Data protection through a single pane of glass.
Control Data Access Everywhere
Implementing a “protect everything” approach to data security has never been easier. With SPxSHARC ll’s easy to use virtual management console, agents are easily deployed and managed locally, remotely or in the cloud providing a holistic view of your data protection and complete control of data access.
An intuitive and comprehensive interface to control and manage data protection.
Combining AES-256 encryption and our patented FIPS 140-2 certified cryptographic splitting technology, SPxSHARC ll delivers advanced, provably secure data protection no matter where data resides (local, remote, hybrid or cloud). With performance that can be as fast as clear text, you are able to encrypt your data with negligible operational impact.
With SPxSHARC ll’s privileged access management feature, you can rest assured your data is completely private in any cloud environment. Implementing restrictions on cloud vendor admins and root users means they never have access to your data and you are in complete control of your cloud security and privacy.
Role-based, least privileged access and privileged user (root/admin) controls, coupled with fine-grained policy options, puts you in charge of who can access your data. With robust and flexible access control settings, policies can be defined at the file or volume level. Cryptographic separation at the file level provides an extra layer of protection and supports secure multi-tenant storage environments.
Integrated, transparent key management provides simplified but robust features for your keys including key rotation that conforms to industry compliance requirements and key revocation for data destruction. Additionally, software-defined keys embedded within the data itself eliminates the need for costly external hardware bulk key stores, and makes managing your keys far less cumbersome.
Be compliance and audit ready with SPxSHARC ll. Real time logging ensures all notices are properly logged and forwarded. Based on policy definitions, the reliable eventing feature captures, flags, and forwards specified or all data accessed – seamlessly integrating with existing SIEMs.
A centralized management console provides a single vantage point to deploy, monitor and update all instances of SPxSHARC ll across your enterprise. Easily define and manage policies, initialize and update provisioning of agents, data and system life cycle management, policy log aggregation and key management— all in one place. Solutions are easily deployable via an OVA, other virtual environments, or bare metal servers.
SPxSHARC ll features and functions enabling business benefits.
Fine-grained Policy Definition
Fine-grained with cryptographic separation.
Policies can be defined down to the individual file level if you choose, a feature that gives you robust options for your data access strategy.
Privileged Access Management
Eliminate admins from seeing clear text.
Restrictions can be placed on privileged users, system admins and root users, via policy to eliminate their ability to see clear text data. This feature provides complete privacy in the cloud as the service provider cannot view the data you entrust them with.
Who, what, when, where and how.
Customer-defined roles (user, group, process) gives permissions to only those needing data access as defined by an organizations' policy.
Separation of Duties
Distinct administrator roles.
Two distinct administrator roles, a System Administrator and a Security Administrator) gives an extra layer of protection since an additional and separate approval is required before agents and policies can be approved and deployed.
Least Privileged Access
Access to only what is needed.
Least privileged access controls allow you to give access to the data only necessary for the job and not a bit more, ultimately mitigating insider threat risks.
Single pane of glass virtual console.
A centralized virtual management console gives you a single vantage point to deploy, monitor and update all instances of SPxSHARC ll across your enterprise.
Protection for volume, file, or hybrid.
With versatility of volume, file or hybrid agent functionality, data is protected from the point of creation to the storage environment.
Maintain direct control of data and data access.
Inherent features lets you rest assured that data is completely confidential in any environment. Restrictions can be placed on privileged users via policy to eliminate their ability to see clear text data, ensuring complete confidentiality when entrusting your data to a cloud service provider.
Scalable to your environment.
No matter industry or business size, SPxSHARC II can be tailored to specific requirements, with scalability features independent of data storage environment.
Encryption can be as fast as clear text.*
Using a combination of AES-256 certified encryption and cryptographic splitting, the product provides “provably secure” data protection with performance as fast as clear text.
We have the perfect fit for your data challenges.
No matter your industry or size, SPxSHARC ll can be tailored to your specific requirements, with scalability features independent of data storage environment.
With SPxSHARC ll policy, cloud provider admins and root users can be restricted, giving you complete privacy in cloud and hybrid cloud environments. With provable security for your data, cloud adoption has never been more in reach.
Managing vendor access to data has never been easier with SPxSHARC ll. Robust policy management controls allow vendors to see only the data you want them to see and makes secure collaboration a reality.
SPxSHARC ll allows you to restrict suppliers to specific system functions and give access permissions to only specified data, providing visibility management, control and security in a multi-supplier access environment across your supply chain.