SlideShare a Scribd company logo
www.evault.com © 2013 EVault, Inc. All Rights Reserved.
Technical Brief: Secure, Efficient
Data Deduplication for Endpoint Protection
White Paper
Data deduplication is a key to managing bandwidth impact and storage
growth. But not all deduplication is the same: many deduplication processes
expose data to security risks and, rather than improving bandwidth, actually
further restrict it. The result is that many organizations are forced to choose
between the benefits of deduplication or the continuous security and privacy
offered by data encryption.
The problem is in the way many data deduplication processes work with data encryption.
Data deduplication is implemented through an algorithm that analyzes data blocks
across an entire data store. The process identifies duplicate blocks in the target archive
and eliminates them, on the client side, before the data is transmitted. The remaining
data blocks are then reduced in size (compressed) to minimize storage and reduce
bandwidth consumption. To further reduce the amount of data being transmitted, the
deduplication process may then be applied across multiple data sources.
But data deduplication can run into a problem when it encounters data encryption—
a process that ensures information can be read only by authorized users. When data is
encrypted on the source, using different encryption keys, the encryption renders them
differently than the typical deduplication process, creating device-specific data blocks
unrecognized by the source as duplicates. Traditional data deduplication processes do
not eliminate these encrypted duplicates, thus rendering the process ineffective.
As noted above, this leaves organizations with a choice: get the full benefits of data
deduplication to minimize bandwidth impact and manage storage growth, or get the full
benefits of data encryption. But not both.
EVault Secure Deduplication Addresses
Gaps in Security, Reduces Bandwidth Impact
EVault®
Endpoint Protection includes a client-side data deduplication process that goes
several steps further than other deduplication processes to ensure data safety and
minimize bandwidth and storage impact. Its goal is to ensure end-to-end data security
and privacy while using the most efficient backup processes possible.
The solution’s unique encryption and deduplication processes remove the traditional
vulnerabilities by deduplicating data after encryption—data does not have to be
decrypted in order to be deduplicated across the target environment—and by
implementing additional safeguards for encryption keys. Its block- and device-level
encryption system never allows for data exposure; data remains encrypted from device
to final storage.
White Paper
Technical Brief:
Secure, Efficient
Data Deduplication for
Endpoint Protection
EVault Endpoint Protection assigns encryption keys based on “scope”—data blocks
within an assigned company, team, or user group that enable the deduplication
algorithm to identify data blocks across multiple sources right at the device. This
secure global deduplication process never exposes data and it minimizes impact on
the network and storage.
Additionally, these scoped blocks can be identified only by a unique encrypted
encryption key for each data block. No single or shared key exposes data, minimizing
vulnerabilities across the organization.
Each data block is completely processed on the client side. To maintain security, no
data analysis is even possible on the server; it just files the data in the data store. Other
data deduplication technologies decrypt data on the server (compromising security,
privacy, multitenancy, and so on), deduplicate data only from individual data sources
(which lacks the benefits of global deduplication), or introduce key management
vulnerabilities (single or shared keys that expose data to unauthorized entities).
How It Works
EVault Endpoint Protection secure deduplication processes disassemble each file into a
set of variable-length blocks that are then processed as follows:
1.	 Selective decompression of data. Each data block is selectively
compressed using standard compression techniques. The process is
“selective” in that compression is applied only if the original version of the
block is larger than the compressed version. The smallest version of the
block is then passed onto the next stage.
2.	 Associating environments (scoping). The compressed data block is
then “scoped” based on the configuration of the environment set by
the administrator. Scoping allows for explicit data separation between
organizational boundaries in a shared environment. It can be configured
from enterprise to individual levels, drawing required boundaries in the vault
where data is stored. Configurations may include teams or departments.
3.	 Encryption key assignment of data blocks. After scoping rules have been
applied, a unique block encryption key is generated based on the scoping
rules. This key is then used to apply AES 256-bit encryption to the block.
The result is an encrypted data DNA block.
4.	 Encrypting the encryption key. The block encryption key is then itself
encrypted and any clear text representation of the key is removed.
5.	 True global deduplication. All encryption processing thus far has been
based on scope, and all data DNA blocks are identical within the scope.
This allows the data to be deduplicated across the target archive, so only a
single instance of any particular data block is ever sent to the archive.
6.	 Indexing. After data duplication, each file can be represented by a simple
index that associates a list of unique data blocks with their order of
arrangement, and identifies the block encryption key required to completely
reassemble an instance of the original data. Every data source will maintain
its own unique index of its data, but will share all the encrypted data DNA
blocks (subject to scoping rules). No further analysis of the data can be
performed once it has been dispatched by the client.
2013.11.0003_wp_us (updated 11/11/2013)
White Paper
Technical Brief:
Secure, Efficient
Data Deduplication for
Endpoint Protection
Headquarters | 201 3rd Street | Suite 400 | San Francisco, CA 94103 | 877.901.DATA (3282) | www.evault.com
NL (EMEA HQ) +31 (0) 73 648 1400 | FR & S. Europe +33 (0) 1 73 00 17 00 | DE +49 89 1430 5410 | UK +44 (0) 1932 445 370
BR 0800 031 3352 | LATAM Evault_latin_america@evault.com | APAC APACTeam@evault.com
EVault and the EVault logo are registered trademarks, and cloud-connected and
“the best case for the worst case” are trademarks, of EVault, Inc.
The Only Endpoint Protection Solution
That Doesn’t Trade Deduplication for Security
With EVault Endpoint Protection, you don’t need to choose between the economic
benefits of data deduplication and your security requirements. You get it all.
As bandwidth limitations continue to rise and compliance requirements tighten,
minimizing bandwidth impact, maximizing storage savings, and maintaining privacy
all become increasingly important. Only the secure global data deduplication used by
EVault Endpoint Protection can deduplicate encrypted data, providing enterprises and
MSPs with the full economic benefits of data deduplication (freeing up bandwidth and
storage capacity) without sacrificing data security or privacy.
Take the Next Step
To learn more about EVault®
backup and recovery services,
call us at 1.877.901.DATA (3282), email us at concierge@evault.com,
or visit us at www.evault.com.

