Emulex Announces Secure HBA Technology
Host-based Security Architecture Provides Data Protection throughout the Enterprise
Implementing a host-based encryption solution improves the data center's security stance and minimizes the window of data vulnerability, because data is protected where it's created, in the host. Emulex Secure HBA technology helps protect companies from insider threats, which account for 68% of reported breaches. With Emulex Secure HBAs, companies benefit from cost-effective, enterprise class security, without upgrading their storage systems, buying expensive appliances that don't scale and add unneeded complexity, or installing CPU intensive host-based encryption software.
"Preventing data breaches and complying with information security mandates are growing concerns for organizations of any size, location or industry throughout the world," said Steve Daheb, chief market officer and senior vice president of business development, Emulex Corporation. "Emulex Secure HBA technology provides maximum enterprise wide data center protection by delivering encryption at the host, shielding companies from expensive, embarrassing data loss or theft."
Emulex Secure HBA technology simplifies mandatory auditing and reporting by placing the required security components (keys, effective access controls, logging, management processes and reporting) at the right place - the host. Emulex Secure HBA data encryption is transparent up and down the stack, from applications to the storage environment, allowing IT managers to secure an entire enterprise with an optimized solution.
Emulex Secure HBAs are easy to install and manage using Emulex's OneCommand(TM) management framework, which provides policy management, auditing and reporting capabilities allowing IT managers to quickly and easily verify compliance with variety of regulatory requirements they face. Furthermore, Emulex offers an encryption API for software partners who would like to develop solutions that are more tightly integrated with Emulex Secure HBAs. Emulex Secure HBAs leverage field-proven, virtualization-tuned, high-performance Fibre Channel SAN connectivity, allowing customers to extend their existing investments in infrastructure, management, training and processes.
Hear Emulex executives discuss today's news as part of the company's larger strategic direction: http://www.emulex.com/files/video/nyse/full.html
Learn more about Emulex's Secure HBA technology: http://www.emulex.com/products/strategic-directions.html
Learn more about Emulex: http://www.emulex.com Emulex Safe Harbor Statement
"Safe Harbor" Statement under the Private Securities Litigation Reform Act of 1995: With the exception of historical information, the statements set forth above include forward-looking statements that involve risk and uncertainties. The company wishes to caution readers that a number of important factors could cause actual results to differ materially from those in the forward-looking statements. Those factors include the rapidly changing nature of technology, evolving industry standards and frequent introductions of new products and enhancements by competitors; fluctuation in the growth of Fibre Channel and IP markets; changes in economic conditions or changes in end user demand for technology solutions; fluctuations or delays in customer orders; the highly competitive nature of the markets for Emulex's products; Emulex's ability to gain market acceptance for its products; the company's ability to attract and retain skilled personnel; the company's reliance on third-party suppliers. These and other factors which could cause actual results to differ materially from those in the forward-looking statements are also discussed in the company's filings with the Securities and Exchange Commission, including its recent filings on Forms 8-K, 10-K and 10-Q. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
Press releases you might also be interested in
Weitere Informationen zum Thema "Sicherheit":
Die Grundlagen für den Handvenen-Scanner von Fujitsu
Biometrie dient der Authentifizierung. Bei der biometrischen Identifikation soll im funktionierenden Idealfall jede registrierte Person anhand von biometrischen Merkmalen eindeutig identifiziert werden. Dafür werden zum Beispiel die Merkmale von Augen oder Fingerkuppen hergenommen. Und was unterscheidet innere von äußerer Biometrie? Bei Fujitsu liegt die Antwort auf der, nein, in der Hand.Weiterlesen