Welcome!

@CloudExpo Authors: Mehdi Daoudi, Liz McMillan, Yeshim Deniz, Kevin Benedict, Elizabeth White

Blog Feed Post

Porticor’s Latest Release Delivers Industry’s Only Security System for Full Trust and Confidentiality of Data in The Cloud

Mathematically Proven as Secure, Porticor Virtual Private Data System Offers Industry’s First Approach to Uniquely Protect Cloud Data while Stored and in Use

 

TEL AVIV, Israel – Oct. 30, 2012 – Porticor®, a leading cloud data security company delivering the only cloud-based data encryption solution that infuses trust into the cloud and keeps cloud data confidential, today introduced the latest release of its Porticor Virtual Private Data™ (Porticor VPD™) system, which fully protects cloud data while stored and in use, delivering total security to cloud environments which previously were considered untrusted.

Porticor’s VPD system remains the industry’s only solution to fully protect data stored in public, private and hybrid clouds and deliver trust in the security of these environments.  With today’s release, Porticor solves the remaining obstacle to trust in the cloud – protecting the encryption keys of data while they are being used.

With a lack of trust in the cloud, organizations are inhibited from fully leveraging the well-known business benefits the cloud has to offer.  Traditional cloud security solutions put customers’ encryption keys in the possession of the security vendor or cloud provider, and fail to fully protect cloud data and its encryption keys while stored and in use.  Now, organizations can benefit from the latest in cloud encryption technology from Porticor to leverage the benefits of the cloud, all with full confidence that their data will remain confidential, while maintaining compliance and the highest levels of cloud security.

“Potential cloud users worry about two things about information protection in the cloud – protecting it from other tenants and protecting it from the cloud provider,” said Neil MacDonald, VP and Gartner Fellow.  “Encryption is one protection option; however, when the encryption keys are used, data is at risk at that point.  A solution that works completely in the cloud, yet is able to keep the keys protected in memory would help reduce the scope of a possible breach entry point.”

Porticor’s patented Virtual Key Management service, with breakthrough split-key encryption technology uniquely keeps encryption keys in customer’s control, delivering a trusted cloud-based key management system for cloud data at rest.  Now with homomorphic key encryption technology added to its solution, Porticor keeps the master encryption keys fully encrypted and secured even while being used to access cloud data.  With the world’s first commercial application of homomorphic encryption technology, organizations can now fully trust that their cloud data is secure and cannot be compromised both while stored or being accessed.

Unlike traditional data encryption solutions, which are complicated and expensive to deploy and manage, and do not resolve the issue of full security and trust in the cloud, Porticor’s split-key management system is the industry’s first cloud data protection service delivering true trust to the cloud by ensuring customer encryption keys are never exposed.  Porticor is the only cloud data protection system that delivers data security across virtual disks, databases, distributed storage and file systems.  Furthermore, Porticor’s new homomorphic key-encryption approach is open to rigorous mathematical proof and cryptographic analysis under explicit and well-defined mathematical assumptions.  Dr. Alon Rosen, a cryptography expert from the Herzliya Interdisciplinary Center, has independently completed a rigorous analysis, and proves the Porticor system is secure.  For more information on Dr. Rosen’s findings and for a free copy of his analysis and report, see http://www.porticor.com/hkm-analysis.

Homomorphic encryption is a technique that enables mathematical operations to be performed on encrypted data.  Porticor’s patent-pending technology implements partially homomorphic encryption techniques for combining and splitting encryption keys.  It enables the Porticor VPD system to give the application access to the data store without exposing the master keys in an unencrypted state.  This also ensures that if a master key is stolen, it can still never be used to access a data store.

“As part of our solution we often maintain sensitive compliance incident data from our enterprise customers’ public social media presence,” said Devin Redmond, Social iQ Networks CEO and Co-founder.  “Doing so on a cloud infrastructure required us to adopt a different cloud data security approach.  By deploying Porticor we are able to guarantee that our customers’ data is encrypted at all times.  But more importantly, using Porticor’s unique key-splitting and homomorphic key encryption technology, we know that no one but our customers have access to the encryption keys.”

The Porticor VPD system is made up of the Porticor Virtual Appliance and the Porticor Virtual Key Management Service, delivering the industry’s highest level of data privacy in a public environment for data protection and compliance to regulations such as SOX, HIPAA, PCI DSS and GLBA, while also solving the issues raised by EU Data Protection and the U.S. Patriot Act.  Porticor enables IaaS and PaaS cloud users to create a secured environment within minutes while completely eliminating the need to trust a security vendor or cloud provider with their encryption keys, solving the biggest challenge for data encryption in the cloud – protecting the cloud data encryption keys while stored and in use.

“With this release, Porticor enhances the high levels of trust it was already infusing into the cloud with our split-key method to now fully protect cloud data at rest and in use,” said Gilad Parann-Nissany, Porticor founder and CEO.  “Now, organizations can trust their data to the cloud, knowing that their data encryption keys are kept private 100-percent of the time.  Because the encryption keys are never exposed to risk, Porticor’s cloud data security system delivers the highest levels of data security available on premise or in the cloud.”

