Categories : Data Protection, Data Security            Leave a comment           

Vormetric’s channel program has come a long way. In 2014, we announced that all Vormetric products would be part of a single Data Security Platform sold through the channel. Our channel program now lives and breathes by an all channel model. Following our acquisition by Thales e-Security (TeS), we have the opportunity to expand our reseller program even further. Our end goal is a model that adheres to our mutual values and is global in strategy and reach. Since we’re […]

28 Jun
2016
Categories : Data Protection, Data Security, Database Encryption, Encryption            Leave a comment           

I’ll grant you the topic sounds a little morbid, but it’s not what you think. I am referring to when an organization announces the end-of-life and subsequent end-of-product support for a product or service that you have relied on. Obviously, a range of issues immediately rise to the surface, such as culling a short list of replacement products, vetting them and ultimately selecting the best product to replace your current “dead man walking” product. It can be a daunting and […]

Inadequate security measures can destroy an organisation’s brand and reputation.

Posted By: Louise Bulman, AVP of EMEA | Vormetric, A Thales Company
23 Jun
2016
Categories : Data Security            Leave a comment           

A company’s reputation and brand image is an important corporate asset that can play a pivotal role in determining the success of the organisation. Should something happen that compromises this asset and negatively impacts the public’s perception of the firm, the effects can be devastating. A data breach incident will inevitably call into question the company’s credibility, as it is put under a microscope and examined on how it handled the issue; pre and post breach. An example of the […]

No Question – Enterprises are using SaaS – But Concerns About Data Are High

Posted By: Andy Kicklighter, @akicklighter (Twitter)
17 Jun
2016
Categories : Cloud Computing, Cloud Security, Data Security            Leave a comment           

Enterprises today are migrating to the cloud whether there are security implications or not. But as SaaS usage grows, so too do concerns about meeting compliance, regulation and safety needs for sensitive enterprise data within SaaS environments. Click To Tweet: Enterprise #SaaS usage up,  even with sensitive data, & so are concerns @akicklighter bit.ly/1ZX2m03 pic.twitter.com/1aSM0McULi In fact our 2016 Data Threat Report showed: 85 percent of enterprises reporting that they use sensitive data in cloud environments 53 percent using sensitive […]

Wake Up and Smell the (Retail IT Security) Coffee

Posted By: Tina Stewart, @socialTIS
15 Jun
2016
Categories : Data Security            Leave a comment           

Retail – the industry that started it all. Or at least when it comes to the general public’s understanding of cybersecurity. Early breaches at major retailers like Target and Home Depot were among the first to raise awareness the threat of data breaches. It’s been nearly 2 years since this initial wave of highly-publicized retail breaches, but what is the current state of IT security for organizations in this sector? We decided to ask. Yesterday, we released the results of […]

News from the Front: Infosecurity Europe (the GDPR show)

Posted By: Andy Kicklighter, @akicklighter (Twitter)
09 Jun
2016
Categories : Data Security            Leave a comment           

This week at Infosecurity Europe there has been one overriding theme – the European GDPR (General Data Protection Regulation). On May 24th a 2 year time clock started for firms to comply with the “just finalized and approved” directive.  But views from vendors, enterprises and analysts about what it will mean are as varied as their agendas.  For some additional background on the regulation, see my colleague Jon Geater’s read on why to take the regulation seriously, and Sol Cates […]

07 Jun
2016
Categories : Data Security            Leave a comment           

The combination of Vormetric and Thales e-Security (TeS) is born out of strength. In a world where we see pundits saying the “Unicorn” is turning into a “Unicorpse”, and VC funding is on the decline, one takeaway remains clear: companies who stay focused on their customers and build real businesses with strong, credible business models are the ones who will win. That is the story of Vormetric and TeS. Before I crack open the book and give you a glimpse […]

You, Me and the GDPR – What U.S. Businesses Need to Know

Posted By: Sol Cates, @solcates (Twitter)
02 Jun
2016
Categories : Data Protection            Leave a comment           

In response to the ever-increasing number of high-profile data breaches, lawmakers and regulators around the world are enhancing existing data security compliance requirements, implementing new legal frameworks and defining new data security regulations to respond to increasing internal and external threats. In December of 2015, the European Union agreed to a draft of one such legal framework known as the General Data Protection Rules, or the GDPR. These rules, which are expected to go into effect in 2018, apply to […]

Get Ready for Infosecurity Europe

Posted By: Louise Bulman, AVP of EMEA | Vormetric, A Thales Company
31 May
2016
Categories : Data Security            1Comments           

A week from today, security professionals from all over Europe – and beyond – will be amassing in West London for the annual Infosecurity Europe show. There’ll be plenty for us to talk about, too – in the last 12 months we have seen major incidents affecting firms like TalkTalk, JD Wetherspoon’s and Ofcom, and the European Parliament has finally approved the General Data Protection Regulation (GDPR), set to come into play in 2018 – giving organisations only two years […]

26 May
2016
Categories : Data Security            Leave a comment           

Many companies claim they provide a complete all-encompassing end-to-end cybersecurity solution – for folks that don’t know, the term suggests a supplier provides all hardware and/or software components and resources to meet the customer’s requirements…in other words, no other supplier need be involved. Just a brief search of “cyber security end-to-end” and you find a number of vendors throwing around the term haphazardly.  That ‘no other supplier need be involved’ mindset is nothing but naive. End-to-end is one IT security […]