Secure storage hardware with built-in data protection for fund management environments. Features always-on encryption, secure erasure, non-disruptive upgrades, and data reduction. Designed to help meet compliance requirements while maintaining performance for financial analytics and reporting.
Physical security devices such as biometric access controls, secure servers, and encrypted storage solutions to protect sensitive client and investment data.
More Data Privacy and Security Hardware
More Risk & Compliance ...
Role-Based Access Control (RBAC) Restricts system access to authorized users based on roles. |
Enterprise storage management commonly requires RBAC and Pure FlashArray documentation indicates AD/LDAP integration and role-based controls. | |
Multi-Factor Authentication (MFA) Requires multiple factors to verify user identity before granting access. |
Admin console, cloud, and support enable two-factor authentication for admin access. | |
Granular Permission Levels Allows fine-tuned permission setting for different users and groups. |
Granular roles such as admin, operator, and auditor are part of access model. | |
Session Timeout Automatic log-off after a period of inactivity to prevent unauthorized access. |
Session timeout is typical for web GUI and CLI of enterprise storage; Pure documentation mentions inactivity timeout. | |
Single Sign-On (SSO) Integration Integration with SSO providers for unified authentication across platforms. |
Pure integrates with SAML/SSO via Okta and other identity platforms (as per admin guides). | |
Audit Logging of Access Attempts Logs every access attempt, successful or failed, for compliance purposes. |
Audit logs for system and access are standard and described in technical documentation. | |
Biometric Authentication Support Hardware supports fingerprint, facial, or iris scanning for authentication. |
No information available | |
Remote Lockout Capability Enables the system to remotely lock hardware in case of detected threat or unauthorized attempt. |
Remote lockout achievable via remote access disabling and remote support integrations. | |
Onboarding Approval Workflows Requires multiple parties to approve new access requests or changes. |
Pure’s onboarding and access model involves approval workflows as described for enterprise deployments. | |
Access Attempt Rate Limiting Limits the number of login attempts in a given time frame. |
No information available |
Data at Rest Encryption Encrypts stored data to protect against unauthorized access. |
Data at rest encryption is enabled by default using hardware encryption. | |
Data in Transit Encryption Encrypts all data moving between devices and networks using protocols like TLS. |
Pure FlashArray supports TLS for data in transit between array and clients. | |
Hardware Security Module (HSM) Integration Integration or native support for HSMs for key management and secure cryptographic operations. |
HSM integration or native storage encryption modules are referenced in product security whitepaper. | |
End-to-End Encryption Capability Supports comprehensive encryption of data from source to destination. |
End-to-end encryption from host to array is featured; Pure documentation describes comprehensive encryption. | |
Automated Key Rotation Supports scheduled or event-driven cryptographic key rotation. |
Automated key rotation is supported as part of security best practices. | |
Secure Key Storage Uses dedicated secure storage for cryptographic keys, isolated from general storage. |
Cryptographic keys are stored securely, isolated from user and admin access. | |
Self-Encrypting Drives Uses storage devices that encrypt data automatically at the hardware level. |
Self-encrypting drives are a foundational element of Pure FlashArray hardware. | |
Encryption Algorithm Configurability Ability to select from a range of modern encryption algorithms. |
No information available | |
Tamper-Proof Hardware Design Hardware physically prevents and/or logs attempts to access encrypted storage. |
Physical tamper protection and monitoring are part of certified storage platform hardware. | |
Data Wiping and Sanitization Secure and verifiable erasure of hardware data prior to decommissioning. |
Supports secure erasure (data sanitization) and certified wiping prior to disposal. |
Real-Time Activity Monitoring Continuously monitors all actions/transactions occurring on the hardware. |
Continuous real-time monitoring for system status and activity is featured. | |
Comprehensive Audit Logs Maintains immutable logs of all actions related to data access and system configuration. |
Comprehensive, immutable audit logs are maintained and can be exported. | |
