Risk
9/10/2008
02:55 PM
50%
50%

IBM Unveils Hardware-Based Encryption Tool

System x Vault protects data when a server's hard drive is disposed or stolen, without affecting server performance.

IBM on Wednesday introduced a hardware-based encryption tool to secure data on a System x server's hard drive.

The System x Vault is aimed at small and midsize businesses. The tool provides a simple way for SMBs to protect data when a hard drive is improperly disposed or a computer is stolen, IBM said.

The adapter tool is easy to install with step-by-step prompts, IBM said. When the technology is installed, users designate a security key, which is essentially a password. The key becomes the only way data can be accessed. The System x Vault, which costs about $1,000, offers four levels of security.

IBM said the tool makes it possible for SMBs to dispose of hard drives without the added cost of having the data erased. In addition, because Vault is hardware-based data encryption, it doesn't affect server performance like software-based encryption, IBM said.

"The new IBM Vault solution directly responds to our clients' concerns over data security, securely protecting their data without adding much in the way of complexity to their existing operations," James Northington, VP of IBM System x, said in a statement.

The Vault adapter will be available through IBM and its resellers this month for System x models x3650, x3400, and x3500. Pricing starts at $1,099.

IBM System x servers are available in tower and rack-mount form factors. The x3400 and x3500 are tower servers that use either two quad- or dual-core Intel Xeon processors. The x3400 is available with up to 32 GB of memory and the x3500 with 48 GB of memory. Prices start at $1,606 for the x3400 and $1,922 for the x3500.

The x3650 is a 2U rack-mount server that also uses up to two dual- or quad-core Intel Xeon chips. The server offers up to 48 GB of memory. Prices start at $2,486.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2184
Published: 2015-03-27
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.

CVE-2014-3619
Published: 2015-03-27
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.

CVE-2014-8121
Published: 2015-03-27
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over...

CVE-2014-9712
Published: 2015-03-27
Websense TRITON V-Series appliances before 7.8.3 Hotfix 03 and 7.8.4 before Hotfix 01 allows remote administrators to read arbitrary files and obtain passwords via a crafted path.

CVE-2015-0658
Published: 2015-03-27
The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on the local network, aka Bug ID CSCur14589.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.