Blog Authors

ashvinkamarajuAshvin Kamaraju
VP of Product Devt & Partner Mgmt
Andy KicklighterAndy Kicklighter
Director of Product Marketing
Robert BigmanRobert Bigman
Guest Author, Former CIA CISO

DEFENDERS OF DATA

Category: Encryption

14 Oct
2014

Personal note: When I initially laid out this blog, I planned on stepping through recent revelations in the Dairy Queen breach. However, since my initial outline, Kmart was also breached. These breaches are happening at such a frequent pace, I can’t help but feel the larger story is about security flaws within the retail space. So instead of delivering yet another Dairy Queen article among the masses, I’d instead like to look at security flaws within the retail space as […]

06 Oct
2014

Data encryption is increasingly at the forefront of American conversations around cybersecurity. In fact, Fusion’s Daniel Rivero, citing government intrusion and overreach, went so far as to call it “the second amendment battle for the digital age.” Given October is National Cyber Security Awareness Month, it only seems appropriate to explore the benefits of encryption – a strategy that helps keep businesses accountable to their customers, partners, employees and stock holders. Click to Tweet: The Long Game of Encrypt Everything […]

08 Sep
2014
Categories : Big Data, Data Encryption, Database Encryption, Encryption            Leave a comment           

Intel’s AES-NI instructions are extensions to the x86 instruction set to perform AES encryption and decryption directly using Intel CPUs. In addition to being more secure, there are significant performance gains that accrue when using hardware-based encryption. Just as the AES encryption has become a universal and widely adopted standard for symmetric encryption, AES NI-enabled encryption has become the equivalent to a standard for x86-based applications performing hardware encryption starting with Intel’s Westmere processors. Click to Tweet:          ./@Vormetric #DataSecurity for […]

28 Aug
2014

As we’re winding down to the end of VMworld today, now is a good time to summarize some of the key data security trends we’re seeing at the event. The first is that data, and the security of data within VMware clouds and environments, is now a hot topic. Not only did VMware announce a set of critical features tied to enhancing data security in today’s environment of “deperimeterization” for networks with the release of NSX 6.1, but the topic […]

30 May
2014

Yesterday, we announced the general availability of Vormetric Data Security Release 5, Version 5.2.1.  This is a full release for our set of Data Security Platform products, including extensive enhancements to our flagship Vormetric Transparent Encryption product, our new Vormetric Application Encryption offering, updates to our Data Security Manager appliance, encryption agents, key management and more.  The release is the culmination of significant work by Vormetric product development, product management and product marketing teams and further extends our platform to […]

29 May
2014

The Vormetric Data Security Platform Yesterday was a big day for Vormetric, the culmination of the long process of creating a new product – Vormetric Application Encryption.  This offering is a major extension of our Data Security Platform, giving our customers powerful capabilities for granularly encrypting field, column and file data within enterprise and web applications, as well as cloud and big data environments. With the addition of Vormetric Application Encryption to the Vormetric Data Protection Platform, we have created […]

26 May
2014

It seems pretty clear that eBay didn’t properly safeguard their user information. We can expect that perimeters and firewalls will be penetrated – The Verizon data breach report gives a 90% chance of compromising an account after 10 phishing attempts, and malicious software installed as a result  is often undetectable by AV or Network monitoring and penetration tools.  Other attacks on applications (SQL injections, stack overflows) often result in an attacker gaining root privileges on machines and then using the […]

08 May
2014

In mid-April, Verizon released their annual Data Breach Investigations Report. The report accounts for not only breaches, but also “incidents” unlike previous years which only covered reported breaches. The new 10 year trend summary explains that servers accounted for the highest number of breaches and greatest percentage of breaches by asset type—accounting for around 45% in 2013. This signifies that the number of breaches from servers is up nearly 300% from 2009 – less than 200 in 2009 to nearly 800 […]

02 May
2014
Categories : Cloud Security, Encryption            Leave a comment            Tags: , , , , ,

We passed a great milestone this week – our second Cloud marketplace implementation for Vormetric Transparent Encryption as we added support for IBM Cloud Marketplace to our existing AWS Marketplace offering. If you are an enterprise looking to take advantage of the flexibility, cost savings and business agility that comes with using cloud-based resources, we already know something that’s been at the top of your list – How can I safely use sensitive data and take advantage of these resources […]

24 Apr
2014
Categories : Big Data, Data Protection, Data Security, Encryption, HIPAA, HITECH            1Comments            Tags: , ,

Cloudera recently announced the general availability of Cloudera HADOOP Version 5 (CDH 5), also dubbed as the “Enterprise Data Hub”.   Vormetric is proud and pleased that we have once again successfully certified Vormetric Data Security for Cloudera HADOOP. This further strengthens our partnership and demonstrates our commitment to mutual customers. With a recent investment of one billion dollars in Cloudera and Hortonworks, the two leading HADOOP distribution companies, the market has validated the potential market size (rumored to be about […]