Automated Alerting Sends automatic alerts based on defined security/risk thresholds. |
Automated alerting is supported for admin and security events. | |
Regulatory Compliance Reporting Generates reports conforming to specific regulations (e.g., GDPR, SEC). |
Compliance reporting for standards such as GDPR and PCI is referenced as a solution feature. | |
Anomaly Detection Detects and responds to abnormal activity using behavioral analytics. |
Anomaly detection and event alerting is supported through the management API and integrations. | |
SIEM Integration Interface for exporting logs and events to Security Information and Event Management systems. |
SIEM integration via syslog/SNMP and API access is described in Pure's documentation. | |
Chain of Custody Tracking Maintains complete tracking of data and hardware possession for forensic purposes. |
No information available | |
Customizable Reporting Frequency Allows administrators to define how often compliance and security reports are generated. |
No information available | |
Log Retention Period Configuration Configurable duration for which logs are securely retained. |
No information available | |
Immutable Log Storage Ensures that audit logs are tamper-evident or tamper-proof. |
Pure’s audit log is designed to be tamper-evident/immutable. |
Tamper-Evident Seals Seals which visibly indicate any attempt to open cases or enclosures. |
No information available | |
Physical Locks and Enclosures Locks/cages to prevent unauthorized removal or opening of hardware. |
Rack-mountable enclosures and lock support are available for FlashArray models for physical security. | |
Environmental Monitoring Sensors to detect changes in temperature, humidity, or presence of smoke/water near hardware. |
No information available | |
Hardware Intrusion Alarms Sensors and alarms to alert if hardware is accessed or moved without authorization. |
Hardware includes sensors for enclosure removal/trigger alarms. | |
Visitor Access Control Records and restricts physical access of visitors to hardware environments. |
No information available | |
Video Surveillance Integration Supports connection to CCTV or other video surveillance systems. |
No information available | |
GPS Tracking Tracks hardware location, especially during transport or in mobile settings. |
No information available | |
Secure Hardware Disposal Processes ensuring hardware is securely destroyed or wiped after end of use. |
End-of-life secure erasure and documented disposal procedures are referenced in product lifecycle materials. | |
Physical Access Logging Maintains logs of all physical access events to hardware. |
No information available | |
Secure Installation Requirements Mandates installation in secure, access-controlled environments. |
Secure data center installation requirements are listed in deployment guides for financial sector compliance. |
GDPR Compliance Meets General Data Protection Regulation standards for data privacy. |
GDPR compliance is a highlighted feature for European customers and referenced in use cases. | |
SOC 2 Certification Certified for Service Organization Control 2 for security, availability, confidentiality, etc. |
Pure Storage holds SOC 2 certification as per public trust centers. | |
ISO 27001 Certification Complies with global information security management standard. |
Pure Storage is ISO 27001 certified – listed in compliance resources on the website. | |
FIPS 140-2/FIPS 140-3 Validation Validates cryptographic security module per US government standards. |
FIPS 140-2 validated encryption is supported for FlashArray via firmware options. | |
PCI DSS Compliance Compliant with Payment Card Industry Data Security Standard if relevant. |
PCI DSS compliance is part of solution design for financial services storage segment. | |
SEC/FINRA Compliance Support Supports reporting and compliance for US financial regulatory bodies. |
SEC/FINRA support provided through compliance reporting modules and whitepapers targeting US financial sector. | |
Customizable Compliance Policy Engine Ability to tailor controls/policies for diverse regulatory needs. |
No information available | |
Automated Evidence Collection for Audits Automatically gathers and stores evidence needed for formal audits. |
No information available | |
Certification Expiry Notifications Notifies administration ahead of compliance/certification expiration. |
No information available | |
Audit Readiness Score Quantitative indicator of the product's current audit preparation. |
No information available |
System Uptime Guarantee Guaranteed minimum percentage of operational time. |
No information available | |
