News Feed Item

HP Extends Persistent Data Protection From Data Center to Cloud With Encryption Innovations

New HP Atalla Solutions Help Safeguard Sensitive Data in Cloud, On-Premises and Mobile Environments Against Information Theft

LAS VEGAS, NV -- (Marketwired) -- 06/10/14 -- HP (NYSE: HPQ) today announced new encryption capabilities as well as information protection and control solutions that help safeguard data throughout its entire life cycle.

New HP Atalla solutions support data whether it's at rest, in motion or in use -- across cloud, on-premises and mobile environments -- to ensure continuous protection of an organization's most sensitive information.

Organizations face on average 122 successful attacks per week.(1) With this constant threat of attack, security teams are no longer driven by whether their organization will be breached, but rather by the assumption that it has already been breached -- leaving critical data exposed. To prevent sensitive information from being stolen in the aftermath of a network breach, organizations turn to encryption to proactively protect data as it travels on open networks or is stored in the cloud.

"As organizations embrace the New Style of IT, protecting sensitive information as it moves within and outside the enterprise becomes more critical than ever before," said Art Gilliland, senior vice president and general manager, Enterprise Security Products, HP. "Building on decades of leadership in information protection, we are now extending the scale and power of HP Atalla's encryption technology from the data center to the cloud -- safeguarding data regardless of where it resides."

Significance of encryption in data security
Building on HP's more than 35 years of innovation in encryption technology and market leadership in protecting trillions of dollars annually for nine out of 10 of the world's largest banks, new HP Atalla solutions deliver advanced protection for data stored on-premises and in the cloud, as well as unstructured data such as confidential emails, payment information and electronic health records. Designed for organizations that need to protect sensitive information, including financial institutions, retailers, energy companies, healthcare providers and governments, HP Atalla solutions provide added protection against the exposure of sensitive data while supporting optimal performance and flexibility.

"As the largest processor of Visa debit transactions globally, Visa Debit Processing Services is responsible for securing more than 23 billion debit transactions in the U.S. and prepaid transactions in the U.S. and Canada on an annual basis," said Chris James, senior vice president, Product Development, Issuer Processing, Visa Inc. "HP Atalla is a critical piece of our enterprise IT portfolio, delivering innovative security solutions with the operational excellence, performance and reliability that helps Visa DPS enable secure access to business-critical payment processing data."

Business-critical encryption key management for the datacenter
High-profile data breaches and stringent regulatory compliance requirements have triggered wide-spread adoption of data encryption. When data is encrypted correctly, it significantly reduces the risk of financial losses and damage to an organization's reputation. However, deploying several disparate or incompatible encryption tools can create hundreds of thousands of encryption keys, resulting in new security risks, poor performance and complex manageability.

HP Secure Encryption with HP Enterprise Secure Key Manager (ESKM) 4.0 unifies and automates encryption controls to prevent unauthorized access to sensitive data. HP ESKM 4.0 reduces the cost and complexity of managing encryption keys across a distributed infrastructure with consistent security controls, automated key services and a single point of management. Easily integrating with HP hardware solutions, including HP ProLiant Gen 8 Servers, it secures and manages encryption keys without slowing server performance. HP ESKM 4.0 also fully supports the OASIS Key Management Interoperability Protocol (KMIP), bringing open standards to encryption key management.

Removing encryption complexities for cloud workloads
As companies must embrace and adopt the new era of cloud computing, retaining control over sensitive data while realizing the benefits of the cloud are often competing concerns. To maintain control of sensitive data, organizations need the ability to encrypt and manage encryption keys even as the data is transferred to the cloud.

Deployed in minutes, HP Atalla Cloud Encryption reduces the complexity of encryption and key management in public, private and hybrid cloud environments with split-key encryption, a method for combining and splitting keys during the encryption process. In addition, customers can leverage integration with HP Enterprise Secure Key Manager to automatically manage and protect master keys on-premises in FIPS 140-2 Level 2 validated security appliances.

Persistent protection for unstructured data
With the consumerization of IT and the explosion of social media, it is estimated that 2.5 exabytes of new data is created every day(2) and the volume of new data is doubling every 12 to 18 months.(3) In fact, nearly 90 percent of the digital content being created includes unstructured data types, or human-generated information, such as documents, social content, video, audio and images.(3) As this mounting volume of unstructured data moves across and outside of enterprise networks, organizations must ensure persistent protection at every stage in its life cycle.

