Category: Encryption

Five Reasons to Secure Your NoSQL Deployments

Posted By: Don Pinto - Couchbase, @NoSQLDon
25 Jun
2015
Categories : Access Control, Application Encryption, Big Data, Encryption, Encryption Key Management            Leave a comment           

Recently, NoSQL databases have become very popular across enterprises and many of them are choosing Couchbase to power their web, mobile, and IoT applications. As more and more companies adopt NoSQL, the amount of sensitive data stored in these repositories is also rising. Typically, it is a standard practice for enterprises to put the database behind a firewall, and implement extensive security controls. But these technologies alone cannot protect an organization from data breaches and data leakage. ClickToTweet: 5 Reasons […]

22 Apr
2015
Categories : Big Data, Data Security, Encryption, Encryption Key Management, Teradata Encryption            Leave a comment           

Any party bent on destruction, exposing proprietary business intelligence and sensitive customer information like credit card numbers and medical information can try to get access. But what’s more important is learning how to protect it. ClickToTweet: Easily, Efficiently Encrypt Teradata w/@Vormetric’s Data Protection Platform http://bit.ly/1Ocr0b2 #DefenderOfData While data is crucial to enhance company product offerings and capture increased market share, when it’s not properly protected, it can be exploited. However the very advantage big data solutions provide — the ability to […]

Categories : Access Control, Cloud Encryption Gateway, Cloud Security, Cloud Storage Encryption, Encryption            1Comments           

New Product – The Vormetric Cloud Encryption Gateway In our professional lives, we’re often confronted with a choice between expediency and security. In that arena, security, more often than not, comes out the loser. Employees have grown increasingly reliant on technology, and if a new technology helps them to do their jobs better, faster, or more efficiently, they’ll use that technology—security consequences be damned [with little or no consideration of the security risks they may introduce]. ClickToTweet: Security & Expediency […]

SaaS Bill of Rights – It’s All About the SaaS

Posted By: Alan Kessler, @kessalan
01 Apr
2015

Recently, we released the results from the cloud edition of our 2015 Insider Threat Report. My colleagues Andy Kicklighter and CJ Radford delved into the results in their blog posts from March 24 and March 26, and I’ve gone into a bit more detail about the findings below. But, the purpose of this blog is to do two things: a) discuss what we hear matters when it comes to successful and safe SaaS consumption and delivery and b) with this […]

Categories : Access Control, Application Encryption, Encryption, Encryption Key Management, HIPAA, HITECH            Leave a comment           

Code Blue For Your Healthcare Data Few look forward to a doctor’s visit. Unfortunately, this is more the case than ever before, and it is not because of what you might think. Today, patients worry about the information they may have to divulge at the doctor’s office and where it might end up. They say that the best way to stay healthy is to not go to the doctor at all and alarmingly it may also be the best way […]

When it comes to data security, identifying what you consider your crown jewels is the first step in the data security recovery program. Legacy products can be expensive and negatively impact performance. Organizations need to realize that the complexity and fear of access control is a thing of the past. ClickToTweet: Why a Data Security Platform is an Enterprise Priority #DefenderOfData http://bit.ly/1uLLONG Before we get started on recovery, here are a few things you need to ask yourself: How much […]

What We Talk About When We Talk About Insider Threats

Posted By: Alan Kessler, @kessalan
05 Jan
2015
Categories : Access Control, APT, Cloud Security, Data Breach, Data Breach Disclosure, Data Security, Encryption            Leave a comment           

What does the term “insider threat” mean to you? It would be fair to assume Edward Snowden might be one of the first names or faces to pop into your head. Snowden was an insider, and he proved to be a threat. He also had malicious intentions. <ClickToTweet>: Insider Threats – More than just malicious insiders http://bit.ly/1rZpr5L #DefenderOfData But, you would be shortsighted in thinking that malicious insiders are the biggest risk to your data. While Edward Snowden may be […]

I try to keep on top of the news, particularly as it relates to the nature and severity of cyber attacks taking place. Sadly, there’s been no shortage of reading material lately. Last month, there were reports on breaches at Kmart and Dairy Queen (my family loves Blizzards). Updates then came out about a massive breach at Home Depot. Then more recently, there’s been the spate of nation-state attacks on the USPS, National Oceanic and Atmospheric Administration (NOAA), Sony Entertainment […]

As 2015 gets ready to roll in, I thought that it would be worthwhile to examine what to expect in the coming year. I’m spending lots of time these days with SaaS and IaaS/hosting, and managed service providers, and their direct enterprise customers who want to make best use of these environments – mainly in the North America and European markets. At Vormetric we’ve signed many cloud providers as partners this last year who recognize that cloud services and security […]

From the CEO’s Chair: 2015 Data Security Predictions

Posted By: Alan Kessler, @kessalan
01 Dec
2014
Categories : Big Data, Cloud Security, Data Breach, Data Security, Encryption, Privileged User            Leave a comment           

It’s the most wonderful time of the year! That’s right, it’s that time for my predictions about where things are headed in 2015. Before you break out the eggnog, don a sweater and settle in front of that roaring fire, I thought it might be fun to do a very brief “year in review” based on a year’s worth of blogs. <ClickToTweet>: 6 key #DataSecurity Predictions for 2015 from @kessalan CEO of @Vormetric http://bit.ly/1B7bA0g Early 2014 saw me counting down […]