Mean Time Between Failures (MTBF) Predicts hardware reliability between failures. |
No information available | |
Self-Diagnostics Hardware runs continuous self-tests to detect faults. |
Self-diagnostics are core to Purity OS – described in public docs. | |
Redundant Power Supplies Multiple power supplies to reduce risk of downtime from power failure. |
Redundant hot-swappable power supplies standard on FlashArray models. | |
Hot Swappable Components Permits parts to be changed without shutting down the system. |
Hot-swappable storage, power supplies, fans, and controllers are defining features. | |
Disaster Recovery Support Integrates with disaster recovery plans and external storage. |
Integration with DR solutions, replication, and backup are supported. | |
Hardware Monitoring APIs Provides APIs to monitor hardware status and health remotely. |
REST API available for hardware monitoring and management. | |
Firmware Update Management Supports secure, remote updates to firmware for ongoing protection. |
Firmware update management is provided via Purity OS management and remote update. | |
Warranty Duration Duration hardware is covered under warranty. |
No information available | |
Rapid Spare Replacement Support Fast replacement service for failed hardware components. |
Rapid spare replacement and 4-hour mission-critical support is referenced in Pure's service plans. |
API Support Available APIs for integration with other risk/compliance and management software. |
REST API, SNMP, and syslog are available for integration. | |
Standard Protocol Support Supports industry-standard protocols (e.g., SNMP, Syslog, LDAP). |
Standard protocols including SNMP, syslog, LDAP/AD are supported. | |
SIEM/SOAR Integration Connectivity with security orchestration and event management solutions. |
Storage logs and alerts can be sent to SIEM/SOAR platforms for enterprise monitoring. | |
Direct Cloud Integration Ability to connect and synchronize with cloud compliance services. |
Direct cloud integration with AWS and Azure for backup, replication, and compliance. | |
Custom Connector Capability Enables creation/adaptation of custom connectors for unique environments. |
Custom connectors and plug-ins are provided via the toolkit and API support. | |
Multi-Vendor Hardware Support Operates alongside and interoperates with multiple hardware vendors. |
Pure can interoperate with multi-vendor environments as referenced in solution briefs. | |
Bulk Data Export/Import Can transfer historical or large data sets in/out for analysis or migration. |
Bulk data migration tools and export/import utilities available for enterprise customers. | |
Integration Setup Time Average time required to integrate with other core systems. |
No information available | |
REST/GraphQL Interface Availability Availability of REST or GraphQL interfaces. |
REST API available and documented for integration. | |
Plug-and-Play Compatibility Allows rapid deployment without custom engineering. |
Plug-and-play compatibility is a stated value proposition. |
Unified Management Console Central console for managing configuration, monitoring, and compliance. |
Web-based unified management dashboard is core to FlashArray. | |
Multi-Language Support User interface and documentation available in multiple languages. |
Multiple language support is available for management consoles and documentation. | |
Customizable Dashboards Tailor admin dashboards to key metrics relevant for risk/compliance. |
Dashboards are customizable as described in admin guides. | |
Interactive Tutorials In-situ interactive training built into the console. |
Interactive tutorials are embedded within the Pure1 management portal and online support. | |
Role-Based Views Displays different information depending on user role. |
Role-based management/UIs are featured for different admin types. | |
Mobile Device Management (MDM) Interface Allows some management from mobile devices securely. |
Mobile management via Pure1 mobile app. | |
Helpdesk Integration Built-in interface with support/helpdesk ticketing systems. |
Helpdesk integration via Pure1 Service Center. | |
Remote Management Tools Manage hardware from remote locations securely. |
Remote secure management enabled via Pure1 SaaS and CLI/API. | |
User Activity Insights Analytics on hardware and platform user activity. |
User activity analytics are included in Pure1 and admin dashboards. | |
Training & Certification Tracking Tracks user/admin completion of training and ongoing certifications. |
Training and certification status tracking available for admin users via online portals. |
Automated Incident Response Playbooks Predefined, automated responses to specific threats or compliance breaches. |
