Customer Profile
The customer is a global leader of innovative and comprehensive laboratory services. They help doctors, hospitals, pharmaceutical companies, researchers and patients make clear and confident decisions. They provide insights and advance science to improve health and improve lives through unparalleled diagnostics and drug development laboratory capabilities. The customer has clients in over 100 countries and worked on new drugs approved by the FDA.
USE CASE
Transparent Database Encryption, Code SigningINDUSTRY
HealthcarePRODUCTS
Business Challenge
Business Challenge
The customer was looking to improve data security and started with three related initiatives.
- Database Encryption. They needed to secure their databases, including Microsoft SQL Server and IBM DB2, initially and potentially others in the future.
- Centralized Key Management. They operate globally and were looking to centralize their key management to maintain consistent security practices across all locations and systems, starting with the database encryption keys.
- Disaster Recovery Preparedness. To enhance resilience and demonstrate their ability to recover from disasters, the customer was introducing new disaster recovery processes. Core to this recovery plan is key management, which ensures that encryption keys are secure and accessible during a crisis.
Fortanix Solutions
The customer chose Fortanix Data Security Manager (DSM) to manage data that is globally stored, utilized, and analyzed. Fortanix proved an especially good fit because it integrates with various applications improving their overall data security posture.
The customer operates a large production cluster of Fortanix DSMs consisting of 10 nodes, strategically distributed across five data centers worldwide, and uses DSM for the following capabilities.
- Transparent Database Encryption (TDE) to secure their data, specifically implemented in over 3500 Microsoft SQL Servers and IBM DB2 database environments.
- Code Signing with Microsoft Authenticode to ensure that software that is released is secure.
- Disaster Recovery Processes to ensure that data integrity and security are maintained while recovering from disasters. The processes include clear protocols for key management, ensuring that team members are equipped to handle recovery scenarios, and continuous testing of these processes to address any potential weaknesses.