Category: Encryption

Data Security & Identity Management: Essential 1st Cousins in IT Security

Posted By: Chris Olive, @ChrisEOlive (Twitter) | Senior Sales Engineer | Vormetric, a Thales company
15 Jul
Categories : Data Security, Encryption            1Comments           

As a senior architect, sales engineer, and consultant out in the field working closely with senior IT security leaders and CISOs, I sometimes run into questions surrounding the Vormetric product line related to identity management. Having implemented identity management solutions for Fortune 500 companies around the world for a number of years, I truly appreciate when these questions arise, as it demonstrates some understanding that “Data Security” and “Identity Management” are essential first cousins in IT Security. Click to Tweet: […]

RSA DPM: What Do You Do When “End-of-Life” Hits?

Posted By: Michael Rothschild, @mjrothschild
28 Jun
Categories : Data Protection, Data Security, Database Encryption, Encryption            Leave a comment           

I’ll grant you the topic sounds a little morbid, but it’s not what you think. I am referring to when an organization announces the end-of-life and subsequent end-of-product support for a product or service that you have relied on. Obviously, a range of issues immediately rise to the surface, such as culling a short list of replacement products, vetting them and ultimately selecting the best product to replace your current “dead man walking” product. It can be a daunting and […]

Encryption: A top priority on your data security list?

Posted By: Louise Bulman, AVP of EMEA | Vormetric, A Thales Company
08 Oct
Categories : Data Security, Encryption            Leave a comment           

The idea behind initiatives like ‘National Cyber Security Awareness Month’ in the US and the on-going campaign in the UK of ‘Get Safe Online’ – is that each and every one of us needs to do our part to make sure that our online lives are kept safe and secure. People, finances, devices and businesses must be better protected from fraud, abuse and other issues encountered online. ClickToTweet: Is #Encryption on your list for #GetSafeOnline & #CyberAware? I would […]

01 Sep
Categories : Data Security, Encryption            Leave a comment           

If you’re running a business, there’s a good chance you’re focused on reaching certain end goals. Two of those goals likely include both velocity and profitability. The Oxford Dictionary defines velocity as “the speed of something in a given direction” and profitability as “the degree to which a business or activity yields profit or financial gain.” Generally, the former – in some capacity, regardless of the industry – is necessary to achieve the latter. I bring this up not to […]

06 Aug
Categories : Data Security, Encryption            Leave a comment           

Ski helmets, seat belts, and encryption. What comes to your mind when you read these words? You may immediately think “safety,” and you’d be right, but how about “speed enablers”? At first blush, that may not be the first concept that comes to mind, but there’s a pretty compelling case to be made for this as another common theme. Let me give you a couple fun examples, starting with ski helmets. During the winter of 2002/2003 researchers studied different factors, […]

Five Reasons to Secure Your NoSQL Deployments

Posted By: Don Pinto - Couchbase, @NoSQLDon
25 Jun
Categories : Access Control, Application Encryption, Big Data, Encryption, Encryption Key Management            Leave a comment           

Recently, NoSQL databases have become very popular across enterprises and many of them are choosing Couchbase to power their web, mobile, and IoT applications. As more and more companies adopt NoSQL, the amount of sensitive data stored in these repositories is also rising. Typically, it is a standard practice for enterprises to put the database behind a firewall, and implement extensive security controls. But these technologies alone cannot protect an organization from data breaches and data leakage. ClickToTweet: 5 Reasons […]

Vormetric and Teradata: Building on Mutual Strength

Posted By: derektumulak, @tumulak
22 Apr
Categories : Big Data, Data Security, Encryption, Encryption Key Management, Teradata Encryption            Leave a comment           

Any party bent on destruction, exposing proprietary business intelligence and sensitive customer information like credit card numbers and medical information can try to get access. But what’s more important is learning how to protect it. ClickToTweet: Easily, Efficiently Encrypt Teradata w/@Vormetric’s Data Protection Platform #DefenderOfData While data is crucial to enhance company product offerings and capture increased market share, when it’s not properly protected, it can be exploited. However the very advantage big data solutions provide — the ability to […]

08 Apr
Categories : Access Control, Cloud Encryption Gateway, Cloud Security, Cloud Storage Encryption, Encryption            Leave a comment           

New Product – The Vormetric Cloud Encryption Gateway In our professional lives, we’re often confronted with a choice between expediency and security. In that arena, security, more often than not, comes out the loser. Employees have grown increasingly reliant on technology, and if a new technology helps them to do their jobs better, faster, or more efficiently, they’ll use that technology—security consequences be damned [with little or no consideration of the security risks they may introduce]. ClickToTweet: Security & Expediency […]

SaaS Bill of Rights – It’s All About the SaaS

Posted By: Alan Kessler, @kessalan
01 Apr

Recently, we released the results from the cloud edition of our 2015 Insider Threat Report. My colleagues Andy Kicklighter and CJ Radford delved into the results in their blog posts from March 24 and March 26, and I’ve gone into a bit more detail about the findings below. But, the purpose of this blog is to do two things: a) discuss what we hear matters when it comes to successful and safe SaaS consumption and delivery and b) with this […]

Healthcare Data – An Ounce of Prevention is Worth A Pound Of Cure

Posted By: Michael Rothschild, @mjrothschild
20 Mar
Categories : Access Control, Application Encryption, Encryption, Encryption Key Management, HIPAA, HITECH            Leave a comment           

Code Blue For Your Healthcare Data Few look forward to a doctor’s visit. Unfortunately, this is more the case than ever before, and it is not because of what you might think. Today, patients worry about the information they may have to divulge at the doctor’s office and where it might end up. They say that the best way to stay healthy is to not go to the doctor at all and alarmingly it may also be the best way […]