Welcome!

News Feed Item

Vormetric Builds in Support for Intel's Xeon Processor E7 v2 Family

- Vormetric's Compatibility with New Chip Sets Results in a 75% increase in Encryption Speed -

SAN JOSE, Calif., Feb. 18, 2014 /PRNewswire/ -- Vormetric, a leader in enterprise data security for physical, virtual and cloud environments, today announced fully integrated support for the latest line of Intel® Xeon® processor E7 v2 family. Vormetric's data security platform utilizes the new chip's AES-NI encryption enhancements to significantly boost performance and lower encryption times. Speed testing demonstrates that encryption performance increased by 75 percent when compared to the previous generation's processor. As a result, Vormetric customers using the latest Intel products will be able to meet compliance and regulatory requirements (such as PCI DSS 3.0 and HIPAA/HITECH) while minimizing encryption overhead.

(Logo: http://photos.prnewswire.com/prnh/20130626/SF38541LOGO)

Click to Tweet: 75% increase in Encryption Speed with @Intel #Xeon & @Vormetric #DataSecurity Platform http://bit.ly/1bJlGZc #DefenderofData

"Vormetric's close integration with Intel's new Intel® Xeon® processor E7 v2 family not only significantly reduces encryption time, but also enables our customers to meet contractual, regulatory and compliance requirements while sustaining the performance levels required by real-time business processes," said Ashvin Kamaraju, vice president of product development and partner management. "The Vormetric platform is optimized for Intel Data Protection Technology with AES-NI and Secure Key technology, as a result, strong data encryption does not result in unacceptable overhead."

The Intel Xeon family is ideal for in-memory computing, virtualization, cloud and big data environments.  These market leading products were created to meet the needs of the most intensive computing environments.  With customers concerned that any data storage overhead will impact Service Level Agreements (SLAs) for applications, Vormetric's use of Intel hardware acceleration provides the critical capability to meet business requirements to encrypt data with minimal performance impact.   

"Intel and Vormetric have a long-standing history of collaboration to deliver strong solutions that enable customers to protect critical data without unnecessary overhead," said Shannon Poulin, vice president of marketing for Intel's Data Center Group.  "Vormetric now takes full advantage of Intel Data Protection Technology with AES-NI and Secure Key that are features of our new Xeon Processor E7 v2 family, making it easy for customers to take advantage of this latest advance in Intel technology."

For more details of the performance testing, see the joint white paper "Security in the Cloud for SAP HANA" from Intel with SAP, Virtustream and Vormetric.

About Vormetric

Vormetric (@Vormetric) is the industry leader in data security solutions that span physical, virtual and cloud environments. Vormetric helps over 1300 customers, including 17 of the Fortune 25 and many of the world's most security conscious government organizations, to meet compliance requirements and protect what matters —their sensitive data —from both internal and external threats. The company's scalable solution protects any file, any database and any application — within enterprise data center, cloud, big data environments  — with a high performance, market-leading Vormetric Data Security Platform that incorporates application transparent encryption, access controls and security intelligence. Vormetric – because data can't defend itself.

Vormetric is a trademark of Vormetric, Inc.

SOURCE Vormetric

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...