More Related Content

PDF
Multi-part Dynamic Key Generation For Secure Data Encryption
PDF
A hybrid cloud approach for secure authorized deduplication
PDF
Psdot 12 a secure erasure code-based cloud storage
PPTX
Securing data
DOCX
A Hybrid Cloud Approach for Secure Authorized Deduplication
PPT
Decentralized access control with anonymous authentication of data stored in ...
DOCX
Hybrid Cloud Approach for Secure Authorized Deduplication
PDF
Revocation based De-duplication Systems for Improving Reliability in Cloud St...
Multi-part Dynamic Key Generation For Secure Data Encryption
A hybrid cloud approach for secure authorized deduplication
Psdot 12 a secure erasure code-based cloud storage
Securing data
A Hybrid Cloud Approach for Secure Authorized Deduplication
Decentralized access control with anonymous authentication of data stored in ...
Hybrid Cloud Approach for Secure Authorized Deduplication
Revocation based De-duplication Systems for Improving Reliability in Cloud St...

What's hot (20)

PPTX
Decentralized access control with authentication anonymous of data stored in ...
PPTX
Encryption 2021
PDF
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
DOC
Desktop support qua
DOCX
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
PDF
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
PDF
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
DOCX
Secure distributed deduplication systems with improved reliability
PDF
Secure distributed deduplication systems with improved reliability 2
PDF
Data centric security key to cloud and digital business
PDF
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
PPTX
A hybrid cloud approach for secure authorized deduplication.
DOCX
Decentralized access control with anonymous authentication of data stored in ...
PDF
IRJET- Distributed Decentralized Data Storage using IPFS
PPTX
PDF
Choosing Encryption for Microsoft SQL Server
DOC
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Decentralized access control with anonymous authentication of data stored in ...
DOCX
Decentralized access control with anonymous authentication of data stored in ...
PDF
2015 AUG 24-PeopleSoft Solution
Decentralized access control with authentication anonymous of data stored in ...
Encryption 2021
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
Desktop support qua
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability 2
Data centric security key to cloud and digital business
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
A hybrid cloud approach for secure authorized deduplication.
Decentralized access control with anonymous authentication of data stored in ...
IRJET- Distributed Decentralized Data Storage using IPFS
Choosing Encryption for Microsoft SQL Server
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
2015 AUG 24-PeopleSoft Solution
Ad

Similar to Secure deduplication-evault-endpoint-protection (20)

PDF
Protect Your Sensitive Data with Gemalto Guidebook
PDF
Implementation of De-Duplication Algorithm
PDF
iaetsd Using encryption to increase the security of network storage
DOC
A hybrid cloud approach for secure authorized deduplication
PPTX
Ensuring data security in cloud computing. - Anusha Tuke
PDF
Improving data confidentiality in personal computer environment using on line...
PDF
Improve cyber resiliency and protect data from cyber ransomware threats by us...
PPTX
Presentation (6).pptx
PPTX
FINAL REVIEW.pptx
DOCX
a hybrid cloud approach for secure authorized reduplications
PDF
Security in the Cloud: Tips on How to Protect Your Data
PDF
PPTX
pr-complete-data-protection-suites-new-customers.pptx
DOCX
Deployment websese
PPT
Ensuring d.s
PPT
PDF
Block-Level Message-Locked Encryption for Secure Large File De-duplication
PDF
How Organizations can Secure Their Database From External Attacks
PDF
Oracle database 12c security and compliance
DOCX
Protect Your Sensitive Data with Gemalto Guidebook
Implementation of De-Duplication Algorithm
iaetsd Using encryption to increase the security of network storage
A hybrid cloud approach for secure authorized deduplication
Ensuring data security in cloud computing. - Anusha Tuke
Improving data confidentiality in personal computer environment using on line...
Improve cyber resiliency and protect data from cyber ransomware threats by us...
Presentation (6).pptx
FINAL REVIEW.pptx
a hybrid cloud approach for secure authorized reduplications
Security in the Cloud: Tips on How to Protect Your Data
pr-complete-data-protection-suites-new-customers.pptx
Deployment websese
Ensuring d.s
Block-Level Message-Locked Encryption for Secure Large File De-duplication
How Organizations can Secure Their Database From External Attacks
Oracle database 12c security and compliance
Ad

