Click here to close now.

Welcome!

Search Authors: Plutora Blog, Liz McMillan, AppDynamics Blog, Elizabeth White, Carmen Gonzalez

Blog Feed Post

Interview with Gilad Parann-Nissany, Founder and CEO of Porticor

 virtual strategy magazine Interview with Gilad Parann Nissany, Founder and CEO of PorticorVSM: We at Virtual-Strategy Magazine haven’t heard from Porticor in a while. Can you tell me what you have been up to since we last heard from you?

GPN: Certainly. We have been updating the product, ramping the company and have been seeing a significant uptick in traction. On the product side, we have added encryption agents for on-server encryption, and powerful key management API capabilities, which really help cover a wide range of virtual and cloud environment customer use cases. We’re now seeing customers in all sectors that have sensitive data, such as healthcare, finance, legal, utilities and insurance. As a result, we’ve seen sales rise by orders of magnitude.

This has also helped us prime the pump for cooperation with our partners, which has created several joint solutions for Porticor with its partners.

VSM: Yes, I heard Porticor and HP entered into a partnership and integration agreement recently. Can you tell me a little more about that?

GPN: Absolutely. We recently announced the integration of Porticor’s cloud data encryption technology with HP Atalla Cloud Encryption. The new combined solution provides customers with best-of-breed cloud encryption and encryption key management technology to secure sensitive data across virtual environments and public, private or hybrid clouds. Expanding our relationship with HP extends Porticor’s data protection capabilities to span more broadly, from on premise to the cloud. Customers are offered the most secure, convenient and cost-effective solutions for ensuring data security in the cloud and virtual environments.

VSM: What are the most significant threats to organizations’ private data stored in virtual and cloud environments that HP’s new cloud service will look to secure with Porticor?

GPN: In a virtual or cloud environment, an enterprise’s data is no longer within its four walls. A variant of this issue exists in private virtual environments, where isolating a sensitive project from other projects is difficult. This exposes virtualized/cloud users to several threats which are unique to a these environments:

  1. In a virtualized infrastructure scenario – an attacker could steal the credentials to your cloud management and gain access to all of your virtual disks.
  2. Enterprises or projects share the same infrastructure and therefore the separation between users is logical and not physical. If attackers gain access to a specific portion of the customer’s virtual account they could exploit a network, virtualization or operating system vulnerability and get access to others’ data stored on a different virtualized portion.
  3. And we can’t forget the internal threat. It is highly unlikely, but possible, that a cloud provider employee will be involved in data theft. The more realistic scenario is an accidental incident related to an insider with physical access to the data center. But internal employees are targeted by the bad guys these days, knowing they can get through them to the desired data quickly.

The above threats highlight the importance of an effective encryption and key management system in a virtualized environment, which is now also offered as HP Atalla Cloud Encryption, powered by Porticor.

VSM: Are there any other major vendors with solutions already addressing these issues?

GPN: There are some solutions out there, but traditional data security solutions require costly up-front licenses, hardware implementation and operational overhead. Other cloud encryption solutions put enterprises’ encryption keys in the hands of the security vendor or cloud providers. The current solutions are an evolution of security technologies into the cloud virtualized era, and not necessarily built for the cloud, or with the cloud or virtual environments in mind.

VSM: How does this cooperation accelerate overall cloud adoption?

GPN: Well, security should not be an inhibitor to migrating enterprise workloads and data to cloud and virtual environments. As solutions such as Porticor’s Virtual Private Data system are more readily available, organizations will discover that they can trust their data in the cloud, leading to more widespread adoption. Porticor has seen good growth on its own, but imagine the global reach that HP gives us to secure data for organizations worldwide.

VSM: What is different about your solution, which led to HP selecting Porticor?  Why is this important?

GPN: Porticor’s patented Virtual Key Management service, with our patented split-key encryption technology and homomorphic key management, keeps the encryption key in the customer’s control, not in the control of the security vendor or cloud provider. Using sophisticated mathematical algorithms, customers can utilize encryption and key management in a 100 percent virtual implementation without scarifying trust. This approach fits nicely to HP’s security and cloud vision as it enables an end-to-end solution, starting with on-premise security, via hybrid cloud deployments, and all the way through pure public cloud implementations.

VSM: What are some of the benefits an organization should expect to experience as a result of this new HP and Porticor engagement? Why is this important?

GPN: Basically, you are outsourcing the complexity of the security solution, but you are keeping the control and trust for yourself. Using our technology, HP and Porticor enable virtual and cloud users to create a secured encrypted environment within minutes while completely eliminating the need to trust the security vendor or cloud provider with their encryption keys, therefore solving the biggest challenge for data encryption in the cloud – storing the keys. This best ensures the privacy of data stored in the cloud and virtual environments.

VSM: So where is this new integrated HP/Porticor product available for virtual and cloud environments?

GPN: Additional information and trial details about HP Atalla Cloud Encryption are available on HP’s website here.

VSM: What can we expect to see from Porticor in the future?

GPN: Cloud adoption is ever increasing, and while data encryption is important, the true challenge is with cloud key management. Going forward, you should expect much more innovation around this fascinating problem. We are working hard on innovating cloud-specific key management solutions that will “snap-in,” and to encrypt any data object in the cloud, across big data, distributed storage, databases and applications. These are truly exciting times for Porticor.

 

VSM: It’s been great chatting with you today. Anything else you’d like to share about the state of virtualized data protection or the Porticor solution?

GPN: Thank you, the pleasure was ours! I would like to remind your readers that cloud encryption is much more than protecting cloud data from hackers. Google, Microsoft and other software giants are fighting the US government against the requirement to share customers keys in the US or data hosted in Ireland. These cases could have dramatic implications on US cloud providers, and it is another validation for the importance of encryption key splitting, which puts the encryption keys with the end user, and not the cloud provider.

The post Interview with Gilad Parann-Nissany, Founder and CEO of Porticor appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

@ThingsExpo Stories
Docker is an excellent platform for organizations interested in running microservices. It offers portability and consistency between development and production environments, quick provisioning times, and a simple way to isolate services. In his session at DevOps Summit at 16th Cloud Expo, Shannon Williams, co-founder of Rancher Labs, will walk through these and other benefits of using Docker to run microservices, and provide an overview of RancherOS, a minimalist distribution of Linux designed expressly to run Docker. He will also discuss Rancher, an orchestration and service discovery platf...
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add scalable realtime functionality with minimal effort and cost.”
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness, and in-car entertainment and this excitement will bleed into other areas. On the commercial side, m...
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, including what it is today, what it might ultimately be, the role of wearable tech, and technology gaps stil...
Every innovation or invention was originally a daydream. You like to imagine a “what-if” scenario. And with all the attention being paid to the so-called Internet of Things (IoT) you don’t have to stretch the imagination too much to see how this may impact commercial and homeowners insurance. We’re beyond the point of accepting this as a leap of faith. The groundwork is laid. Now it’s just a matter of time. We can thank the inventors of smart thermostats for developing a practical business application that everyone can relate to. Gone are the salad days of smart home apps, the early chalkb...
In the consumer IoT, everything is new, and the IT world of bits and bytes holds sway. But industrial and commercial realms encompass operational technology (OT) that has been around for 25 or 50 years. This grittier, pre-IP, more hands-on world has much to gain from Industrial IoT (IIoT) applications and principles. But adding sensors and wireless connectivity won’t work in environments that demand unwavering reliability and performance. In his session at @ThingsExpo, Ron Sege, CEO of Echelon, will discuss how as enterprise IT embraces other IoT-related technology trends, enterprises with i...
When it comes to the Internet of Things, hooking up will get you only so far. If you want customers to commit, you need to go beyond simply connecting products. You need to use the devices themselves to transform how you engage with every customer and how you manage the entire product lifecycle. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, will show how “product relationship management” can help you leverage your connected devices and the data they generate about customer usage and product performance to deliver extremely compelling and reliabl...
The Internet of Things (IoT) is causing data centers to become radically decentralized and atomized within a new paradigm known as “fog computing.” To support IoT applications, such as connected cars and smart grids, data centers' core functions will be decentralized out to the network's edges and endpoints (aka “fogs”). As this trend takes hold, Big Data analytics platforms will focus on high-volume log analysis (aka “logs”) and rely heavily on cognitive-computing algorithms (aka “cogs”) to make sense of it all.
With several hundred implementations of IoT-enabled solutions in the past 12 months alone, this session will focus on experience over the art of the possible. Many can only imagine the most advanced telematics platform ever deployed, supporting millions of customers, producing tens of thousands events or GBs per trip, and hundreds of TBs per month. With the ability to support a billion sensor events per second, over 30PB of warm data for analytics, and hundreds of PBs for an data analytics archive, in his session at @ThingsExpo, Jim Kaskade, Vice President and General Manager, Big Data & Ana...
One of the biggest impacts of the Internet of Things is and will continue to be on data; specifically data volume, management and usage. Companies are scrambling to adapt to this new and unpredictable data reality with legacy infrastructure that cannot handle the speed and volume of data. In his session at @ThingsExpo, Don DeLoach, CEO and president of Infobright, will discuss how companies need to rethink their data infrastructure to participate in the IoT, including: Data storage: Understanding the kinds of data: structured, unstructured, big/small? Analytics: What kinds and how responsiv...
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use cases.
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing demand and the rapidly changing workspace model.
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, including what it is today, what it might ultimately be, the role of wearable tech, and technology gaps stil...
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. He discussed opportunities and challenges ahead for the IoT from a market and technical point of vie...
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what the future may hold. Mike Kavis is Vice President & Principal Cloud Architect at Cloud Technology Pa...
Hadoop as a Service (as offered by handful of niche vendors now) is a cloud computing solution that makes medium and large-scale data processing accessible, easy, fast and inexpensive. In his session at Big Data Expo, Kumar Ramamurthy, Vice President and Chief Technologist, EIM & Big Data, at Virtusa, will discuss how this is achieved by eliminating the operational challenges of running Hadoop, so one can focus on business growth. The fragmented Hadoop distribution world and various PaaS solutions that provide a Hadoop flavor either make choices for customers very flexible in the name of opti...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
Advanced Persistent Threats (APTs) are increasing at an unprecedented rate. The threat landscape of today is drastically different than just a few years ago. Attacks are much more organized and sophisticated. They are harder to detect and even harder to anticipate. In the foreseeable future it's going to get a whole lot harder. Everything you know today will change. Keeping up with this changing landscape is already a daunting task. Your organization needs to use the latest tools, methods and expertise to guard against those threats. But will that be enough? In the foreseeable future attacks w...