Risk

9/10/2008
02:55 PM
50%
50%

IBM Unveils Hardware-Based Encryption Tool

System x Vault protects data when a server's hard drive is disposed or stolen, without affecting server performance.

IBM on Wednesday introduced a hardware-based encryption tool to secure data on a System x server's hard drive.

The System x Vault is aimed at small and midsize businesses. The tool provides a simple way for SMBs to protect data when a hard drive is improperly disposed or a computer is stolen, IBM said.

The adapter tool is easy to install with step-by-step prompts, IBM said. When the technology is installed, users designate a security key, which is essentially a password. The key becomes the only way data can be accessed. The System x Vault, which costs about $1,000, offers four levels of security.

IBM said the tool makes it possible for SMBs to dispose of hard drives without the added cost of having the data erased. In addition, because Vault is hardware-based data encryption, it doesn't affect server performance like software-based encryption, IBM said.

"The new IBM Vault solution directly responds to our clients' concerns over data security, securely protecting their data without adding much in the way of complexity to their existing operations," James Northington, VP of IBM System x, said in a statement.

The Vault adapter will be available through IBM and its resellers this month for System x models x3650, x3400, and x3500. Pricing starts at $1,099.

IBM System x servers are available in tower and rack-mount form factors. The x3400 and x3500 are tower servers that use either two quad- or dual-core Intel Xeon processors. The x3400 is available with up to 32 GB of memory and the x3500 with 48 GB of memory. Prices start at $1,606 for the x3400 and $1,922 for the x3500.

The x3650 is a 2U rack-mount server that also uses up to two dual- or quad-core Intel Xeon chips. The server offers up to 48 GB of memory. Prices start at $2,486.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-7268
PUBLISHED: 2018-05-21
MagniComp SysInfo before 10-H81, as shipped with BMC BladeLogic Automation and other products, contains an information exposure vulnerability in which a local unprivileged user is able to read any root (uid 0) owned file on the system, regardless of the file permissions. Confidential information suc...
CVE-2018-11092
PUBLISHED: 2018-05-21
An issue was discovered in the Admin Notes plugin 1.1 for MyBB. CSRF allows an attacker to remotely delete all admin notes via an admin/index.php?empty=table (aka Clear Table) action.
CVE-2018-11096
PUBLISHED: 2018-05-21
Horse Market Sell & Rent Portal Script 1.5.7 has a CSRF vulnerability through which an attacker can change all of the target's account information remotely.
CVE-2018-11320
PUBLISHED: 2018-05-21
In Octopus Deploy 2018.4.4 through 2018.5.1, Octopus variables that are sourced from the target do not have sensitive values obfuscated in the deployment logs.
CVE-2018-8142
PUBLISHED: 2018-05-21
A security feature bypass exists when Windows incorrectly validates kernel driver signatures, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1035.