HP Atalla Information Protection and Control (IPC) software protects sensitive enterprise data at every stage of the data life cycle -- from creation to collaboration to storage. The software uses an information-centric encryption approach that applies persistent protection to follow the data throughout its life cycle, no matter where it resides. The encryption technology is easily incorporated into business processes without adding complexity or time consuming and costly integration.

HP Enterprise Security products and services are designed to disrupt the adversary at all stages of the threat life cycle, manage risk and extend customer security capabilities that comprehensively protect an enterprise. HP Atalla solutions are the first line of defense in data loss prevention, encrypting sensitive data as it is created and blocking an attacker from accessing the keys to unlock it.

HP Secure Encryption with centralized key management is available immediately worldwide by ordering the required HP ProLiant Gen 8 server HP Smart Storage options together with enterprise key management and client licenses from HP Atalla. Enterprises also can retrofit their compatible environments with the required HP Smart Array controllers to take advantage of this solution.

HP Atalla Cloud Encryption and HP Atalla Information Protection and Control (IPC) are available immediately worldwide.

New investment solutions are also available globally from HP Financial Services to help enterprises quickly embrace the power of HP Atalla and maintain cost control in their businesses through a simple and predictable financing option.(4)

Additional information about HP Atalla solutions is available at www.hp.com/go/atalla. Additional information about HP Enterprise Security Products is available at www.hpenterprisesecurity.com.

HP's annual enterprise security user conference, HP Protect, takes place September 8-11 in Washington, D.C.

About HP
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers' most complex challenges in every region of the world. More information about HP is available at http://www.hp.com.

(1) HP Ponemon Cost of Cyber Crime Study, September 2013.
(2) The Disruptive Power of Big Data, Vertica White Paper, November 2013.
(3) IDC Predictions 2012: Competing for 2020.
(4) Financing and service offerings available through Hewlett-Packard Financial Services Company and its subsidiaries and affiliates (collectively HPFSC) in certain countries and is subject to credit approval and execution of standard HPFSC documentation. Rates and terms are based on customer's credit rating, offering types, services and/or equipment type and options. Not all customers may qualify. Not all services or offers are available in all countries. Other restrictions may apply. HPFSC reserves the right to change or cancel this program at any time without notice.

© 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will discuss how customers are able to achieve a level of transparency that e...
SYS-CON Events announced today that Transparent Cloud Computing (T-Cloud) Consortium will exhibit at the 19th International Cloud Expo®, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The Transparent Cloud Computing Consortium (T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data proces...
Governments around the world are adopting Safe Harbor privacy provisions to protect customer data from leaving sovereign territories. Increasingly, global companies are required to create new instances of their server clusters in multiple countries to keep abreast of these new Safe Harbor laws. Is it worth it? In his session at 19th Cloud Expo, Adam Rogers, Managing Director of Anexia, Inc., will discuss how to keep your data legal and still stay in business.
Successful transition from traditional IT to cloud computing requires three key ingredients: an IT architecture that allows companies to extend their internal best practices to the cloud, a cost point that allows economies of scale, and automated processes that manage risk exposure and maintain regulatory compliance with industry regulations (FFIEC, PCI-DSS, HIPAA, FISMA). The unique combination of VMware, the IBM Cloud, and Cloud Raxak, a 2016 Gartner Cool Vendor in IT Automation, provides a co...
Today every business relies on software to drive the innovation necessary for a competitive edge in the Application Economy. This is why collaboration between development and operations, or DevOps, has become IT’s number one priority. Whether you are in Dev or Ops, understanding how to implement a DevOps strategy can deliver faster development cycles, improved software quality, reduced deployment times and overall better experiences for your customers.
Donna Yasay, President of HomeGrid Forum, today discussed with a panel of technology peers how certification programs are at the forefront of interoperability, and the answer for vendors looking to keep up with today's growing industry for smart home innovation. "To ensure multi-vendor interoperability, accredited industry certification programs should be used for every product to provide credibility and quality assurance for retail and carrier based customers looking to add ever increasing num...
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential. In his session at 19th Cloud Expo, John Mertic, director of program management for ODPi at The Linux Foundation, will explain why this is, how we can work together as an open data community to increase adoption, and the i...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...