Welcome!

@CloudExpo Authors: Liz McMillan, Elizabeth White, David Sprott, Kevin Jackson, Pat Romanski

News Feed Item

Porticor Unveils Virtual Private Data System, Industry's First Encryption and Key Management Solution Protecting Cloud Data

Customers Secure Data With Cloud-Based Encryption Built for Homomorphic Key Management That Delivers Security and Trust of On-Premise Data Protection Systems for the Cloud

TEL AVIV, ISRAEL -- (Marketwire) -- 02/15/12 -- Porticor®, the leading cloud data security company delivering the only cloud-based data encryption solution that infuses trust into the cloud by ensuring customer keys are never exposed, today introduced the Porticor Virtual Private Data™ (Porticor VPD™) system, the industry's first solution combining data encryption with patented key management to protect critical data in public, private and hybrid cloud environments.

Until today, the requirements for securing company and customer private data stored in the cloud were not fully met, due to the issue of keys stored in the cloud not being addressed. Now, enterprises can leverage Porticor's patent-pending homomorphic split-key encryption technology to ensure the privacy of data stored in the cloud, and benefit from the industry's only cloud data protection system that delivers data security across virtual disks, databases, distributed storage and file systems.

With today's VPD product introduction, Porticor also announced its formal company launch, addressing businesses' concerns around data security when considering migrating to the cloud. See accompanying company launch announcement issued by Porticor today at: http://www.porticor.com/2012/02/cloud-data-security-launch/.

"In the cloud anyone with access to your management plane (with sufficient rights) can snapshot a volume and move it around," wrote Rich Mogull, analyst at Securosis, in his blog titled How to Encrypt IaaS Volumes. "It only takes 2-3 command lines to snapshot a drive off to object storage, make it public, and then load it up in a hostile environment. So IaaS data encryption protects volumes from snapshot cloning/exposure, protects volumes from being explored by the cloud provider (and private cloud admins), and protects volumes from being exposed by physical loss of drives."

The Porticor VPD system is made up of the Porticor Virtual Appliance and the Porticor Virtual Key Management Service, delivering the industry's highest level of data privacy in a public environment for data protection and compliance to regulations such as SOX, HIPAA, PCI DDS and GLBA, while also solving the issues raised by EU Data Protection and the U.S. Patriot Act. Using a unique, patent-pending technology, Porticor enables IaaS and PaaS cloud users to create a secured environment within minutes while completely eliminating the need to trust a security vendor or cloud provider with their encryption keys, therefore solving the biggest challenge for data encryption in the cloud -- storing the keys.

"Our firm has regulatory and good steward responsibilities for both our client data and company private information, some of which is stored in the cloud," said Steve McAtee, Senior Director of Architecture, IT Risk Management and Security at McGladrey & Pullen LLP, one of the top five U.S. providers of assurance, tax and consulting services. "Porticor's service and knowledge of the Amazon platform has been top notch. As we have examined multi-tenant environments, Porticor has been valuable for my team. Alleviating security concerns in a multi-tenant environment allows us to focus on utilizing multi-tenancy to be agile, and we see how Porticor can help us protect our private client and company data."

Unlike traditional data security solutions which require costly software licenses and operational overhead, Porticor is a cost-effective virtual appliance that requires no encryption or key management experience to encrypt customers' entire data layer with the proven AES 256-bit encryption algorithm within minutes. Unlike today's cloud encryption solutions which put customers' encryption keys in the hands of the security vendor or cloud providers, Porticor's patented Virtual Key Management service, with breakthrough split-key encryption technology, and built for homomorphic key encryption, will uniquely keep the encryption key in the customer's control, delivering a trusted cloud-based key management system.

With Porticor's VDP -- the industry's first and only product designed for homomorphic split-key encryption technology -- each data object, such as a disk or file, is encrypted with a unique key which is split in two: a master key and a specific key. The master key is common to all data objects of one application, and remains the sole possession of the application owner and is unknown to Porticor; while the second specific key is different for each data object and is stored by the Porticor Virtual Key Management Service. As the application accesses the data store, Porticor uses both parts of the key to dynamically encrypt and decrypt the data. When the master key is in the cloud, it will be homomorphically encrypted -- even when in use -- and can never be seen in the cloud.

"Protecting the privacy of employee and customer data has always been a business imperative and a compliance requirement, and today that is heightened as companies migrate to the cloud," said Ariel Dan, Porticor Co-founder, VP Sales and Marketing. "Porticor is launching with the goal of securing cloud data by leveraging a number of patented technologies and industry-first approaches. With a solution that is fully cloud-based, dynamic and elastic, Porticor enables companies of all sizes to keep their data safe, comply with regulatory standards, and streamline operations."

Availability and Pricing
The Porticor VPD system is generally available today directly from Porticor at http://www.porticor.com/pricing-plans/. There is no download required, VPD is deployed in the cloud and managed from Porticor's customer portal. Pricing starts at $27.50 per month per Porticor Virtual Appliance.

About Porticor
Porticor is the leading cloud security company delivering easy-to-use and scalable security solutions for cloud data encryption and key management. The Porticor Virtual Private Data™ (VPD) system is the industry's first solution combining data encryption with patented split-key management to protect critical data in public, private and hybrid cloud environments. Within minutes, customers can encrypt their entire data layer with the proven AES 256-bit encryption algorithm. Using breakthrough split-key encryption technology, and built for homomorphic key encryption, Porticor VPD is the only system available that offers the ease-of-use of cloud-based key management without sacrificing trust. Porticor is an official Amazon Web Services Solution provider, and supports other public clouds, and was the only cloud security semi-finalist in the AWS 2011 Startup Challenge. The company is headquartered in Tel Aviv, Israel, and is venture backed by Glilot Capital. For more information, visit: http://www.porticor.com/.

Porticor®, Porticor Virtual Private Data™, Porticor Virtual Key Management™, Porticor VKM™ and Porticor VPD™ are trademarks of Porticor. Copyright© Porticor 2012. All other products and/or services referenced are trademarks of their respective companies.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Editorial Contact:
Dan Spalding
Spalding Communications, LLC
(408) 960-9297
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@CloudExpo Stories
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, discussed the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filterin...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
Early adopters of IoT viewed it mainly as a different term for machine-to-machine connectivity or M2M. This is understandable since a prerequisite for any IoT solution is the ability to collect and aggregate device data, which is most often presented in a dashboard. The problem is that viewing data in a dashboard requires a human to interpret the results and take manual action, which doesn’t scale to the needs of IoT.
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Much of IT terminology is often misused and misapplied. Modernization and transformation are two such terms. They are often used interchangeably even though they mean different things and have very different connotations. Indeed, it is somewhat safe to assume that in IT any transformative effort is likely to also have a modernizing effect, and thus, we can see these as levels of improvement efforts. However, many businesses are being led to believe if they don’t transform now they risk becoming ...
"We provide DevOps solutions. We also partner with some key players in the DevOps space and we use the technology that we partner with to engineer custom solutions for different organizations," stated Himanshu Chhetri, CTO of Addteq, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
DevOps at Cloud Expo – being held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 companies who successfully scaled up production without building a large QA team and includes: What to consider when choosing CI/CD tools How culture and communication can make or break implementation
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...