bloombase spitfire storesafe storage security · pdf filebloombase spitfire storesafe storage...

56
Bloombase Spitfire StoreSafe Storage Security Server Bloombase Technologies

Upload: trinhdieu

Post on 24-Mar-2018

237 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Bloombase Spitfire StoreSafe Storage Security Server

Bloombase Technologies

Page 2: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Bloombase Spitfire

StoreSafe Storage

Security Server

Bloombase Spitfire

KeyCastle Key

Management

Server

Bloombase

Spitfire SOA

Security Server

Bloombase

Keyparc

Bloombase Spitfire

Message Security

Server

Bloombase Spitfire

Identity Security

Server

Bloombase Spitfire

Edge Security Suite

Page 3: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Overview

Page 4: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Enterprise Data At-Rest In Risk

Sensitive data are stored

in clear-text in storage

systems with minimal

access control vulnerable

to core attacks

Hosts and applications

require data access in

plain

Page 5: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

How StoreSafe Protects Your Data

On-the-fly non-

disruptive

application

transparent

encryption and

unencryption

Proxy

Bump-in-the-

wire

Page 6: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Why Traditional Methods Are Inadequate

File encryption utilities – mcrypt, ccrypt, zip

– Only for static files, not for dynamic files, e.g. database

Database encryption tools – Oracle crypto package

– Tremendous 2nd development efforts at database tier

– Huge performance impact, not for business intelligence

Crypto tools – openssl, JCE, Microsoft capicom, HSM

– Very steep learning curve

– Tremendous 2nd development efforts at application tier

– Not for business intelligence applications

Security = High cost + SkillN +Slow + Instability + Insecure

Page 7: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

StoreSafe Benefits

Secures operational data in databases

Protect backup/offsite/remote data from electronic and

hardware theft

Meet IT governance compliance requirements

Assure digital corporate assets integrity

Protects websites from deface and assure data integrity

Enforce effective change management

High ROI – lawsuits and worst, bankruptcy

Low TCO - One solution for all applications

Page 8: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

StoreSafe Benefits

Management

Immediate regulatory compliance

Hardware and software independent

Application transparent

On-the-fly encryption/decryption

No programming required

No application changes

No user behavior changes

OS independent

Hardware independent

Page 9: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Functions and Features

Page 10: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Transparent Encryption and Unencryption

Fully automated data

encryption and

unencryption for

authorized clients

On-premises: SAN,

NAS, DAS, CAS, Object

Store, etc

Cloud: RESTful

Page 11: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Features

StoreSafe virtualizes physical storage systems

Virtual storage sub-system created providing

trusted/decrypted/verified replica of physical storage

Supports SAN, DAS, NAS, CAS and cloud storage

Data protection

– Access control

– Privacy

– Integrity

Page 12: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Features

Level of protection

– Disk / Block

– File

– Object

Hardware and software independent

Application transparent

On-the-fly encryption/decryption/watermark verification

Page 13: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Features

No programming required

No application changes

No user behavior changes

File-system independent

– Works with all file-system types supported by the OS

Entensive OS support

Application independent

– Works with virtually all applications

Page 14: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Features

Plug-in architecture for future cipher upgrades

Web-based management console

NIST FIPS 140-2 validated cryptographic module

PKCS#11 hardware security module support

Chinese National OSCCA crypto module support

Page 15: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Industry Proven Security

Industry standard cipher algorithm support

Regional and special cipher support

IEEE 1619 compliant

OASIS KMIP support

NIST FIPS 140-2 validated

Page 16: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Security Accreditations

Security

– NIST FIPS 140-2 validated

(NIST Certificate #1241)

Algorithms

– NIST FIPS-197 AES encryption and decryption (NIST Certificate

#1041)

– RSA and DSA public key cryptography (NIST Certificate #496)

– SHA hash generation (NIST Certificate #991)

– Hash Message Authentication Code HMAC (NIST Certificate #583)

– Random Number Generator (NIST Certificate #591)

Page 17: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Security Accreditations

Algorithms

– NIST FIPS-46-3 3DES encryption and decryption

– NTT/Mitsubishi Electric Camellia encryption/decryption

– DES, RC4, RC2, CAST5 encryption and decryption

– 512, 1024 and 2048 bit public key cryptography

– MD5 hash generation

Standards

– IEEE 1619 storage in security

Page 18: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Unified Storage Support

Block storage

based, file based,

object based

FCP, FCoE, iSCSI

NFS, CIFS

HTTP, WEBDAV

RESTful cloud

Page 19: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Unified Storage Support

Fiber Channel Protocol (FCP)

