29
Fri, Nov
0 New Articles

Product Review: BOSaNOVA Q3

Product Reviews
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

It sometimes seems as though we can't get through a week without reading a news story—frequently topped with a blaring headline—about critical data being lost by or stolen from a large company or government agency. Customer data, including credit card information, is stolen from a retail chain. A large organization compromises thousands of employees' confidential information. A government department mislays copies of taxpayer data. A big corporation loses a tape containing financial data and social security numbers for millions of customers. A healthcare organization mislays storage media containing private health-related information and identifying data for thousands of people. The stories keep coming, each often more frightening than the previous.

With the increased focus on security issues these days, those organizations that weren't vigilant in protecting data in the past are moving in that direction rapidly and aggressively. As an added, powerful impetus, if organizations don't take vigorous actions to secure their data and systems, their executives may find themselves in jail for up to 10 years, and the organization and/or the responsible employees may incur penalties amounting to millions of dollars. This is a result of a growing list of strict regulations in the United States and around the world that make data security and privacy protection a legal requirement for most enterprises. Among the American laws that contain clauses dictating data privacy and security are the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Sarbanes-Oxley Act of 2002 (SOX), the California Security Breach Information Act of 2003 (CA SB 1386), the Fair and Accurate Credit Transaction Act of 2003 (FACTA), and the Gramm-Leach-Bliley Act of 1999 (GBLA).

To address their business and regulatory data privacy and security needs, organizations install firewalls that are as close to bulletproof as possible while still allowing legitimate access to their systems. They use 128-bit security on their Web sites wherever appropriate. They put security software in place to validate every transaction and user. They impress upon their employees and other system users the importance of choosing impossible-to-guess passwords, safeguarding them scrupulously, and changing them regularly. They encrypt data on devices that may migrate outside the firewall, such as notebook computers. Instead of or in addition to passwords, they might use biometric recognition for applications with particularly high security requirements. Despite these strenuous and wide-ranging efforts to implement rigorous precautions, organizations frequently forget one thing. These measures protect online data, but companies generally keep a copy, and often multiple copies, of absolutely all of their vital data on offline tape. In most cases, those tapes receive nowhere near as high a level of protection as online data, despite the fact that the online and offline media contain the same data and, therefore, have identical privacy and security requirements.

For most companies, tape is—and for the foreseeable future, will be—the last line of defense to protect critical data from loss due to disasters, storage media failures, or human error. And for some organizations, tape is the first and only line of defense. These backup tapes are usually shipped, possibly using commercial courier services, to locations that may or may not be under the company's control. Along the way, the tapes often receive little or no protection from loss or theft. Because the data on them is typically unencrypted, if the tapes fall into the wrong hands, an unscrupulous individual is free to read all of the data on them at will. Any stringent measures that the organization has put in place to secure its networks, systems, and online data do not protect the privacy and security of any data written to these offline tapes, tapes that typically contain a complete backup of all of the organization's customer, employee, sales, and other sensitive data.

It will be many years before most organizations will feel comfortable eliminating tape backups. In the meantime, those tapes must be protected. One answer is the BOSaNOVA Q3 storage encryption appliance, which eliminates the security threat created by tape backups.

Data Encryption Appliance

The Q3 device sits between a host system and a tape drive or library, with an Ultra Fast Wide SCSI LVD, S/E or HVD (differential) interface linking the tape device to the Q3 unit and the Q3 unit to the host system. When it is powered on, Q3 automatically detects the SCSI ID of the tape device and assumes that ID. Thus, to the operating system, the Q3 device looks exactly like the tape device, thereby rendering Q3 transparent to and independent of the operating system.

With a Q3 unit in place, data written to the attached tape device first passes through the Q3 unit. Q3 then encrypts the data and pre-compresses it before writing it to tape.

Key Protection

Q3 splits incoming data into two streams and independently encrypts each stream, using interlaced Dual-DES or Dual-DES3 encryption. The use of 112-bit encryption allows for more than 52 decillion—that's 52 with 32 zeroes after it—keys for each stream. Because the two streams are encrypted separately and then merged, decryption requires both keys (in addition to the encryption chip, which is also required.) If deemed appropriate, you can entrust responsibility for each key to different people so that gaining unauthorized access to the data would require collusion between at least two people.

Once entered, the two encryption keys are stored in the Q3 unit, allowing it to run unattended. The device is password-protected so that keys cannot be entered and the configuration cannot be changed without the password. If the Q3 device is disconnected, the software encryption keys are lost after the unit has been without power for more than two minutes. Consequently, if the device is stolen, the thief cannot gain access to the passwords.

