Contact us: HSMinfo@entrust.com To find out more about Entrust nShield HSMs HSMinfo@entrust.com entrust.com/HSM