Category: Encryption Key Management

18 Jul
2016
Categories : Encryption Key Management            Leave a comment           

On your weekly trip to the bank, you likely don’t even think twice about the fact that every time you hand over money that trust goes into someone else’s hands to keep your finances safe. And while you’re relinquishing control, you can very well assume necessary precautions are already in place: the building will be locked after hours and if there is a spare key – it certainly will not be stored under the front mat. It likely won’t even […]

Five Reasons to Secure Your NoSQL Deployments

Posted By: Don Pinto - Couchbase, @NoSQLDon
25 Jun
2015
Categories : Access Control, Application Encryption, Big Data, Encryption, Encryption Key Management            Leave a comment           

Recently, NoSQL databases have become very popular across enterprises and many of them are choosing Couchbase to power their web, mobile, and IoT applications. As more and more companies adopt NoSQL, the amount of sensitive data stored in these repositories is also rising. Typically, it is a standard practice for enterprises to put the database behind a firewall, and implement extensive security controls. But these technologies alone cannot protect an organization from data breaches and data leakage. ClickToTweet: 5 Reasons […]

Vormetric and Teradata: Building on Mutual Strength

Posted By: derektumulak, @tumulak
22 Apr
2015
Categories : Big Data, Data Security, Encryption, Encryption Key Management, Teradata Encryption            Leave a comment           

Any party bent on destruction, exposing proprietary business intelligence and sensitive customer information like credit card numbers and medical information can try to get access. But what’s more important is learning how to protect it. ClickToTweet: Easily, Efficiently Encrypt Teradata w/@Vormetric’s Data Protection Platform http://bit.ly/1Ocr0b2 #DefenderOfData While data is crucial to enhance company product offerings and capture increased market share, when it’s not properly protected, it can be exploited. However the very advantage big data solutions provide — the ability to […]

SaaS Bill of Rights – It’s All About the SaaS

Posted By: Alan Kessler, @kessalan
01 Apr
2015

Recently, we released the results from the cloud edition of our 2015 Insider Threat Report. My colleagues Andy Kicklighter and CJ Radford delved into the results in their blog posts from March 24 and March 26, and I’ve gone into a bit more detail about the findings below. But, the purpose of this blog is to do two things: a) discuss what we hear matters when it comes to successful and safe SaaS consumption and delivery and b) with this […]

Healthcare Data – An Ounce of Prevention is Worth A Pound Of Cure

Posted By: Michael Rothschild, @mjrothschild
20 Mar
2015
Categories : Access Control, Application Encryption, Encryption, Encryption Key Management, HIPAA, HITECH            Leave a comment           

Code Blue For Your Healthcare Data Few look forward to a doctor’s visit. Unfortunately, this is more the case than ever before, and it is not because of what you might think. Today, patients worry about the information they may have to divulge at the doctor’s office and where it might end up. They say that the best way to stay healthy is to not go to the doctor at all and alarmingly it may also be the best way […]

12 Feb
2015

When it comes to data security, identifying what you consider your crown jewels is the first step in the data security recovery program. Legacy products can be expensive and negatively impact performance. Organizations need to realize that the complexity and fear of access control is a thing of the past. ClickToTweet: Why a Data Security Platform is an Enterprise Priority #DefenderOfData http://bit.ly/1uLLONG Before we get started on recovery, here are a few things you need to ask yourself: How much […]

As 2015 gets ready to roll in, I thought that it would be worthwhile to examine what to expect in the coming year. I’m spending lots of time these days with SaaS and IaaS/hosting, and managed service providers, and their direct enterprise customers who want to make best use of these environments – mainly in the North America and European markets. At Vormetric we’ve signed many cloud providers as partners this last year who recognize that cloud services and security […]

The Long Game of “Encrypt Everything”

Posted By: Alan Kessler, @kessalan
06 Oct
2014

Data encryption is increasingly at the forefront of American conversations around cybersecurity. In fact, Fusion’s Daniel Rivero, citing government intrusion and overreach, went so far as to call it “the second amendment battle for the digital age.” Given October is National Cyber Security Awareness Month, it only seems appropriate to explore the benefits of encryption – a strategy that helps keep businesses accountable to their customers, partners, employees and stock holders. Click to Tweet: The Long Game of Encrypt Everything […]

23 Jul
2013
Categories : Big Data, Data Mining, Encryption Key Management            Leave a comment           

Since the advent of the SuperUser, there has been a thorn in the side of Information Security. Administrators must be able to perform system management functions, but systems have been designed to grant them access far beyond what they actually need to do their jobs. As a result, IT has had to come up with crafty ways to help mitigate who has access to privileged accounts and the underlying data in those accounts. They have tried everything from password management, […]

The Data Breach Surveys-Part 3

Posted By: Tina Stewart, @socialTIS
23 May
2013

Earlier this month, I blogged about what our global online survey respondents said were the primary security drivers in their organizations and IT’s new business imperative of protecting brand reputation through better security practices. In my third and final post on our survey findings, I thought I’d borrow a page from Cuba Gooding Jr.’s book in Jerry Maguire and “Show (you) the money!” The 450+ IT professionals responding to our Protect What Matters — Data Security survey shared where they plan to allocate their budgets in the coming 12 months as […]