|By Marketwired .||
|June 23, 2014 09:17 AM EDT||
STAMFORD, CT -- (Marketwired) -- 06/23/14 -- Protegrity, the world leader in enterprise data encryption and tokenization solutions, today announced the release of version 6.5.2 of the Protegrity Data Security Platform. This new release addresses developing industry trends, emerging new platforms, and incorporates customer feedback, in the fastest, most efficient and lightweight distribution to date.
"We're really excited about 6.5.2, with some of the new capabilities we've added for IBM PureData and Netezza, Hadoop 2.0 and YARN, and to the core software," said Yigal Rozenberg, VP Product Development. "There are also a number of significant improvements in usability to save security administrators time and make their jobs a little easier."
Recognizing increasingly strict regulations on the storage and use of sensitive data, in particular PCI DSS 3.0, Protegrity has implemented a number of new features to assist in meeting and exceeding the new standards, including:
- Two Factor Authentication Support for Secure System Login
- File Integrity Monitoring to Track Changes to Any Sensitive File or Configuration
- Improved Automated KEK Rotation with Centrally Driven, Push-Button Activation
- Upgraded Reporting Engine and Refined Audit Log Generation for Enhanced Forensics
Protegrity has also expanded support for a number of new platforms, most notably becoming the first vendor to provide comprehensive data security for IBM Netezza. Platform support has also been expanded for the Protegrity File Protector and the Protegrity Big Data Protector, which is now compatible with all distributions of Hadoop 2.X and YARN.
Demonstrating continued leadership in Big Data security innovation, in this new release Protegrity has unveiled the industry's first Extended HDFS Encryption, which utilizes native Hadoop infrastructure to deliver highly transparent file and folder encryption within HDFS.
"Protegrity is certainly unique in the level of security they can achieve within Big Data platforms while preserving data usability," said Scott Mellegaard, Big Data Practice Architect, Trace3. "They're on the forefront of Big Data security, in no small part due to Protegrity Vaultless Tokenization, which opens up avenues to securely work with sensitive data, and expose analytical value with minimal risk."
Incorporating customer feedback, continued improvements in the scalability, flexibility and performance of the core software of the Protegrity Data Security Platform include:
- Policy deployment upgraded to increase efficiency in extremely large scale environments
- Support for RESTful API added to Protection servers for simpler, more flexible web services
- User interface enhancements reduce time and effort on configuration and manual tasks
- Upgraded notification system provides more detailed alerts and faster resolutions
- Expanded tokenization format support to enable better business intelligence and data usability
Headquartered in Stamford, CT, Protegrity provides high performance, infinitely scalable, end-to-end data security solutions that protect sensitive information across the enterprise from the point of acquisition to deletion. The company's award-winning software products span a variety of data protection methods, including end-to-end encryption, Vaultless Tokenization, masking, and monitoring and are backed by several important data protection technology patents. Currently, more than 200 enterprise customers worldwide rely on Protegrity's comprehensive data security solutions to enable compliance for PCI DSS, HIPAA and other data protection mandates while protecting their sensitive data, brand, and business reputation. For more information, please visit www.protegrity.com.
Connect with Protegrity:
Read the blog: http://www.protegrity.com/news-resources/blog/
Follow us on Twitter: https://twitter.com/Protegrity
Follow us on LinkedIn: https://www.linkedin.com/company/protegrity
Dec. 7, 2016 07:30 AM EST Reads: 809
Dec. 7, 2016 06:45 AM EST Reads: 1,988
Dec. 7, 2016 06:30 AM EST Reads: 1,800
Dec. 7, 2016 06:15 AM EST Reads: 5,325
Dec. 7, 2016 05:15 AM EST Reads: 1,054
Dec. 7, 2016 04:00 AM EST Reads: 866
Dec. 7, 2016 02:00 AM EST Reads: 625
Dec. 7, 2016 01:45 AM EST Reads: 6,163
Dec. 7, 2016 01:15 AM EST Reads: 1,879
Dec. 7, 2016 01:00 AM EST Reads: 1,617
Dec. 7, 2016 12:45 AM EST Reads: 3,938
Dec. 7, 2016 12:45 AM EST Reads: 1,244
Dec. 7, 2016 12:15 AM EST Reads: 1,033
Dec. 7, 2016 12:15 AM EST Reads: 1,377
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Dec. 7, 2016 12:00 AM EST Reads: 1,278