Secure Data Center Environment with Cost-Effective Compliant Data security
HPE 3PAR Security enables secure data center environment with HPE 3PAR Storage system to deliver autonomous, secure, and policy-based systems within a single massively-scalable utility storage system.
Complies with Common Criteria Compliance, FIPS 140-2 Compliant Data-at-Rest Encryption, Security Technical Implementation Guide (STIG) Compliant 3PAR Operating System, Trade Agreement Act Compliant, Section 508 Standards, DIACAP/Risk Management, and Energy Star.
Allows organizations to enjoy the benefits of storage consolidation, including greater resource utilization, reduced administration, centralized backup and reduced energy and floor space consumption.
Once locked, specified storage volumes and copies cannot be affected, even by an HPE 3PAR StoreServ system administrator with the highest user privilege level.
Improved Quality-of-Service (QoS) Levels
HPE 3PAR Security enables a policy-based, secure data center environment that preserves the benefits of massively distributing and sharing each application workload across all system resources (ports, processors, cache, loops, and disk drives).
Secure, virtual implementation means that authorized users only have access to their domains and logical elements to which they have been granted access by an administrator, allowing you to deliver customized and secure storage by department or application.
Ideal for end users, internal or external service providers that must enable secure, consolidated, independent storage services to multiple administrators, applications, departments, and customers.
Control your Security and Retention Simply and Easily
HPE 3PAR Security enables a user-configurable retention period that enables individual storage volumes or copies to be locked for a specified period of time.
Prevents deliberate or inadvertent presentation of a volume outside its virtual domain, thereby protecting authorized administrators against errors and aiding compliance efforts.
Enables simple storage administrative tasks and monitoring tools to be turned over to system and application administrators in a “self-service” model that drives time and cost savings.