Click here to close now.

Welcome!

News Feed Item

Vormetric Adds Application Encryption to Vormetric Data Security Platform

— Application Encryption compliments existing Transparent Encryption Offering –

Single Data Security Platform to manage more encryption use cases; Dramatically reduces cost and complexity of data encryption and key management within Big Data, Physical, Virtual and Cloud environments

SAN JOSE, California, Feb. 19, 2014 /PRNewswire/ -- Vormetric, the leader in enterprise data security for physical, virtual and cloud environments, today announced the expansion of their data protection products with a new solution, Vormetric Application Encryption. This new offering extends the Vormetric Data Security Platform with powerful capabilities for encrypting data within enterprise and web applications, as well as cloud and big data environments.

(Logo: http://photos.prnewswire.com/prnh/20130626/SF38541LOGO)

Click to tweet: Save Money and Time @Vormetric w/single #DataSecurity Platform for Application and File Encryption http://bit.ly/1bJlGZc #DefenderOfData

According to a recent study by the Ponemon Institute a comprehensive encryption strategy is being adopted by more organizations, primarily to assist in preventing data breaches and meeting compliance requirements. Key management is also a critical pain.

Vormetric solutions provide capabilities that enable organizations to meet compliance and regulatory mandates for encryption, such as PCI DSS 3.0 and HIPAA/HITECH, as well as helping them to prevent data breaches. Now available on a single, integrated platform and infrastructure set, these integrated encryption and key management solutions enable organizations to meet multiple sets of data encryption requirements, including:

  • Vormetric Transparent Encryption – Providing file and volume level encryption, key management, policy management, access control and security intelligence capabilities across physical, virtual, big data and cloud environments.  Transparent Encryption requires no changes to applications, infrastructure or operational procedures while providing strong data protection.
  • Vormetric Application Encryption – This new solution adds capabilities for applications and environments to encrypt selected data as needed.  A developer oriented solution, features include key management, APIs, interfaces and sample code that enable powerful, flexible control over what, how, where, when and by whom data is encrypted and decrypted. In turn, these features and controls allow customers to address extended data protection use cases, including encryption of specific database fields, files, customer specific data (even within multi-tenant, shared use applications), and other data-at-rest.  

The results of this single platform approach are greater efficiency and lower costs. Instead of multiple infrastructure sets, integrations, vendors, maintenance requirements, training, deployment and resource allocations, organizations can easily use Vormetric's single platform to meet multiple encryption use cases, saving both time and money.

"With the addition of Vormetric Application Encryption to the Vormetric Data Protection Platform, we have created a single, flexible, centralized capability for organizations to meet legal and industry governance requirements that mandate protection of data," said Alan Kessler CEO of Vormetric. "As malicious attacks, hacks and infiltrations increase in effectiveness and frequency, these new capabilities enable customers to extend their data protection environment directly into their most critical applications – defending their data at the source."

"With the recent expansion of threats, both compliance and legal regulation driven data protection requirements have grown, along with our customers' needs for data security. Vormetric customers have clearly expressed the need and desire for us to extend our Data Security Platform to protect critical applications. Vormetric Application Encryption is a direct response to this need. These new capabilities contribute to Vormetric's overarching mission: to provide an easily accessible, scalable solution to defend data wherever it resides."

About Vormetric

Vormetric (@Vormetric) is the industry leader in data security solutions that span physical, virtual and cloud environments. Vormetric helps over 1300 customers, including 17 of the Fortune 25 and many of the world's most security conscious government organizations, to meet compliance requirements and protect what matters — their sensitive data — from both internal and external threats. The company's scalable solution protects any file, any database and any application — within enterprise data center, cloud, big data environments — with a high performance, market-leading Vormetric Data Security Platform that incorporates application transparent encryption, access controls and security intelligence. Vormetric – because data can't defend itself.

Vormetric is a trademark of Vormetric, Inc

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In the midst of the widespread popularity and adoption of cloud computing, it seems like everything is being offered “as a Service” these days: Infrastructure? Check. Platform? You bet. Software? Absolutely. Toaster? It’s only a matter of time. With service providers positioning vastly differing offerings under a generic “cloud” umbrella, it’s all too easy to get confused about what’s actually being offered. In his session at 16th Cloud Expo, Kevin Hazard, Director of Digital Content for SoftL...
Agile, which started in the development organization, has gradually expanded into other areas downstream - namely IT and Operations. Teams – then teams of teams – have streamlined processes, improved feedback loops and driven a much faster pace into IT departments which have had profound effects on the entire organization. In his session at DevOps Summit, Anders Wallgren, Chief Technology Officer of Electric Cloud, will discuss how DevOps and Continuous Delivery have emerged to help connect dev...
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, will explore the IoT cloud-based platform technologies drivi...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society-changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his session at @ThingsExpo, Jason Mondanaro, Director, Product Management at Metanga, discussed how you can plan to cooperate, partner, and form lasting all-star teams to change the world...
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction. ...
Internet of Things is moving from being a hype to a reality. Experts estimate that internet connected cars will grow to 152 million, while over 100 million internet connected wireless light bulbs and lamps will be operational by 2020. These and many other intriguing statistics highlight the importance of Internet powered devices and how market penetration is going to multiply many times over in the next few years.
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of robomq.io, and Fred Yatzeck, principal architect leading product development at robomq.io, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at th...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of...
Malicious agents are moving faster than the speed of business. Even more worrisome, most companies are relying on legacy approaches to security that are no longer capable of meeting current threats. In the modern cloud, threat diversity is rapidly expanding, necessitating more sophisticated security protocols than those used in the past or in desktop environments. Yet companies are falling for cloud security myths that were truths at one time but have evolved out of existence.
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
The time is ripe for high speed resilient software defined storage solutions with unlimited scalability. ISS has been working with the leading open source projects and developed a commercial high performance solution that is able to grow forever without performance limitations. In his session at Cloud Expo, Alex Gorbachev, President of Intelligent Systems Services Inc., shared foundation principles of Ceph architecture, as well as the design to deliver this storage to traditional SAN storage co...
To many people, IoT is a buzzword whose value is not understood. Many people think IoT is all about wearables and home automation. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed some incredible game-changing use cases and how they are transforming industries like agriculture, manufacturing, health care, and smart cities. He will discuss cool technologies like smart dust, robotics, smart labels, and much more. Prepare...
"We provide a web application framework for building really sophisticated web applications that run on a browser without any installation need so we get used for biotech, defense, and banking applications," noted Charles Kendrick, CTO and Chief Architect at Isomorphic Software, in this SYS-CON.tv interview at @DevOpsSummit (http://DevOpsSummit.SYS-CON.com), held June 9-11, 2015, at the Javits Center in New York
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists addressed this very serious issue of pro...