Click here to close now.


News Feed Item

Protegrity Announces Record-Breaking Growth in FY 2012; License Revenue Increases 175 Percent Over 2011

Demand Builds for Protegrity's Vaultless Tokenization Solution; Expands to Payments Industry and Big Data Providers

STAMFORD, CT -- (Marketwire) -- 02/06/13 -- Protegrity USA, Inc., a leading provider of end-to-end data security solutions, today announced the most successful year in the company's history for the fiscal year ending Dec. 31, 2012 (FY12). Headlining the financial achievements is a 175 percent year-over-year increase in license revenues from FY 2011 to FY 2012. Total revenue from all sources for the fiscal year increased by 69 percent compared to the previous year and is clear evidence of a strong surge in demand for Protegrity's enterprise-wide data security. Corporations are looking to Protegrity for a solution that delivers superior performance, scalability, and transparency to protect sensitive data across the enterprise from malicious hackers and insider threats.

"2012 was a very exciting year for us, with breakthrough sales into some major global players, particularly in payment processing and financial services, and 2013 promises to be substantially better than 2012," says Suni Munshani, Protegrity USA CEO. "The sheer volume of data being created today is far exceeding organizations' ability to store it securely, so there is a greater sense of urgency among these organizations to identify and protect the most critical data."

Customer Momentum

Big data and a rapid increase in the volume of digital financial transactions has been a major growth driver for Protegrity over the past twelve months. Organizations are applying the same standards of data security to health and other personally-identifiable information as they do to financial information. The company has also seen significant growth in demand for its data security solutions and services across all industries and broad geographies. Protegrity's focus is on Global 1000 businesses, and has more than 200 customers worldwide, and average contract value increased 188% year-over-year compared to 2011.

Payment Processor Partnership

In the summer of 2012, Elavon, a leading provider of end-to-end payment processing services, selected Protegrity Vaultless Tokenization technology as a key element of the company's SAFE-T Suite solution []. SAFE-T Suite helps companies protect cardholder data by utilizing a combination of EMV (chip-and-PIN), point-to-point encryption, and tokenization technologies. In addition to realizing the benefits of reduced PCI scope with Protegrity's advanced tokenization, merchants using Elavon's solution achieve seamless business process continuity by providing advanced protection for individual cardholder data without sacrificing the ability to mine and analyze transaction processing data in close to real time.

"We are consistently looking to bring the highest level of security to our customers," said Robert McMillon, vice president, Global Security Solutions, Elavon. "Protegrity's tokenization technology is a key component of our end-to-end solution that helps merchants protect sensitive data throughout the transaction lifecycle: while it is in use, in transit, and at rest."

Big Data Security

Big Data has become a significant management challenge for many organizations. As Securosis analyst Adrian Lane notes "Hadoop, Mongo, Couch and Riak have almost no built-in security capabilities, leaving data exposed on every storage node." In early 2012, Protegrity announced the availability of the Protegrity Big Data Protector to deliver comprehensive data protection to Apache™ Hadoop®, Teradata Aster, Cloudera, and other big data platforms. This custom-designed protection allows customers to perform complex business analysis on massive amounts of data without jeopardizing its integrity or security, eliminating the serious risks and liabilities associated with unprotected sensitive data.

FY 2012 Highlights Summary:

  • 175 percent year-over-year license revenue growth
  • 69 percent year-over-year growth in all revenue items combined
  • 188 percent year-over-year increase in average contract value
  • Released version 6.0 of the Protegrity Data Security Platform, with advances in the patent-pending Vaultless Tokenization engine
  • Developed first comprehensive data security solution for Big Data environments
  • Established presence in Payments Industry
  • Global wins with the world's largest companies in retail, banking, business services, aerospace and defense, insurance, travel and transportation

About Protegrity

Headquartered in Stamford, Conn., Protegrity provides high performance, infinitely scalable, end-to-end data security solutions that protect sensitive information across the enterprise from the point of acquisition to deletion. The company's award winning software products span a variety of data protection methods, including end-to-end encryption, tokenization, masking and monitoring and are backed by several important data protection technology patents. Currently, more than 200 enterprise customers worldwide rely on Protegrity's comprehensive data security solutions to enable compliance for PCI DSS, HIPAA and other data security requirements while protecting their sensitive data, brand, and business reputation. For more information, please visit

Add to Digg Bookmark with Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at, explored the value of Kibana 4 for log analysis and provided a hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He examined three use cases: IT operations, business intelligence, and security and compliance. Asaf Yigal is co-founder and VP of Product at log analytics software company In the past, he was co-founder of social-trading platform Currensee, which...
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
Countless business models have spawned from the IaaS industry – resell Web hosting, blogs, public cloud, and on and on. With the overwhelming amount of tools available to us, it's sometimes easy to overlook that many of them are just new skins of resources we've had for a long time. In his general session at 17th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, an IBM Company, broke down what we have to work with, discussed the benefits and pitfalls and how we can best use them ...
Most of the IoT Gateway scenarios involve collecting data from machines/processing and pushing data upstream to cloud for further analytics. The gateway hardware varies from Raspberry Pi to Industrial PCs. The document states the process of allowing deploying polyglot data pipelining software with the clear notion of supporting immutability. In his session at @ThingsExpo, Shashank Jain, a development architect for SAP Labs, discussed the objective, which is to automate the IoT deployment proces...
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, rich desktop and tuned mobile experiences can now be created with a single codebase – without compromising functionality, performance or usability. In his session at DevOps Su...
As organizations realize the scope of the Internet of Things, gaining key insights from Big Data, through the use of advanced analytics, becomes crucial. However, IoT also creates the need for petabyte scale storage of data from millions of devices. A new type of Storage is required which seamlessly integrates robust data analytics with massive scale. These storage systems will act as “smart systems” provide in-place analytics that speed discovery and enable businesses to quickly derive meaningf...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, explored the key ingredients of cross-channel marketing in a digital world. Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects).
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Sam McIntyre, Partner Enablement Specialist at eFolder, presented how organizations can use eFolder Cloudfinder to automate backups of cloud application data. He also demonstrated how easy it is to search and restore cloud application data using Cloudfinder.
The Internet of Everything is re-shaping technology trends–moving away from “request/response” architecture to an “always-on” Streaming Web where data is in constant motion and secure, reliable communication is an absolute necessity. As more and more THINGS go online, the challenges that developers will need to address will only increase exponentially. In his session at @ThingsExpo, Todd Greene, Founder & CEO of PubNub, exploreed the current state of IoT connectivity and review key trends and t...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessi...