My Cybersecurity “Ah-ha” Moment

Posted By: Alan Kessler, @kessalan
06 Oct
Categories : Data Security            Leave a comment            Tags: , , , ,

As some of you may be aware, October is National Cybersecurity Awareness Month.  The theme for this week, specifically, is STOP. THINK. CONNECT: The Basic Steps to Online Safety and Security. Part of this week’s focus includes examining “cybersecurity jobs and how to engage young people in pursuing careers devoted to protecting the Internet.” The weekly topic, and the entire month’s devotion to cybersecurity, compels me to consider my cybersecurity “ah-ha” moment (We’re talking pre-Edward Snowden; pre-cybersecurity “skills gap”; pre-Target). […]

Forecast: Cloudy With a Chance of Encryption

Posted By: Alan Kessler, @kessalan
07 Mar
Categories : Data Encryption            Leave a comment            Tags: , , , ,

Guest authored by Tom Evgey, Sr. Security Analyst at Virtustream The RSA conference in San Francisco, CA, is certainly one, if not the largest network security conferences in the world. Rows upon rows of vendors attend showcasing the latest and hottest tools and services in the industry in an effort to convince you to buy their ultimate solution for protecting your closest assets.  Buzz-words like SIEM integration, log correlation, cloud security and forensic analysis were on almost every flyer; long […]

06 Mar

As if all our RSA Conference 2014 news wasn’t enough to keep you busy, we now have even more exciting news to share.  Vormetric has been shortlisted for THREE awards at the SC Magazine Europe awards. First up, Vormetric Encryption has been shortlisted in two product categories – Best Encryption Solution AND Best Cloud Computing Security Solution – in this year’s awards. We’re delighted that our solution is a contender in both these categories. With constant tales of cyber-attacks and […]

Categories : Data Protection, Encryption            Leave a comment            Tags: , , ,

This week Vormetric announced Application Encryption, a new product enabling organizations to address a greater number of use cases as they implement solutions to achieve compliance and secure data. While Vormetric Transparent Encryption, our transparent file encryption solution, works seamlessly to meet more than 80% of our customers’ Big Data, Database, File Server, and Cloud environment data protection needs, in a recent survey of over 100 Vormetric customers, 43% indicated a need for Application Encryption. Vormetric Application Encryption is effectively […]

Categories : Data Protection, Data Security, Encryption            Leave a comment            Tags: , , , ,

Today Vormetric is pleased to announce our support for the latest line of Intel® Xeon® processor E7 v2 family, further strengthening our partnership. Vormetric’s data security platform utilizes the new chip’s AES-NI encryption enhancements to significantly boost performance and lower encryption times. Intel and Vormetric have established a strong partnership beginning with Vormetric Encryption software exploiting Intel’s new processor level instructions for accelerating computationally intensive encryption algorithms such as the AES (Advanced Encryption Standard). These new instructions are collectively referred […]

Categories : Data Protection, Data Security            Leave a comment            Tags: , , , ,

Just like the rest of the IT Security industry, Vormetric is ramping up for the RSA show later this month.  We’ll be showcasing new products, partnerships and expanded features, as well as giving away some cool stuff (Last year we gave away a Harley ….).  If you are able to attend the show, find us in both North(#2614) and South Halls (#515). But with all the frenzy around the show, we wanted to be sure that some recent large scale […]

Categories : Data Breach, Data Protection, Data Security            Leave a comment            Tags: , , ,

At about this time last year, Bruce Schneier, author of the widely followed Cryptogram newsletter wrote that ‘against a sufficiently skilled, funded, and motivated adversary, no network is secure.’ Unfortunately for many firms this is ringing true. Today, if you look at just the most recent spate of retail breaches – most recent of which being White Lodging, it seems like it’s now easier than ever for attackers to penetrate your perimeter and get to high value data. Now, I […]

Taking Control of Your Cloud Data Security

Posted By: Andy Kicklighter, @akicklighter (Twitter)
05 Mar
Categories : Data Security            Leave a comment            Tags: , , ,

A recent post from ITWorld reporting on the Cloud Security Alliance (CSA) Summit meeting last week at RSA pointed out several unsettling facts for organizations using cloud resources: There is no certification of, or transparency into, the security of a cloud offering Cloud providers’ first priority is to minimize the security impacts on themselves – customers take a back seat The chain of responsibility can be “clouded” – meaning your cloud application or infrastructure provider probably also uses additional resources […]