MAKING THE COMPLEX SIMPLE
2019
MAKING THE COMPLEX SIMPLE
NEW PRODUCT LAUNCH/TRAINING 2019
CONFIDENTIAL
SvSAN on KVM & StorSecure
22 May 2019
2019 2019 NEW PRODUCT LAUNCH/TRAINING SvSAN on KVM & - - PowerPoint PPT Presentation
2019 2019 NEW PRODUCT LAUNCH/TRAINING SvSAN on KVM & StorSecure 22 May 2019 MAKING THE COMPLEX SIMPLE MAKING THE COMPLEX SIMPLE CONFIDENTIAL PRESENTERS & AGENDA BRUCE KORNFELD CMO & GM Americas CRAIG COLLIER Systems
MAKING THE COMPLEX SIMPLE
MAKING THE COMPLEX SIMPLE
CONFIDENTIAL
22 May 2019
SvSAN on KVM StorSecure BRUCE Q&A Sales/Technical BRUCE & CRAIG
BRUCE KORNFELD CMO & GM – Americas CRAIG COLLIER Systems Engineer, Technical Services
2
CONFIDENTIAL
3
ANY X86 SERVER
VSPHERE, HYPER-V OR KVM
ANY STORAGE TYPE
4
Highly available two node solution with hardware, software and maintenance under $10,000
White Box
CONFIDENTIAL
5
CONFIDENTIAL
5
SvSAN has always been a linux-based VSA (virtual storage appliance) SvSAN runs as a guest VM on top of Hyper-V or vSphere
6
CONFIDENTIAL
6
Customer feedback “Hypervisor Tax” Too much $$ spent on the hypervisor Eliminated a large portion of the cost
Edge and Small Datacenter customers often don’t need all the features of Hyper-V or vSphere As data processing and storage continues to move to the edge – this will become even more important
7
CONFIDENTIAL
7
TO LISTEN FOR:
They mention open source or ask about it They complain about the cost of vSphere (or Hyper-V) Trying to get the solution cost as low as possible Very technical organization, hands on, etc..
QUESTIONS TO ASK:
Have you ever considered open source hypervisors? Do you have any open source projects inside your organization? Is anyone complaining about the cost of VMware? Do you need advanced hypervisor features?
CONFIDENTIAL
8
CONFIDENTIAL
8
9
CONFIDENTIAL
ADMINISTERING THE FULL LIFECYCLE OF CRYPTOGRAPHIC KEYS
Protect from loss or misuse Generate, use, store, archive and delete keys Protection: limit access to the keys physically, logically, and through user/role access
HSM (HARDWARE SECURITY MODULE)
Handle encryption and key management Are very secure ….. and very expensive! These are NOT required anymore
MODERN APPROACH – VIRTUAL HSM
100% software approach Run as a virtual machine (VM)
Key management only, encryption done elsewhere Easy to deploy and scale
10
CONFIDENTIAL
ENCRYPTION REQUIRES KEYS
11
CONFIDENTIAL
11
We’ve had encryption for a year Customer/Channel feedback: KMS solutions are too expensive for edge and small datacenter Changing the cost paradigm for KMS A differentiated approach in the HCI market One simple, low-cost bundle: Encryption and KMS Simplify the process for deploying and managing KMS
SIMPLE - Secure data without the hassle
Military-grade encryption and key management all-in-one 100% software – no special hardware required
12
FLEXIBLE – Store keys anywhere
Onsite, in the datacenter, or cloud Easily scale compute, storage and keys
COST-EFFECTIVE – Edge solution, unbeatable price
One low price per site – encryption plus unlimited keys Eliminate many typical costs with lightweight architecture Encrypt and store keys onsite, in the datacenter, or cloud for only $2,000
CONFIDENTIAL
Military-grade FIPS 140-2 compliant encryption Meets HIPAA, PCI DSS and SOX requirements Secure erase and rekey feature Leverages CPU offload engines - improved CPU acceleration and performance No special self-encrypting disk drives, RAID or hardware acceleration cards Avoid OS or hypervisor-level encryption Data destruction (disk scrubbing or degaussing) not required on failed drives before discarding
CONFIDENTIAL
13
StorMagic's innovation in encryption resulted in being named a winner in the Encryption Product Category
Excellence Awards.
14
THE EASIEST KEY MANAGER TO INSTALL AND RUN
Fast deployment: first encrypted data in less than 15 minutes Easily integrate with almost any Single Sign-On (SSO) service Security expertise not required to manage
100% SOFTWARE – NO SPECIAL HARDWARE REQUIRED
No hardware HSM needed Hardened, multi-layer virtual ual HSM appliance to ensure protection Use any disk drive - self-encrypting drives not required
LAYERS OF PROTECTION
CONFIDENTIAL
15
ONE LOW PRICE PER SITE FOR ENCRYPTION AND UNLIMITED KEYS $2,000 for a 2 server, highly available cluster Enterprise-class protection and functionality ELIMINATE MANY TYPICAL ENCRYPTION & KEY MANAGEMENT COSTS Avoid costly hardware HSMs No self-encrypting drives, RAID, hardware acceleration cards OS or hypervisor-level encryption not required No data destruction required on failed drives before disposal LIGHTWEIGHT ARCHITECTURE KEEPS HARDWARE COSTS TO A MINIMUM Significantly less hardware than competitive solutions Software deployed as VMs - runs on any hardware
ENCRYPTION AND KEY MANAGEMENT FOR ONLY $2,000 PER SITE
CONFIDENTIAL
Same HCI cluster as SvSAN (less secure) Other server at same location (recommended)
16
STORE KEYS ONSITE
CONFIDENTIAL
17
StorSecure clustering works over WAN – put the VMs anywhere Any 3 locations form a highly available cluster One or more datacenters Your own public cloud (AWS, Azure, etc…)
STORE KEYS IN DATACENTER OR PUBLIC CLOUD
CONFIDENTIAL
18 18
Many key types - rotate on-demand or on-schedule
Symmetric (AES), asymmetric (RSA), Elliptic Curve (ECDSA)
Comprehensive security and disaster protection Easy scaling with growth - compute, storage & keys
Easily scale up capacity and scale out performance Can store millions of keys per site No additional encryption or key charges when scaling
CONFIDENTIAL
Licensed by useable capacity
Perpetual licensing Standard Edition – including HA and management Advanced Edition – adds Predictive Storage Caching StorSecure – adds encryption and KMS Add compute-only nodes for free
Maintenance & support options
1, 3, 5 year options Platinum – 24 hours x 7 days Gold – 10 hours x 5 days
19
CONFIDENTIAL
* Unlimited capacity
$3,100 $1,550 $2,000*
2TB, 2 SERVER EXAMPLE PRICING
20
CONFIDENTIAL
20