Recently uploaded (20)

PDF
LSR CASEBOOK 2024-25.pdf. very nice casbook
PPTX
DPT-MAY24.pptx for review and ucploading
PDF
CV of Architect Professor A F M Mohiuddin Akhand.pdf
PPTX
Opioid_Analgesics_Presentation (1).pptxp
PPTX
Digital Education Presentation for students.
PPT
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
PDF
servsafecomprehensive-ppt-full-140617222538-phpapp01.pdf
PDF
202s5_Luciano André Deitos Koslowski.pdf
PDF
Parts of Speech Quiz Presentation in Orange Blue Illustrative Style.pdf.pdf
PPTX
_Dispute Resolution_July 2022.pptxmhhghhhh
PDF
ELA Parts of Speech Pronoun Educational Presentation in Green 3D Gradient Sty...
PPTX
A slide for students with the advantagea
PPT
NO000387 (1).pptsbsnsnsnsnsnsnsmsnnsnsnsjsnnsnsnsnnsnnansnwjwnshshshs
PDF
CollegePresentation.pdf hsjsisjsjsjsssoo
PPTX
employee on boarding for jobs for freshers try it
PDF
iTop VPN Crack Latest Version 2025 Free Download With Keygen
PDF
Branding_RAMP-ML........................
PPTX
formulation and evaluation of polyherbal antiageing cream
DOCX
PRACTICE-TEST-12 is specially designed for those
PPTX
Slideham presentation for the students a
LSR CASEBOOK 2024-25.pdf. very nice casbook
DPT-MAY24.pptx for review and ucploading
CV of Architect Professor A F M Mohiuddin Akhand.pdf
Opioid_Analgesics_Presentation (1).pptxp
Digital Education Presentation for students.
notes_Lecture2 23l3j2 dfjl dfdlkj d 2.ppt
servsafecomprehensive-ppt-full-140617222538-phpapp01.pdf
202s5_Luciano André Deitos Koslowski.pdf
Parts of Speech Quiz Presentation in Orange Blue Illustrative Style.pdf.pdf
_Dispute Resolution_July 2022.pptxmhhghhhh
ELA Parts of Speech Pronoun Educational Presentation in Green 3D Gradient Sty...
A slide for students with the advantagea
NO000387 (1).pptsbsnsnsnsnsnsnsmsnnsnsnsjsnnsnsnsnnsnnansnwjwnshshshs
CollegePresentation.pdf hsjsisjsjsjsssoo
employee on boarding for jobs for freshers try it
iTop VPN Crack Latest Version 2025 Free Download With Keygen
Branding_RAMP-ML........................
formulation and evaluation of polyherbal antiageing cream
PRACTICE-TEST-12 is specially designed for those
Slideham presentation for the students a