Hardware Protection

Software encryption keys aren't the only protection that Q3 offers. Each Q3 comes with a unique encryption code chip. Tapes can be decrypted only on a device with a chip identical to the one that was used to create the tapes. Thus, even if someone should gain access to a tape and manage to get a hold of the encryption keys, he or she still won't be able to read the data on the tape.

BOSaNOVA ships a duplicate encryption chip with each Q3. BOSaNOVA recommends that customers send the duplicate chip offsite. Then, if a disaster destroys the data center, the chip on a Q3 unit at a recovery site can be replaced with that duplicate chip, allowing the encrypted tapes to be read so the data on them can be loaded onto a backup system. Should such a disaster occur, BOSaNOVA will immediately ship a replacement device to the recovery site, or to reduce recover times, you can buy a second Q3 and keep it at your disaster recovery site.

The duplicate chip also provides backup should the operational chip fail. If the duplicate chip needs to be used to replace a failed operational chip or to recover from a disaster, BOSaNOVA can have a replacement chip created so that you'll always have a backup on hand.

No Strain on Host Resources

The Q3 is a small device that comes in desktop and rack-mountable versions. The desktop version measures 14.2"(D) x 17.3"(W) x 4"(H). The rack-mountable version has a 1U form factor and measures 14.2"(D) x 20"(W) x 3.5"(H).

Because all of the encryption and pre-compression is performed by the Q3 device rather than by the host system, Q3 does not put any strain on the host system's resources. In fact, if the host system currently compresses data before writing it to tape, host resource usage may decline when the Q3 device takes over the compression work. Q3's dedicated compression chips are rated at 80 MB/sec. The device is capable of a sustained data rate of up to 72 MB/sec.

Easy Setup and Maintenance

Because Q3 looks like a tape drive or library to the host system and it looks like a host system to the tape device and because the Q3 device automatically detects and adopts the SCSI ID of the tape device, setup is essentially plug-and-play. Installation can often be completed in minutes.

Q3 offers a number of configuration options, all of which can be set using the provided GUI program. Once the cables have been connected and the configuration is complete, users enter their passwords using either a GUI program or a green-screen terminal to begin using the Q3 device to create encrypted tapes. For more information, contact BOSaNOVA or visit the Q3 Web site.

About BOSaNOVA, Inc.

BOSaNOVA is a privately held company headquartered in Phoenix, Arizona. The company is principally engaged in the design and development of security solutions, thin-client devices, and iSeries connectivity products. BOSaNOVA recently announced its new Security Solutions Groups, which include two new security products that were added to the existing line of award-winning thin-client and iSeries connectivity solutions. The newest solutions offered by BOSaNOVA include the Q3, a hardware encryption appliance to secure data at rest, and the iSecurity software suite for the iSeries. The company's products are sold through a worldwide network of IBM and CITRIX Business Partners. Industry affiliations include membership in IBM's PartnerWorld for Developers, Citrix Global Alliance Partner Program, and the Microsoft Partner Program.

Joel Klebanoff is a consultant, a writer, president of Klebanoff Associates, Inc., a Toronto, Canada-based marketing communications firm, and author of BYTE-ing Satire. Joel has 25 years experience working in IT, first as a programmer/analyst and then as a marketer. He holds a Bachelor of Science in computer science and an MBA, both from the University of Toronto.
http://www.mcpressonline.com/articles/images/2002/BOSaNOVA%20Q3%20product%20reviewV4--04020700.png
BOSaNOVA, Inc.
2012 W. Lone Cactus Drive
Phoenix, AZ 85027-9919
USA
Web: www.bosanova.net
Tel: 866.865.5250

Joel Klebanoff

Joel Klebanoff is a consultant, writer, and formerly president of Klebanoff Associates, Inc., a Toronto-based marketing communications firm. He has 30 years' experience in various IT capacities and now specializes in writing articles, white papers, and case studies for IT vendors and publications across North America. Joel is also the author of BYTE-ing Satire, a compilation of a year's worth of his columns. He holds a BS in computer science and an MBA, both from the University of Toronto.


MC Press books written by Joel Klebanoff available now on the MC Press Bookstore.

BYTE-ing Satire BYTE-ing Satire
Find out the hilarious answer to the eternal question: "Is technology more hindrance than help?"
List Price $14.95

Now On Sale

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: