Welcome!

Blog Feed Post

Porticor Helps Organizations Meet PCI DSS Compliance and Secure Credit Card Information Stored in the Cloud

Porticor’s Cloud Key Management and Data Encryption Solution Protects Cloud-based Cardholder and Financial Information from Holiday Hackers and Threats at Organizations such as Payze

CAMPBELL, Calif. – Dec. 2, 2014 – Porticor®, a leading cloud data security company delivering the only cloud-based key management and data encryption  solution that infuses trust into the cloud and keeps cloud data confidential, today announced growing customer traction due to its innovative solution enabling organizations to secure cloud-based credit card and financial information, helping them meet Payment Card Industry Data Security Standard (PCI DSS) compliance.  Customer privacy is of particular concern for financial organizations during the holiday season due to the increase in threats and hacker activity.

The Porticor Virtual Private Data (VPD) platform is a cloud key management and encryption solution that delivers the industry’s most secure cloud encryption key management by enabling organizations to securely maintain control of their own encryption keys.  Unlike traditional data encryption solutions, which are complicated and expensive to deploy and manage, Porticor’s split-key encryption and homomorphic key management system is offered as the industry’s first cloud data protection service of its kind, delivering true confidentiality of credit card and financial data in cloud, virtual and hybrid environments by ensuring encryption keys are never exposed.

“At Payze we’ve setup a credit card processing system within AWS, and as part of our PCI requirements we needed a separate key management system in order to comply with PCI policies,” said Joel Paulin, Founder and Chairman of Payze.  “We’ve integrated Porticor into our encryption key setup to provide seamless additional encryption on top of our existing encryption infrastructure.  This additional level of encryption, with keys isolated from our normal system, and using Porticor’s permissions and controls enables us to have a more secure key management posture going for PCI compliance.  What differentiates Porticor is the product: It is polished, easy to configure, easy to integrate, more reliable, and has greater security than the other options we had seen.”

The main focus of PCI DSS is protecting cardholder data in systems and applications, including data in storage, transmission, and in use.  These requirements are more critical when data is stored and processed in the cloud, an activity escalated during holiday shopping.  Porticor VPD is a complete solution that combines patented key management with state-of-the-art encryption to enable organizations to effectively comply with PCI DSS in the cloud.  Porticor encrypts the entire data layer, including virtual disks, databases, files, and object storage.  It also addresses the processes necessary for managing encryption environments and encryption keys, and provides the security needed for compliance in a convenient, cost-effective, fully cloud-based solution.

“We were impressed with the ease of setting up the Porticor appliance,” added Paulin.  “Compared to the other options we considered, we were more confident in the security of Porticor’s solution, and we appreciate the turnkey nature of it.  Also, because the Porticor systems provide automation of key management, we didn’t need to worry about a server crashing and losing our keys since the automated system would correctly provision our instances, which was a risk for other systems.  Finally, the use of a master key on the appliance kept by us helped give us assurance that Porticor did not know our keys and we had the benefit of dual control, which helped us meet our dual control needs for PCI compliance.”

The PCI Council defined 12 high-level security requirements.  Six of the requirements define the need for both encryption and key management in the cloud to protect credit card information from both inside and outside threats, and are addressed by Porticor.  Porticor gives organizations the ability to meet these requirements by requiring two keys to encrypt or decrypt an object.  In addition, each key is encrypted – to protect it while it is resident in a cloud account – using patent-pending homomorphic key management technology.  In addition, Porticor helps address some of the general PCI DSS requirements beyond encryption and key management.  For more information on how Porticor addressed PCI DSS compliance, see: http://www.porticor.com/pci-white-paper-download/

“Financial organizations are under threat at all times, but especially during this time of year with the increased consumer buying activity,” said Ariel Dan, Porticor Co-Founder and Executive VP.  “Porticor’s VPD is uniquely built to address PCI DSS compliance requirements, and the PCI DSS requirements validate the need for Porticor’s unique approach of combining patented split-key encryption and homomorphic key management with encryption technologies.  Key management is an ongoing challenge for organizations, and Porticor’s homomorphic key management solves this problem and enables companies to achieve compliance.  With Porticor, organizations are assured that credit card information and confidential data are kept safe from outside and internal threats.”

Integrating with major players such as HP, AWS and VMware, Porticor provides the industry’s only software-defined, automated solution that uniquely eliminates the need for cumbersome, non-scalable, and expensive hardware security modules for the cloud.  Uniquely combining data encryption with patented split-key encryption and homomorphic key management technologies, Porticor protects critical data in public, private and hybrid cloud environments.  It provides the strong security needed for compliance in a convenient, cost-effective, fully cloud-based solution.

About Porticor

Porticor is the leading cloud security company delivering easy-to-use and scalable security solutions for cloud data encryption and key management.  The Porticor Virtual Private Data (VPD) system is the industry’s first solution combining data encryption with patented split-key encryption and homomorphic key management to protect critical data in public, private and hybrid cloud environments.  Using breakthrough split-key encryption and homomorphic key management, the Porticor VPD is the only system available that offers the ease-of-use of cloud-based key management without sacrificing trust.  Porticor is an Amazon Web Services Technology Partner, a VMware Technology Alliance Partner, an HP technology partner, and supports other clouds.  The company is headquartered in Tel Aviv, Israel, with offices in Silicon Valley, and is venture backed.  For more information, visit: http://www.porticor.com/.

 

###

The post Porticor Helps Organizations Meet PCI DSS Compliance and Secure Credit Card Information Stored in the Cloud appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

Latest Stories
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of computational needs for many industries. Their solutions provide benefits across many environments, such as datacenter deployment, HPC, workstations, storage networks and standalone server installations. ICC has been in business for over 23 years and their phenomenal range of clients include multinational corporations, universities, and small busines...
This sixteen (16) hour course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will result in an improved ability to design, develop, deploy and operate software and services faster.
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Authorization of web applications developed in the cloud is a fundamental problem for security, yet companies often build solutions from scratch, which is error prone and impedes time to market. This talk shows developers how they can (instead) build on-top of community-owned projects and frameworks for better security.Whether you build software for enterprises, mobile, or internal microservices, security is important. Standards like SAML, OIDC, and SPIFFE help you solve identity and authenticat...
The digital transformation is real! To adapt, IT professionals need to transform their own skillset to become more multi-dimensional by gaining both depth and breadth of a wide variety of knowledge and competencies. Historically, while IT has been built on a foundation of specialty (or "I" shaped) silos, the DevOps principle of "shifting left" is opening up opportunities for developers, operational staff, security and others to grow their skills portfolio, advance their careers and become "T"-sh...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
Hackers took three days to identify and exploit a known vulnerability in Equifax’s web applications. I will share new data that reveals why three days (at most) is the new normal for DevSecOps teams to move new business /security requirements from design into production. This session aims to enlighten DevOps teams, security and development professionals by sharing results from the 4th annual State of the Software Supply Chain Report -- a blend of public and proprietary data with expert researc...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
This session will provide an introduction to Cloud driven quality and transformation and highlight the key features that comprise it. A perspective on the cloud transformation lifecycle, transformation levers, and transformation framework will be shared. At Cognizant, we have developed a transformation strategy to enable the migration of business critical workloads to cloud environments. The strategy encompasses a set of transformation levers across the cloud transformation lifecycle to enhance ...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...