Welcome!

News Feed Item

Protegrity Announces Record-Breaking Growth in FY 2012; License Revenue Increases 175 Percent Over 2011

Demand Builds for Protegrity's Vaultless Tokenization Solution; Expands to Payments Industry and Big Data Providers

STAMFORD, CT -- (Marketwire) -- 02/06/13 -- Protegrity USA, Inc., a leading provider of end-to-end data security solutions, today announced the most successful year in the company's history for the fiscal year ending Dec. 31, 2012 (FY12). Headlining the financial achievements is a 175 percent year-over-year increase in license revenues from FY 2011 to FY 2012. Total revenue from all sources for the fiscal year increased by 69 percent compared to the previous year and is clear evidence of a strong surge in demand for Protegrity's enterprise-wide data security. Corporations are looking to Protegrity for a solution that delivers superior performance, scalability, and transparency to protect sensitive data across the enterprise from malicious hackers and insider threats.

"2012 was a very exciting year for us, with breakthrough sales into some major global players, particularly in payment processing and financial services, and 2013 promises to be substantially better than 2012," says Suni Munshani, Protegrity USA CEO. "The sheer volume of data being created today is far exceeding organizations' ability to store it securely, so there is a greater sense of urgency among these organizations to identify and protect the most critical data."

Customer Momentum

Big data and a rapid increase in the volume of digital financial transactions has been a major growth driver for Protegrity over the past twelve months. Organizations are applying the same standards of data security to health and other personally-identifiable information as they do to financial information. The company has also seen significant growth in demand for its data security solutions and services across all industries and broad geographies. Protegrity's focus is on Global 1000 businesses, and has more than 200 customers worldwide, and average contract value increased 188% year-over-year compared to 2011.

Payment Processor Partnership

In the summer of 2012, Elavon, a leading provider of end-to-end payment processing services, selected Protegrity Vaultless Tokenization technology as a key element of the company's SAFE-T Suite solution [www.safetsuite.com]. SAFE-T Suite helps companies protect cardholder data by utilizing a combination of EMV (chip-and-PIN), point-to-point encryption, and tokenization technologies. In addition to realizing the benefits of reduced PCI scope with Protegrity's advanced tokenization, merchants using Elavon's solution achieve seamless business process continuity by providing advanced protection for individual cardholder data without sacrificing the ability to mine and analyze transaction processing data in close to real time.

"We are consistently looking to bring the highest level of security to our customers," said Robert McMillon, vice president, Global Security Solutions, Elavon. "Protegrity's tokenization technology is a key component of our end-to-end solution that helps merchants protect sensitive data throughout the transaction lifecycle: while it is in use, in transit, and at rest."

Big Data Security

Big Data has become a significant management challenge for many organizations. As Securosis analyst Adrian Lane notes "Hadoop, Mongo, Couch and Riak have almost no built-in security capabilities, leaving data exposed on every storage node." In early 2012, Protegrity announced the availability of the Protegrity Big Data Protector to deliver comprehensive data protection to Apache™ Hadoop®, Teradata Aster, Cloudera, and other big data platforms. This custom-designed protection allows customers to perform complex business analysis on massive amounts of data without jeopardizing its integrity or security, eliminating the serious risks and liabilities associated with unprotected sensitive data.

FY 2012 Highlights Summary:

  • 175 percent year-over-year license revenue growth
  • 69 percent year-over-year growth in all revenue items combined
  • 188 percent year-over-year increase in average contract value
  • Released version 6.0 of the Protegrity Data Security Platform, with advances in the patent-pending Vaultless Tokenization engine
  • Developed first comprehensive data security solution for Big Data environments
  • Established presence in Payments Industry
  • Global wins with the world's largest companies in retail, banking, business services, aerospace and defense, insurance, travel and transportation

About Protegrity

Headquartered in Stamford, Conn., Protegrity provides high performance, infinitely scalable, end-to-end data security solutions that protect sensitive information across the enterprise from the point of acquisition to deletion. The company's award winning software products span a variety of data protection methods, including end-to-end encryption, tokenization, masking and monitoring and are backed by several important data protection technology patents. Currently, more than 200 enterprise customers worldwide rely on Protegrity's comprehensive data security solutions to enable compliance for PCI DSS, HIPAA and other data security requirements while protecting their sensitive data, brand, and business reputation. For more information, please visit http://www.protegrity.com.

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web ...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Phil Hombledal, Solution Architect at CollabNet, discussed how customers are able to achieve a level of transparency that e...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...