News Feed Item

CORRECTING and REPLACING Gazzang Unveils Encryption Solutions on AWS Platform

Please replace the release with the following corrected version due to multiple revisions.

The corrected release reads:


Expanded CloudEncrypt™ Suite Provides Encrypted Amazon Machine Images for Sensitive Workloads at Big Data Scale

Gazzang, the big data security experts, today at AWS Summit 2014 announced the availability of a set of preconfigured Amazon Machine Images (AMI) on the Amazon Web Services (AWS) platform that allow users to launch fully encrypted cloud instances from the AWS Management Console. The new Gazzang CloudEncrypt™ solutions were developed to help organizations securely move sensitive workloads into the cloud and grow their environments as business demands warrant.

“Security should be as agile and elastic as the cloud itself,” said Rich Mogull, analyst and CEO at Securosis. “Your security tools need to account for the highly dynamic nature of the cloud, where servers might pop up automatically and run for only an hour before disappearing forever.”

“We are taking a unique approach to cloud security by using encryption, key management and access controls to ensure the integrity of the image and protect the data itself,” said Sam Heywood, vice president of products and marketing at Gazzang. “And because the cloud isn’t static, we designed the solutions to take on the traits of the cloud they’re protecting. That means the CloudEncrypt AMIs can scale to meet business needs and are flexible enough to work across multiple cloud applications.”

The following products are now available worldwide from Gazzang:

Gazzang CloudEncrypt for Amazon EC2

AWS customers can launch a secure Ubuntu image and select from a variety of databases including MongoDB Enterprise Edition, MySQL and PostgreSQL (with Apache Hadoop and Cassandra coming soon). Each image contains the exact same security configurations at boot time to make it easier for a user to spin up new instances and add them to the existing cluster. Preconfigured security includes the following:

  • High-performance transparent data-at-rest encryption and key management to secure configuration and log files, directories and Amazon Elastic Block Storage (Amazon EBS) volumes
  • Access controls and Linux firewall settings preset to allow only certain approved processes to access encrypted data
  • HIPAA-compliant SSH login
  • Java API’s that enable users to encrypt and decrypt data moving into and out of Amazon Simple Storage Service (Amazon S3) and Amazon Glacier
  • Settings that require HTTPS, close unused ports, shut down unnecessary services and delete data on virtual machine termination

Gazzang CloudEncrypt for AWS Elastic Beanstalk

Each new application deployed with Gazzang CloudEncrypt for AWS Elastic Beanstalk will be wrapped with Gazzang security applied automatically.

Gazzang CloudEncrypt for StarCluster

Gazzang is bringing its unique approach to cloud security to enable organizations to deploy secure, large-scale compute clusters on Amazon EC2 using StarCluster. Now research organizations can run sensitive workloads - including ones in HIPAA scope - in the public cloud. In addition to the security features resident in Gazzang CloudEncrypt for Amazon EC2, CloudEncrypt for StarCluster includes master node encryption, slave node encryption and GlusterFS encrypted secure share.

“We are excited to see Gazzang expand their CloudEncrypt product offering to further complement AWS’ enterprise security capabilities, making it easier for customers to confidently deploy mission critical applications on AWS,” said Terry Wise, Director of Worldwide Partner Ecosystem, Amazon Web Services, Inc.

Last year, Gazzang launched CloudEncrypt for Amazon Elastic MapReduce (EMR), which provides data encryption and key management at every stage of the Amazon EMR data lifecycle.

About Gazzang

Gazzang provides data security solutions and expertise to help enterprises protect sensitive information and maintain performance in big data and cloud environments. Our technology enables SaaS vendors, health care organizations, financial institutions, public sector agencies and more to meet regulatory compliance initiatives, secure personally identifiable information and prevent unauthorized access to sensitive data and systems. The company is headquartered in Austin, Texas and backed by Austin Ventures and Silver Creek Ventures. For more information, visit www.gazzang.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
There is a huge demand for responsive, real-time mobile and web experiences, but current architectural patterns do not easily accommodate applications that respond to events in real time. Common solutions using message queues or HTTP long-polling quickly lead to resiliency, scalability and development velocity challenges. In his session at 21st Cloud Expo, Ryland Degnan, a Senior Software Engineer on the Netflix Edge Platform team, will discuss how by leveraging a reactive stream-based protocol,...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
The IoT Will Grow: In what might be the most obvious prediction of the decade, the IoT will continue to expand next year, with more and more devices coming online every single day. What isn’t so obvious about this prediction: where that growth will occur. The retail, healthcare, and industrial/supply chain industries will likely see the greatest growth. Forrester Research has predicted the IoT will become “the backbone” of customer value as it continues to grow. It is no surprise that retail is ...
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...