|By Marketwired .||
|June 23, 2014 09:17 AM EDT||
STAMFORD, CT -- (Marketwired) -- 06/23/14 -- Protegrity, the world leader in enterprise data encryption and tokenization solutions, today announced the release of version 6.5.2 of the Protegrity Data Security Platform. This new release addresses developing industry trends, emerging new platforms, and incorporates customer feedback, in the fastest, most efficient and lightweight distribution to date.
"We're really excited about 6.5.2, with some of the new capabilities we've added for IBM PureData and Netezza, Hadoop 2.0 and YARN, and to the core software," said Yigal Rozenberg, VP Product Development. "There are also a number of significant improvements in usability to save security administrators time and make their jobs a little easier."
Recognizing increasingly strict regulations on the storage and use of sensitive data, in particular PCI DSS 3.0, Protegrity has implemented a number of new features to assist in meeting and exceeding the new standards, including:
- Two Factor Authentication Support for Secure System Login
- File Integrity Monitoring to Track Changes to Any Sensitive File or Configuration
- Improved Automated KEK Rotation with Centrally Driven, Push-Button Activation
- Upgraded Reporting Engine and Refined Audit Log Generation for Enhanced Forensics
Protegrity has also expanded support for a number of new platforms, most notably becoming the first vendor to provide comprehensive data security for IBM Netezza. Platform support has also been expanded for the Protegrity File Protector and the Protegrity Big Data Protector, which is now compatible with all distributions of Hadoop 2.X and YARN.
Demonstrating continued leadership in Big Data security innovation, in this new release Protegrity has unveiled the industry's first Extended HDFS Encryption, which utilizes native Hadoop infrastructure to deliver highly transparent file and folder encryption within HDFS.
"Protegrity is certainly unique in the level of security they can achieve within Big Data platforms while preserving data usability," said Scott Mellegaard, Big Data Practice Architect, Trace3. "They're on the forefront of Big Data security, in no small part due to Protegrity Vaultless Tokenization, which opens up avenues to securely work with sensitive data, and expose analytical value with minimal risk."
Incorporating customer feedback, continued improvements in the scalability, flexibility and performance of the core software of the Protegrity Data Security Platform include:
- Policy deployment upgraded to increase efficiency in extremely large scale environments
- Support for RESTful API added to Protection servers for simpler, more flexible web services
- User interface enhancements reduce time and effort on configuration and manual tasks
- Upgraded notification system provides more detailed alerts and faster resolutions
- Expanded tokenization format support to enable better business intelligence and data usability
Headquartered in Stamford, CT, Protegrity provides high performance, infinitely scalable, end-to-end data security solutions that protect sensitive information across the enterprise from the point of acquisition to deletion. The company's award-winning software products span a variety of data protection methods, including end-to-end encryption, Vaultless Tokenization, masking, and monitoring and are backed by several important data protection technology patents. Currently, more than 200 enterprise customers worldwide rely on Protegrity's comprehensive data security solutions to enable compliance for PCI DSS, HIPAA and other data protection mandates while protecting their sensitive data, brand, and business reputation. For more information, please visit www.protegrity.com.
Connect with Protegrity:
Read the blog: http://www.protegrity.com/news-resources/blog/
Follow us on Twitter: https://twitter.com/Protegrity
Follow us on LinkedIn: https://www.linkedin.com/company/protegrity
"This week we're really focusing on scalability, asset preservation and how do you back up to the cloud and in the cloud with object storage, which is really a new way of attacking dealing with your file, your blocked data, where you put it and how you access it," stated Jeff Greenwald, Senior Director of Market Development at HGST, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 23, 2016 05:30 AM EDT Reads: 1,313
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Jul. 23, 2016 05:30 AM EDT Reads: 1,687
Jul. 23, 2016 05:15 AM EDT Reads: 1,097
Jul. 23, 2016 05:00 AM EDT Reads: 1,771
Jul. 23, 2016 05:00 AM EDT Reads: 1,469
Jul. 23, 2016 04:30 AM EDT Reads: 1,904
Jul. 23, 2016 04:30 AM EDT Reads: 1,377
Jul. 23, 2016 04:00 AM EDT Reads: 2,327
Jul. 23, 2016 03:45 AM EDT Reads: 1,741
Jul. 23, 2016 03:45 AM EDT Reads: 1,569
Jul. 23, 2016 03:30 AM EDT Reads: 1,062
Jul. 23, 2016 02:45 AM EDT Reads: 2,031
Jul. 23, 2016 02:45 AM EDT Reads: 695
Jul. 23, 2016 02:30 AM EDT Reads: 740
Jul. 23, 2016 01:15 AM EDT Reads: 1,005