Secure deduplication-evault-endpoint-protection

  • 1. www.evault.com © 2013 EVault, Inc. All Rights Reserved. Technical Brief: Secure, Efficient Data Deduplication for Endpoint Protection White Paper Data deduplication is a key to managing bandwidth impact and storage growth. But not all deduplication is the same: many deduplication processes expose data to security risks and, rather than improving bandwidth, actually further restrict it. The result is that many organizations are forced to choose between the benefits of deduplication or the continuous security and privacy offered by data encryption. The problem is in the way many data deduplication processes work with data encryption. Data deduplication is implemented through an algorithm that analyzes data blocks across an entire data store. The process identifies duplicate blocks in the target archive and eliminates them, on the client side, before the data is transmitted. The remaining data blocks are then reduced in size (compressed) to minimize storage and reduce bandwidth consumption. To further reduce the amount of data being transmitted, the deduplication process may then be applied across multiple data sources. But data deduplication can run into a problem when it encounters data encryption— a process that ensures information can be read only by authorized users. When data is encrypted on the source, using different encryption keys, the encryption renders them differently than the typical deduplication process, creating device-specific data blocks unrecognized by the source as duplicates. Traditional data deduplication processes do not eliminate these encrypted duplicates, thus rendering the process ineffective. As noted above, this leaves organizations with a choice: get the full benefits of data deduplication to minimize bandwidth impact and manage storage growth, or get the full benefits of data encryption. But not both. EVault Secure Deduplication Addresses Gaps in Security, Reduces Bandwidth Impact EVault® Endpoint Protection includes a client-side data deduplication process that goes several steps further than other deduplication processes to ensure data safety and minimize bandwidth and storage impact. Its goal is to ensure end-to-end data security and privacy while using the most efficient backup processes possible. The solution’s unique encryption and deduplication processes remove the traditional vulnerabilities by deduplicating data after encryption—data does not have to be decrypted in order to be deduplicated across the target environment—and by implementing additional safeguards for encryption keys. Its block- and device-level encryption system never allows for data exposure; data remains encrypted from device to final storage.
  • 2. White Paper Technical Brief: Secure, Efficient Data Deduplication for Endpoint Protection EVault Endpoint Protection assigns encryption keys based on “scope”—data blocks within an assigned company, team, or user group that enable the deduplication algorithm to identify data blocks across multiple sources right at the device. This secure global deduplication process never exposes data and it minimizes impact on the network and storage. Additionally, these scoped blocks can be identified only by a unique encrypted encryption key for each data block. No single or shared key exposes data, minimizing vulnerabilities across the organization. Each data block is completely processed on the client side. To maintain security, no data analysis is even possible on the server; it just files the data in the data store. Other data deduplication technologies decrypt data on the server (compromising security, privacy, multitenancy, and so on), deduplicate data only from individual data sources (which lacks the benefits of global deduplication), or introduce key management vulnerabilities (single or shared keys that expose data to unauthorized entities). How It Works EVault Endpoint Protection secure deduplication processes disassemble each file into a set of variable-length blocks that are then processed as follows: 1. Selective decompression of data. Each data block is selectively compressed using standard compression techniques. The process is “selective” in that compression is applied only if the original version of the block is larger than the compressed version. The smallest version of the block is then passed onto the next stage. 2. Associating environments (scoping). The compressed data block is then “scoped” based on the configuration of the environment set by the administrator. Scoping allows for explicit data separation between organizational boundaries in a shared environment. It can be configured from enterprise to individual levels, drawing required boundaries in the vault where data is stored. Configurations may include teams or departments. 3. Encryption key assignment of data blocks. After scoping rules have been applied, a unique block encryption key is generated based on the scoping rules. This key is then used to apply AES 256-bit encryption to the block. The result is an encrypted data DNA block. 4. Encrypting the encryption key. The block encryption key is then itself encrypted and any clear text representation of the key is removed. 5. True global deduplication. All encryption processing thus far has been based on scope, and all data DNA blocks are identical within the scope. This allows the data to be deduplicated across the target archive, so only a single instance of any particular data block is ever sent to the archive. 6. Indexing. After data duplication, each file can be represented by a simple index that associates a list of unique data blocks with their order of arrangement, and identifies the block encryption key required to completely reassemble an instance of the original data. Every data source will maintain its own unique index of its data, but will share all the encrypted data DNA blocks (subject to scoping rules). No further analysis of the data can be performed once it has been dispatched by the client.
  • 3. 2013.11.0003_wp_us (updated 11/11/2013) White Paper Technical Brief: Secure, Efficient Data Deduplication for Endpoint Protection Headquarters | 201 3rd Street | Suite 400 | San Francisco, CA 94103 | 877.901.DATA (3282) | www.evault.com NL (EMEA HQ) +31 (0) 73 648 1400 | FR & S. Europe +33 (0) 1 73 00 17 00 | DE +49 89 1430 5410 | UK +44 (0) 1932 445 370 BR 0800 031 3352 | LATAM Evault_latin_america@evault.com | APAC APACTeam@evault.com EVault and the EVault logo are registered trademarks, and cloud-connected and “the best case for the worst case” are trademarks, of EVault, Inc. The Only Endpoint Protection Solution That Doesn’t Trade Deduplication for Security With EVault Endpoint Protection, you don’t need to choose between the economic benefits of data deduplication and your security requirements. You get it all. As bandwidth limitations continue to rise and compliance requirements tighten, minimizing bandwidth impact, maximizing storage savings, and maintaining privacy all become increasingly important. Only the secure global data deduplication used by EVault Endpoint Protection can deduplicate encrypted data, providing enterprises and MSPs with the full economic benefits of data deduplication (freeing up bandwidth and storage capacity) without sacrificing data security or privacy. Take the Next Step To learn more about EVault® backup and recovery services, call us at 1.877.901.DATA (3282), email us at concierge@evault.com, or visit us at www.evault.com.