|By Gilad Parann-Nissany||
|June 27, 2014 01:42 PM EDT||
VSM: We at Virtual-Strategy Magazine haven’t heard from Porticor in a while. Can you tell me what you have been up to since we last heard from you?
GPN: Certainly. We have been updating the product, ramping the company and have been seeing a significant uptick in traction. On the product side, we have added encryption agents for on-server encryption, and powerful key management API capabilities, which really help cover a wide range of virtual and cloud environment customer use cases. We’re now seeing customers in all sectors that have sensitive data, such as healthcare, finance, legal, utilities and insurance. As a result, we’ve seen sales rise by orders of magnitude.
This has also helped us prime the pump for cooperation with our partners, which has created several joint solutions for Porticor with its partners.
VSM: Yes, I heard Porticor and HP entered into a partnership and integration agreement recently. Can you tell me a little more about that?
GPN: Absolutely. We recently announced the integration of Porticor’s cloud data encryption technology with HP Atalla Cloud Encryption. The new combined solution provides customers with best-of-breed cloud encryption and encryption key management technology to secure sensitive data across virtual environments and public, private or hybrid clouds. Expanding our relationship with HP extends Porticor’s data protection capabilities to span more broadly, from on premise to the cloud. Customers are offered the most secure, convenient and cost-effective solutions for ensuring data security in the cloud and virtual environments.
VSM: What are the most significant threats to organizations’ private data stored in virtual and cloud environments that HP’s new cloud service will look to secure with Porticor?
GPN: In a virtual or cloud environment, an enterprise’s data is no longer within its four walls. A variant of this issue exists in private virtual environments, where isolating a sensitive project from other projects is difficult. This exposes virtualized/cloud users to several threats which are unique to a these environments:
- In a virtualized infrastructure scenario – an attacker could steal the credentials to your cloud management and gain access to all of your virtual disks.
- Enterprises or projects share the same infrastructure and therefore the separation between users is logical and not physical. If attackers gain access to a specific portion of the customer’s virtual account they could exploit a network, virtualization or operating system vulnerability and get access to others’ data stored on a different virtualized portion.
- And we can’t forget the internal threat. It is highly unlikely, but possible, that a cloud provider employee will be involved in data theft. The more realistic scenario is an accidental incident related to an insider with physical access to the data center. But internal employees are targeted by the bad guys these days, knowing they can get through them to the desired data quickly.
The above threats highlight the importance of an effective encryption and key management system in a virtualized environment, which is now also offered as HP Atalla Cloud Encryption, powered by Porticor.
VSM: Are there any other major vendors with solutions already addressing these issues?
GPN: There are some solutions out there, but traditional data security solutions require costly up-front licenses, hardware implementation and operational overhead. Other cloud encryption solutions put enterprises’ encryption keys in the hands of the security vendor or cloud providers. The current solutions are an evolution of security technologies into the cloud virtualized era, and not necessarily built for the cloud, or with the cloud or virtual environments in mind.
VSM: How does this cooperation accelerate overall cloud adoption?
GPN: Well, security should not be an inhibitor to migrating enterprise workloads and data to cloud and virtual environments. As solutions such as Porticor’s Virtual Private Data system are more readily available, organizations will discover that they can trust their data in the cloud, leading to more widespread adoption. Porticor has seen good growth on its own, but imagine the global reach that HP gives us to secure data for organizations worldwide.
VSM: What is different about your solution, which led to HP selecting Porticor? Why is this important?
GPN: Porticor’s patented Virtual Key Management service, with our patented split-key encryption technology and homomorphic key management, keeps the encryption key in the customer’s control, not in the control of the security vendor or cloud provider. Using sophisticated mathematical algorithms, customers can utilize encryption and key management in a 100 percent virtual implementation without scarifying trust. This approach fits nicely to HP’s security and cloud vision as it enables an end-to-end solution, starting with on-premise security, via hybrid cloud deployments, and all the way through pure public cloud implementations.
VSM: What are some of the benefits an organization should expect to experience as a result of this new HP and Porticor engagement? Why is this important?
GPN: Basically, you are outsourcing the complexity of the security solution, but you are keeping the control and trust for yourself. Using our technology, HP and Porticor enable virtual and cloud users to create a secured encrypted environment within minutes while completely eliminating the need to trust the security vendor or cloud provider with their encryption keys, therefore solving the biggest challenge for data encryption in the cloud – storing the keys. This best ensures the privacy of data stored in the cloud and virtual environments.
VSM: So where is this new integrated HP/Porticor product available for virtual and cloud environments?
VSM: What can we expect to see from Porticor in the future?
GPN: Cloud adoption is ever increasing, and while data encryption is important, the true challenge is with cloud key management. Going forward, you should expect much more innovation around this fascinating problem. We are working hard on innovating cloud-specific key management solutions that will “snap-in,” and to encrypt any data object in the cloud, across big data, distributed storage, databases and applications. These are truly exciting times for Porticor.
VSM: It’s been great chatting with you today. Anything else you’d like to share about the state of virtualized data protection or the Porticor solution?
GPN: Thank you, the pleasure was ours! I would like to remind your readers that cloud encryption is much more than protecting cloud data from hackers. Google, Microsoft and other software giants are fighting the US government against the requirement to share customers keys in the US or data hosted in Ireland. These cases could have dramatic implications on US cloud providers, and it is another validation for the importance of encryption key splitting, which puts the encryption keys with the end user, and not the cloud provider.
The post Interview with Gilad Parann-Nissany, Founder and CEO of Porticor appeared first on Porticor Cloud Security.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Dec. 11, 2016 03:00 AM EST Reads: 779
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for s...
Dec. 11, 2016 02:45 AM EST Reads: 895
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2017 New York. The 20th Cloud Expo and 7th @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Internet to enable us all to im...
Dec. 11, 2016 02:30 AM EST Reads: 1,044
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Dec. 11, 2016 01:30 AM EST Reads: 1,742
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dec. 11, 2016 01:15 AM EST Reads: 1,333
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Dec. 11, 2016 12:00 AM EST Reads: 1,129
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
Dec. 11, 2016 12:00 AM EST Reads: 2,400
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
Dec. 11, 2016 12:00 AM EST Reads: 938
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 10, 2016 11:15 PM EST Reads: 1,222
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 10, 2016 09:15 PM EST Reads: 1,357
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
Dec. 10, 2016 07:30 PM EST Reads: 1,825
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Dec. 10, 2016 07:00 PM EST Reads: 4,159
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Dec. 10, 2016 06:30 PM EST Reads: 1,552
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Dec. 10, 2016 06:30 PM EST Reads: 1,973
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Dec. 10, 2016 06:15 PM EST Reads: 1,111
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 10, 2016 05:30 PM EST Reads: 1,015
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Dec. 10, 2016 05:15 PM EST Reads: 1,429
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Dec. 10, 2016 04:30 PM EST Reads: 1,842
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Dec. 10, 2016 04:30 PM EST Reads: 1,935
"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 10, 2016 03:30 PM EST Reads: 950