No information available | |
Secure Evidence Collection Ensures forensic evidence (logs, snapshots) is automatically and securely collected. |
No information available | |
Chain of Custody Management Tracks custody of evidence from collection to presentation. |
No information available | |
Incident Impact Assessment Tools Tools to quantify the risk and impact of a security compliance incident. |
No information available | |
Automated Containment Mechanisms Isolate affected hardware or systems automatically upon incident detection. |
No information available | |
Integrated Case Management Links evidence, actions, and outcomes in case files. |
No information available | |
Forensic Snapshot Takes cryptographically accurate, timestamped snapshots of system state. |
No information available | |
Incident Response Readiness Assessment Quantitative readiness score for incident response. |
No information available | |
Automated Notification to Authorities Built-in workflows for reporting significant incidents to regulators or stakeholders. |
No information available | |
Remediation Guidance Library Detailed guidance for remediating detected compliance/security incidents. |
No information available |
Clustered/Distributed Deployment Support Hardware can be deployed as part of clusters or distributed geographically. |
Clustered/distributed deployment supported for high availability and DR scenarios. | |
Modular Expansion Capability Enables incremental hardware upgrades without full replacement. |
Modular expansion is a hardware selling point and covered in Pure's product datasheets. | |
Supported Maximum Concurrent Users Maximum number of users/devices hardware can support simultaneously. |
No information available | |
Automated Load Balancing Dynamically distributes system load to prevent bottlenecks. |
Automated internal load balancing is managed by the array’s controllers. | |
Automated Deployment Tooling Tools/scripts for rapid and standardized deployment across environments. |
Deployment tools and scripts available for rapid rollout (including zero-touch options). | |
Zero-Touch Provisioning Hardware auto-configures with minimal manual intervention. |
Zero-touch provisioning is described in cloud-enabled deployment guides. | |
Resource Allocation Flexibility Assign and re-assign hardware resources to varying workloads. |
Pools and dynamic resource assignment to workloads are supported through management portal. | |
Multi-Tenancy Support Securely supports multiple organizational units or clients on a single hardware platform. |
Multi-tenancy is supported with secure partitions and access domains. | |
High Availability Clustering Ensures continuous operation with minimal failover time. |
High availability clustering is a critical feature included out of the box. | |
Deployment Time Average time required for initial hardware deployment. |
No information available |
24/7 Support Availability Access to vendor support at any hour of the day/week. |
24/7 global support referenced in Pure’s service agreements. | |
Transparent Vulnerability Disclosure Policy Vendor offers a clear and prompt channel for security vulnerability disclosures. |
Pure maintains a responsible vulnerability disclosure program. | |
Regular Security Patch Releases Vendor provides ongoing security patching with a documented schedule. |
Ongoing security patching update process (quarterly or as needed) described in customer communications. | |
Service Level Agreement (SLA) Formal SLA outlining response and resolution times for issues. |
Formal SLA documentation available as part of service contracts. | |
Signed Commitment to Data Privacy Vendor contractually commits to data privacy in contracts. |
Data privacy commitment by contract; highlighted for regulated customers. | |
Onsite Support Option Availability of support technicians to visit physical hardware locations. |
On-site support option available as detailed in Pure's service offering tiers. | |
User Community Portal Has an open user/support community for shared knowledge and peer assistance. |
User forums and community portal provided (Pure1 Community). | |
Transparency of Sub-Processors Vendor discloses all subcontractors and third parties involved. |
Sub-processor lists and transparency statements available on Pure’s compliance portal. | |
Proactive Risk Advisory Bulletins Vendor issues advisories for emerging risks before direct impact. |
Proactive advisories and threat bulletins communicated to customers. | |
Support Ticket Average Response Time Average time for first response on submitted support tickets. |
No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.