Welcome!

Artificial Intelligence Authors: Zakia Bouachraoui, Liz McMillan, Yeshim Deniz, Elizabeth White, William Schmarzo

News Feed Item

New EMC Solution Enables Secure Data Access and Movement Between Clouds

EMC Secure Cloud On-Boarding Solution To Offer Trusted, Non-Disruptive Workload Migrations for Cloud Infrastructures Within and Between Data Centers

SAN FRANCISCO, Sept. 12, 2012 /PRNewswire/ -- INTEL DEVELOPER FORUM 2012--

News Summary:

  • New EMC Secure Cloud On-Boarding Solution will combine Intel® Trusted Execution Technology (TXT), RSA Archer and EMC VPLEX technologies, enabling service providers and enterprises to secure a cloud infrastructure at the hardware level.
  • New RSA Archer support for Intel TXT enables a service provider or enterprise to verify their cloud infrastructure to ensure workloads are on secure, trusted hosts and meet policy and compliance requirements.

Full Story:

At the Intel Developer Forum 2012, EMC Corporation (NYSE:EMC) today announced the EMC® Secure Cloud On-Boarding Solution, offering service providers and enterprises with key ingredients to securely migrate mission critical applications between Public, Private and Hybrid clouds. The solution, which will be available in early 2013, combines RSA® Archer eGRC compliance and reporting software with Intel TXT technology and EMC VPLEX® virtual storage for secure end-to-end workload migration within and between data centers.

Migrating mission-critical applications without causing downtime for end users or applications remains a top priority for service providers and enterprises deploying cloud infrastructures. The EMC Secure Cloud On-Boarding Solution offers all the components needed to do this quickly, securely and seamlessly. It does so by making sure the underlying hosts that virtual machines are running on are operating securely at multiple locations—and that regardless of what data center the workloads are migrated to, they will only run on trusted servers. Now Information Security Officers and Security Administrators will have an unprecedented view of the hardware trust status within a cloud infrastructure—regardless of location.

Solution Highlights:

The EMC Secure Cloud On-Boarding Solution offers solution providers and enterprises with:

  • Policy and Compliance: RSA's Solution for Cloud Security and Compliance, built on the RSA Archer eGRC platform, offers compliance reporting for cloud environments with over 130 VMware specific control procedures.  This allows customers to implement VMware security and policy management tied directly to regulations such as PCI and HIPAA.  With the addition of the Intel TXT control procedures to those already existing ones, security compliance is further enhanced by ensuring that the underlying servers running those virtual workloads have been verified against known good configurations, free of malware or rootkit hypervisors that typical runtime anti-virus applications might miss. By extending the compliance reporting to all data centers, these customers can gain a comprehensive high level view of their overall cloud compliance posture.  This ensures that when a customer's virtual machines are migrated, they are only moved to other trusted compute hosts within that cloud infrastructure environment.
  • Data Mobility: EMC VPLEX delivers storage federation and creates cooperating pools of storage resources. Federation enables IT to quickly and efficiently support the business through pools of resources that can be dynamically allocated. VPLEX enables dynamic, non-disruptive workload mobility between sites, allowing virtual distributed storage volumes to be created between multiple data centers, supports heterogeneous storage arrays and enables immediate data access.  VPLEX eliminates the need to migrate data from one site to another when workloads need to move, because the data already resides at the site to which the workload is moving.
  • Security: Intel TXT is a built-in security capability that is part of many systems based on the Intel® Xeon® processor E3, E5 and E7 families. Intel TXT can help ensure that a system is not compromised with malware or rootkit hypervisors by establishing a hardware-based root of trust. This hardware-based security solution helps protect IT infrastructure against software-based attacks by validating the behavior of key components within a system at startup.  Companies can securely realize operational efficiencies by making it easier to move virtual machines across clouds to trusted pools of "known good" servers. 

Intel Quote:

Jason Waxman, General Manager, Cloud Infrastructure Group, Intel Corporation

"The agility and efficiencies offered by cloud computing are attractive to IT decision makers, but security has been a major inhibitor for organizations moving their mission critical applications into a cloud. Intel is collaborating with EMC to strengthen cloud security and enable the VPLEX virtual storage component which is able to migrate workloads over distance to the cloud through its unique cache coherency technology, high data availability, and federation capabilities. We look forward to broad availability in early 2013, and continuing to work with EMC and RSA to enhance hardware-based security and compliance via Intel TXT with leading edge solutions."

EMC Quote:

Prasad Rampalli, Senior Vice President, Solutions Group, EMC Corporation

"Intel, EMC and RSA have collaborated to offer service providers and enterprises with the key components for building 'bullet proof' security in public, private and Hybrid clouds. Data security remains the #1 impediment to mission critical applications moving to the cloud. With today's news, Intel, EMC and RSA are now offering technologies that—together—ensure non-disruptive and secure workload migration within and between data centers." 

RSA Quote:

Manoj Nair, Vice President of Products Management, RSA, The Security Division of EMC

"Ensuring trust in the security of the underlying physical and virtual infrastructure is a pre-requisite for enterprises moving critical workloads to the cloud. We now have the ability to verify and report on the security compliance posture of servers in the virtual environment with the combined power of RSA Archer and Intel TXT. Together our companies are demonstrating that internal and external clouds can be secure, compliant, and auditable for the management of a company's most important business processes."

Availability:

The EMC Secure Cloud On-Boarding Solution is being tested with select service providers and enterprises to pilot a formal solution that will be available in early 2013. EMC VPLEX Metro is available today. Availability of RSA Archer support for Intel TXT will be generally available early in 2013.

Additional Resources:

  • Here is a Technical Presentation Showcasing the Solution
  • Here is an overview of Intel TXT
  • Here is an overview of EMC VPLEX
  • Here is information about RSA Archer's Solution for Cloud Security and Compliance
  • Connect with EMC via TwitterFacebook, YouTube, and LinkedIn

EMC, RSA, Archer and VPLEX are either registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners.

This release contains "forward-looking statements" as defined under the Federal Securities Laws.  Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to: (i) adverse changes in general economic or market conditions; (ii) delays or reductions in information technology spending; (iii) the relative and varying rates of product price and component cost declines and the volume and mixture of product and services revenues; (iv) competitive factors, including but not limited to pricing pressures and new product introductions; (v) component and product quality and availability; (vi) fluctuations in VMware, Inc.'s operating results and risks associated with trading of VMware stock; (vii) the transition to new products, the uncertainty of customer acceptance of new product offerings and rapid technological and market change; (viii) risks associated with managing the growth of our business, including risks associated with acquisitions and investments and the challenges and costs of integration, restructuring and achieving anticipated synergies; (ix) the ability to attract and retain highly qualified employees; (x) insufficient, excess or obsolete inventory; (xi) fluctuating currency exchange rates; (xii) threats and other disruptions to our secure data centers or networks; (xiii) our ability to protect our proprietary technology; (xiv) war or acts of terrorism; and (xv) other one-time events and other important factors disclosed previously and from time to time in EMC's filings with the U.S. Securities and Exchange Commission.  EMC disclaims any obligation to update any such forward-looking statements after the date of this release.

SOURCE EMC Corporation

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...