Small Computer System Interface (SCSI)

Internet SCSI (iSCSI)

Network File System (NFS)

Common Internet File System (CIFS)

File Transfer Protocol (FTP)

Hyper Text Transfer Protocol (HTTP)

Representational State Transfer (REST)

Page 20: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Storage System Support

Storage Area Network (SAN)

Network Attached Storage (NAS)

Direct Attached Storage (DAS)

Just a Bunch Of Disk (JBOD)

SCSI-based local disk arrays

Content Addressable Storage (CAS)

Cloud storage

Object storage, etc

Page 21: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Proprietary Object and Cloud Storage Support

EMC Atmos

EMC Centera

Microsoft Windows Azure

Amazon Elastic Block Store (EBS)

IBM Cloud

Caring CAStor / Dell DX Object Storage, etc

Page 22: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

File System Support

File system independent

Raw / Uncooked

Solaris UFS

Symantec Veritas VxFS

IBM JFS

HPFS

Red Hat GFS

XFS

Linux Ext3

Windows NTFS, FAT32 and FAT

CDFS, etc

Page 23: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Database Support

Supports all database systems

Oracle

IBM DB2

IBM Informix

Sybase

Microsoft SQLServer

MySQL

Hadoop, etc

Page 24: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Application Support

Native Java client library

Native C client library

Java RMI connectivity

Web Services connectivity

Socket connectivity, etc

Page 25: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Appliance Platform Support

Hardware architecture

– Intel x86-based

– Intel Itanium-2

–AMD64 based

– IBM PowerPC based

Appliance operating platform

– Bloombase SpitfireOS

Page 26: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Operating Platform Support

IBM AIX

IBM z/OS

IBM i5/OS

HP-UX

Oracle Sun Solaris

Linux

Windows

Mac OS X, etc

Page 27: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Virtual Platform Support

VMware ESX, ESXi, Server

Red Hat KVM

Citrix XenServer

Oracle VirtualBox

Microsoft Hyper-V

IBM PowerVM, etc

Page 28: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Compute Cloud Platform Support

EMC Atmos

Windows Azure

Amazon Elastic Compute Cloud (EC2), etc

Page 29: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Key Management

Stored separately from

encrypted information

Key vault protected by

AES-256 strong

encryption

Supports 3rd party

PKCS#11 HSMs and

KMIP-compliant key

managers

Page 30: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Host Security and Access Control

User-based

authentication: LDAP,

MSAD, Kerberos,

CHAP

Host-based

authentication:

network address,

LUN mask

Page 31: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

High Availability

Spitfire High Availability Module to provide

– Automated failover of nodes or load-balancing

– Cluster monitoring

– Cluster management

– Configuration synchronization

Spitfire Quorum Server to strengthen robustness of Spitfire cluster and avoid potential split-brain scenario

Page 32: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Management

Web-based and CLI

management consoles

Privilege-based

administrator access

control

Separation of duties

(SoD)

Recovery quorum

Operator smart tokens

Page 33: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Network Management

SNMP (v1, v2, v3)

Email

Syslog

Windows Event Monitor

Audit trail

Log viewer and export

Dashboard

Page 34: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Audit Trail and Logging

Customizable system log

Full storage access audit trail

Web-based management console accessible

Log export and digital signing

2005-02-20 20:23:47,798 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\Movie_0001.wmv, from : /192.168.1.30, by : demo1

2005-02-20 20:23:47,801 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\Movie_0001.wmv, from : /192.168.1.30, by : demo1

2005-02-20 20:23:47,804 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\Movie_0001.wmv, from : /192.168.1.30, by : demo1

2005-02-20 20:23:47,807 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\Movie_0001.wmv, from : /192.168.1.30, by : demo1

2005-02-20 20:23:47,810 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\Movie_0001.wmv, from : /192.168.1.30, by : demo1

2005-02-20 20:23:47,812 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\Movie_0001.wmv, from : /192.168.1.30, by : demo1

2005-02-20 20:23:47,815 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\Movie_0001.wmv, from : /192.168.1.30, by : demo1

2005-02-20 20:23:47,875 DEBUG audit.storesafe - read file : /mnt/storesafe/vs0\Movie_0001.wmv, from : /192.168.1.30, by : demo1

2005-02-20 20:24:56,751 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/, from : /192.168.1.30, by : demo1

2005-02-20 20:24:58,263 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/Movie_0001.wmv, from : /192.168.1.30, by : demo1

2005-02-20 20:28:32,729 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/Movie_0001.wmv, from : /192.168.1.30, by : demo1

2005-02-20 20:30:20,340 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/, from : /192.168.1.30, by : demo1

