Author: Derek Tumulak

Categories : Data Security            Leave a comment           

Complicated. This a word we hear quite often in the security industry, and the fear of complication can have a disastrous impact on an organization’s security hygiene. For example, our recent 2016 Vormetric Data Threat Report revealed that “perceived complexity” is the number-one reason why enterprises do not adopt the security tools they need to encrypt and control access to sensitive data, as well as log and audit information about sensitive data access. Data compliance requirements increasingly require organizations to […]

Categories : Key Management            Leave a comment           

As cybersecurity risks increasingly threaten both corporate and public well-being, lawmakers and regulators alike are enhancing existing data security compliance requirements, implementing new legal frameworks and defining new regulations to respond to increasing internal and external hazards. Compliance mandates, data residency requirements, government regulations and best practices require enterprises protect and maintain encryption keys in accordance with specific frameworks and laws. To meet the requirements of these frameworks and laws, enterprises must also meet specific maintenance and storage requirements. Salesforce […]

Categories : Data Security            Leave a comment           

Organizations are learning (don’t worry, most have done the learning) that if they don’t do encryption right – people will have access to sensitive data. With encryption and other cryptographic technologies acting as building blocks within a larger, layered IT security strategy, it’s clear that there are multiple needs for these technologies across enterprises, as more information is collected, stored and used throughout organizations. But these basic security needs don’t just stop at the enterprise level. Cloud service providers need […]

Categories : Encryption Key Management            Leave a comment           

On your weekly trip to the bank, you likely don’t even think twice about the fact that every time you hand over money that trust goes into someone else’s hands to keep your finances safe. And while you’re relinquishing control, you can very well assume necessary precautions are already in place: the building will be locked after hours and if there is a spare key – it certainly will not be stored under the front mat. It likely won’t even […]

Categories : Data Security            Leave a comment           

Many companies claim they provide a complete all-encompassing end-to-end cybersecurity solution – for folks that don’t know, the term suggests a supplier provides all hardware and/or software components and resources to meet the customer’s requirements…in other words, no other supplier need be involved. Just a brief search of “cyber security end-to-end” and you find a number of vendors throwing around the term haphazardly.  That ‘no other supplier need be involved’ mindset is nothing but naive. End-to-end is one IT security […]

Categories : Data Security            Leave a comment           

Hello, IT decision maker. It’s likely your enterprise is experiencing some pain points with its data security strategy. From meeting compliance standards to scheduled windows of maintenance, juggling priorities in IT security operations can be both costly and disruptive. On average, businesses lose between $84,000 and $108,000 for every hour of IT system downtime. While these numbers seem immense, the true cost of system outages go beyond monetary figures. System outages hinder employee productivity, impact brand reputation and can lead […]

Categories : Data Security            Leave a comment           

Earlier this week, we announced a major expansion of the Vormetric Data Security Platform. Our latest updates expand protections for sensitive data within datacenter, cloud, Big Data and application environments. More specifically, they offer encryption and access control options for Docker, Hadoop, NoSQL and SQL as well as enhanced automation capabilities to help organizations minimize data breaches and meet compliance and regulatory requirements. ClickToTweet: Need #DataSecurity for #Docker? #NOSQL? @Vormetric has it http://bit.ly/1MsJTRp  pic.twitter.com/MBEJOSrEEq Pretty useful stuff, especially in our […]

Categories : Data Security            Leave a comment           

In case you missed the memo, let me be the first to officially welcome you to the new world order of software as a service, or SaaS. Whether work or play, SaaS has enabled our on-demand, pay-as-you-go lifestyle. From consumer brands (such as Netflix) to enterprise SaaS providers (like Salesforce), SaaS offerings have played a large role in meeting the changing software needs of users today. The shift towards SaaS subscriptions has enabled customers to avoid infrastructure costs and focus […]

Categories : Big Data, Data Security, Encryption, Encryption Key Management, Teradata Encryption            Leave a comment           

Any party bent on destruction, exposing proprietary business intelligence and sensitive customer information like credit card numbers and medical information can try to get access. But what’s more important is learning how to protect it. ClickToTweet: Easily, Efficiently Encrypt Teradata w/@Vormetric’s Data Protection Platform http://bit.ly/1Ocr0b2 #DefenderOfData While data is crucial to enhance company product offerings and capture increased market share, when it’s not properly protected, it can be exploited. However the very advantage big data solutions provide — the ability to […]

When it comes to SaaS security concerns, cloud storage tops the list. In fact, 83 percent of U.S., and 72 percent of global respondents were very or extremely concerned about the protection of sensitive data within online storage environments, according to the 2015 Vormetric Insider Threat Report: Cloud and Big Data Edition. Enterprises struggle with being able to trust cloud storage users and providers. Users are often unaware of sensitive and unprotected data, which may result in compliance violations or, […]