|By Marketwired .||
|June 23, 2014 09:17 AM EDT||
STAMFORD, CT -- (Marketwired) -- 06/23/14 -- Protegrity, the world leader in enterprise data encryption and tokenization solutions, today announced the release of version 6.5.2 of the Protegrity Data Security Platform. This new release addresses developing industry trends, emerging new platforms, and incorporates customer feedback, in the fastest, most efficient and lightweight distribution to date.
"We're really excited about 6.5.2, with some of the new capabilities we've added for IBM PureData and Netezza, Hadoop 2.0 and YARN, and to the core software," said Yigal Rozenberg, VP Product Development. "There are also a number of significant improvements in usability to save security administrators time and make their jobs a little easier."
Recognizing increasingly strict regulations on the storage and use of sensitive data, in particular PCI DSS 3.0, Protegrity has implemented a number of new features to assist in meeting and exceeding the new standards, including:
- Two Factor Authentication Support for Secure System Login
- File Integrity Monitoring to Track Changes to Any Sensitive File or Configuration
- Improved Automated KEK Rotation with Centrally Driven, Push-Button Activation
- Upgraded Reporting Engine and Refined Audit Log Generation for Enhanced Forensics
Protegrity has also expanded support for a number of new platforms, most notably becoming the first vendor to provide comprehensive data security for IBM Netezza. Platform support has also been expanded for the Protegrity File Protector and the Protegrity Big Data Protector, which is now compatible with all distributions of Hadoop 2.X and YARN.
Demonstrating continued leadership in Big Data security innovation, in this new release Protegrity has unveiled the industry's first Extended HDFS Encryption, which utilizes native Hadoop infrastructure to deliver highly transparent file and folder encryption within HDFS.
"Protegrity is certainly unique in the level of security they can achieve within Big Data platforms while preserving data usability," said Scott Mellegaard, Big Data Practice Architect, Trace3. "They're on the forefront of Big Data security, in no small part due to Protegrity Vaultless Tokenization, which opens up avenues to securely work with sensitive data, and expose analytical value with minimal risk."
Incorporating customer feedback, continued improvements in the scalability, flexibility and performance of the core software of the Protegrity Data Security Platform include:
- Policy deployment upgraded to increase efficiency in extremely large scale environments
- Support for RESTful API added to Protection servers for simpler, more flexible web services
- User interface enhancements reduce time and effort on configuration and manual tasks
- Upgraded notification system provides more detailed alerts and faster resolutions
- Expanded tokenization format support to enable better business intelligence and data usability
Headquartered in Stamford, CT, Protegrity provides high performance, infinitely scalable, end-to-end data security solutions that protect sensitive information across the enterprise from the point of acquisition to deletion. The company's award-winning software products span a variety of data protection methods, including end-to-end encryption, Vaultless Tokenization, masking, and monitoring and are backed by several important data protection technology patents. Currently, more than 200 enterprise customers worldwide rely on Protegrity's comprehensive data security solutions to enable compliance for PCI DSS, HIPAA and other data protection mandates while protecting their sensitive data, brand, and business reputation. For more information, please visit www.protegrity.com.
Connect with Protegrity:
Read the blog: http://www.protegrity.com/news-resources/blog/
Follow us on Twitter: https://twitter.com/Protegrity
Follow us on LinkedIn: https://www.linkedin.com/company/protegrity
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of (at least) three separate application components: the software embedded in the device, the back-end service, and the mobile application for the end user’s controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target –...
Sep. 30, 2016 11:15 AM EDT Reads: 1,563
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
Sep. 30, 2016 11:15 AM EDT Reads: 3,081
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
Sep. 30, 2016 11:00 AM EDT Reads: 490
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Sep. 30, 2016 11:00 AM EDT Reads: 537
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 30, 2016 11:00 AM EDT Reads: 3,987
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, discussed how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved efficienc...
Sep. 30, 2016 10:45 AM EDT Reads: 3,618
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
Sep. 30, 2016 10:45 AM EDT Reads: 458
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Sep. 30, 2016 10:45 AM EDT Reads: 4,478
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 30, 2016 10:45 AM EDT Reads: 755
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Sep. 30, 2016 10:45 AM EDT Reads: 2,759
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Sep. 30, 2016 10:30 AM EDT Reads: 572
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Sep. 30, 2016 10:30 AM EDT Reads: 241
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Sep. 30, 2016 10:30 AM EDT Reads: 244
SYS-CON Events announced today that CDS Global Cloud, an Infrastructure as a Service provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. CDS Global Cloud is an IaaS (Infrastructure as a Service) provider specializing in solutions for e-commerce, internet gaming, online education and other internet applications. With a growing number of data centers and network points around the world, ...
Sep. 30, 2016 10:30 AM EDT Reads: 3,027
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Sep. 30, 2016 10:15 AM EDT Reads: 1,296