2005-02-20 20:30:21,621 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/Movie_0001.wmv, from : /192.168.1.30, by : demo1

2005-02-20 20:30:38,467 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/Movie_0001.wmv, from : /192.168.1.30, by : demo1

2005-02-20 20:30:57,152 DEBUG audit.storesafe - open file : /mnt/storesafe/vs0/Movie_0001.wmv, from : /192.168.1.30, by : demo1

Page 35: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Product Editions

StoreSafe appliance with built-in SpitfireOS

StoreSafe QEMU OVF-compliant virtual appliance

StoreSafe for Windows

StoreSafe for Linux

StoreSafe for IBM AIX

StoreSafe for HPUX

StoreSafe for Solaris

Page 36: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Specifications

Maximum number of CIFS servers/shares: no definite

limit

Maximum number of NFS servers/shares: no definite

limit

Maximum number of iSCSI targets: no definite limit

Maximum number of SAN LUNs: no definite limit

Maximum number of RESTful service endpoints: no

definite limit

Page 37: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Technology In Depth

Page 38: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Inside StoreSafe

Application, server and storage

transparent

Automated encryption

Turnkey and immediate

regulatory compliance

Scale-up and scale-out

Cost-effective

High availability ready for

mission critical applications

Page 39: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Storage Cryptography Transparency

Extract payload from storage

commands (SCSI, NFS,

REST, etc)

Encrypt/decrypt/verify

storage contents on-the-fly

and recompose crypto-

processed commands

Page 40: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Why Now Not Earlier?

Advancement in solid state and network technologies

Network speed far excels storage speed

Multi-core processors

Multi-processor systems

High-performance computing systems

Page 41: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Ready For Giga/Tera/Petabyte Data?

Storage network access

protocols

Block based rather than file

based

Random access rather than

sequencial

On-demand

encryption/decryption

Not giga/tera/peta-byte but

kilo/byte!!!

Page 42: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Modular Pluggable Cipher Architecture

Pluggable cipher architecture for future cipher upgrade

User-Customed cipher support

Out of the box ciphers - AES, 3DES, DES, Twofish, Blowfish,

RC2, RC4, RC5, RC6, Camellia, SEED, ARIA, etc

Page 43: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Adaptive Block-based Encryption

Random accessible

On-demand block-based data encryption/decryption

User-defined block size for I/O optimization

Enterprise applications access storage block-by-block to

reduce I/O overheads and latency

Some applications (e.g. Oracle) allow user to configure

data unit size to boost application performance

User customizable unit of encryption size

Page 44: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Round Trip Reduction

Encryption block size smaller than application unit of access

I/O round trips

Cipher re-initialization

Page 45: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Payload Reduction

Encryption block size larger than application unit of access

Encrypt and un-encrypt more than needed

Page 46: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Use Cases

Page 47: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Share/File-based Encryption

StoreSafe appliance with

network interface cards

(NIC)

Transparent file encryption

for NFS, CIFS, WebDAV,

FTP, etc

Protocol conversion

Page 48: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

iSCSI Block-based Encryption

StoreSafe appliance with iSCSI

host-bus adapters (HBA),

converged network adapters

(CNA) or simply NIC

Transparent block storage

encryption for iSCSI targets

StoreSafe virtual storage

presented as iSCSI targets

Page 49: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Fiber Channel SAN Block-based Encryption

StoreSafe appliance with fiber

channel (FC) host-bus adapters

(HBA)

Transparent block storage

encryption for LUNs of SAN

targets

StoreSafe virtual storage

presented as FC targets

Page 50: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Object-based Encryption

StoreSafe appliance with network

interface cards (NIC)

Transparent object encryption for

RESTful object store, cloud

storage and content addressable

storage (CAS)

Protocol proprietary object store

including EMC Atmos, Dell DX, etc

Page 51: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Product Roadmap

Page 52: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

StoreSafe Product Roadmap

Page 53: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Questions? Comments?

Page 54: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Conclusion

Protect Your Corporate Data

– Protect your customers

– Corporate governance

Implement Data Protection

– Access Control

– Digital Asset Encryption

Page 55: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire

Your Action Items

Review your corporate perimeter security measures

Identify your enterprise data

Classify your enterprise data into levels of security

Devise an encryption strategy based on the

classification

Evaluate impact to users and applications

Implement hassle free transparent protection to your

corporate storage and message systems

Page 56: Bloombase Spitfire StoreSafe Storage Security · PDF fileBloombase Spitfire StoreSafe Storage Security Server Bloombase Spitfire KeyCastle Key Management Server Bloombase Spitfire