Pricing and Availability

The new release of Porticor VPD is available today directly from Porticor at http://www.porticor.com/pricing-plans/.  VPD is deployed in the cloud and managed from Porticor’s customer portal.  Pricing starts at $65 per month per Porticor Virtual Appliance.

About Porticor

Porticor is the leading cloud security company delivering easy-to-use and scalable security solutions for cloud data encryption and key management without sacrificing trust.  The Porticor Virtual Private Data (VPD) system is the industry’s first solution combining data encryption, patented split-key management and homomorphic encryption to protect critical data in public, private and hybrid cloud environments.  Within minutes, customers can encrypt their entire data layer with the proven AES 256-bit encryption algorithm.  Porticor is an official Amazon Web Services Solution provider, a VMware Technology Alliance Partner, and supports other clouds, and was the only cloud security semi-finalist in the AWS 2011 Startup Challenge.  The company is headquartered in Tel Aviv, Israel, and is venture backed by Glilot Capital.  For more information, visit: http://www.porticor.com/.

###

Porticor®, Porticor Virtual Private Data™, Porticor Virtual Key Management™, PVKM™ and Porticor VPD™ are trademarks of Porticor. Copyright© Porticor 2012. All other products and/or services referenced are trademarks of their respective companies.

The post Porticor’s Latest Release Delivers Industry’s Only Security System for Full Trust and Confidentiality of Data in The Cloud appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

@CloudExpo Stories
As more and more companies are making the shift from on-premises to public cloud, the standard approach to DevOps is evolving. From encryption, compliance and regulations like GDPR, security in the cloud has become a hot topic. Many DevOps-focused companies have hired dedicated staff to fulfill these requirements, often creating further siloes, complexity and cost. This session aims to highlight existing DevOps cultural approaches, tooling and how security can be wrapped in every facet of the bu...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Translating agile methodology into real-world best practices within the modern software factory has driven widespread DevOps adoption, yet much work remains to expand workflows and tooling across the enterprise. As models evolve from pockets of experimentation into wholescale organizational reinvention, practitioners find themselves challenged to incorporate the culture and architecture necessary to support DevOps at scale.
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
IT organizations are moving to the cloud in hopes to approve efficiency, increase agility and save money. Migrating workloads might seem like a simple task, but what many businesses don’t realize is that application migration criteria differs across organizations, making it difficult for architects to arrive at an accurate TCO number. In his session at 21st Cloud Expo, Joe Kinsella, CTO of CloudHealth Technologies, will offer a systematic approach to understanding the TCO of a cloud application...
An increasing number of companies are creating products that combine data with analytical capabilities. Running interactive queries on Big Data requires complex architectures to store and query data effectively, typically involving data streams, an choosing efficient file format/database and multiple independent systems that are tied together through custom-engineered pipelines. In his session at @BigDataExpo at @ThingsExpo, Tomer Levi, a senior software engineer at Intel’s Advanced Analytics ...
"With Digital Experience Monitoring what used to be a simple visit to a web page has exploded into app on phones, data from social media feeds, competitive benchmarking - these are all components that are only available because of some type of digital asset," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Secure Channels, a cybersecurity firm, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Secure Channels, Inc. offers several products and solutions to its many clients, helping them protect critical data from being compromised and access to computer networks from the unauthorized. The company develops comprehensive data encryption security strategie...
The goal of Continuous Testing is to shift testing left to find defects earlier and release software faster. This can be achieved by integrating a set of open source functional and performance testing tools in the early stages of your software delivery lifecycle. There is one process that binds all application delivery stages together into one well-orchestrated machine: Continuous Testing. Continuous Testing is the conveyer belt between the Software Factory and production stages. Artifacts are m...
Cloud resources, although available in abundance, are inherently volatile. For transactional computing, like ERP and most enterprise software, this is a challenge as transactional integrity and data fidelity is paramount – making it a challenge to create cloud native applications while relying on RDBMS. In his session at 21st Cloud Expo, Claus Jepsen, Chief Architect and Head of Innovation Labs at Unit4, will explore that in order to create distributed and scalable solutions ensuring high availa...
Cloud adoption is often driven by a desire to increase efficiency, boost agility and save money. All too often, however, the reality involves unpredictable cost spikes and lack of oversight due to resource limitations. In his session at 20th Cloud Expo, Joe Kinsella, CTO and Founder of CloudHealth Technologies, tackled the question: “How do you build a fully optimized cloud?” He will examine: Why TCO is critical to achieving cloud success – and why attendees should be thinking holistically abo...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. Jack Norris reviews best practices to show how companies develop, deploy, and dynamically update these applications and how this data-first...
Intelligent Automation is now one of the key business imperatives for CIOs and CISOs impacting all areas of business today. In his session at 21st Cloud Expo, Brian Boeggeman, VP Alliances & Partnerships at Ayehu, will talk about how business value is created and delivered through intelligent automation to today’s enterprises. The open ecosystem platform approach toward Intelligent Automation that Ayehu delivers to the market is core to enabling the creation of the self-driving enterprise.
"We're here to tell the world about our cloud-scale infrastructure that we have at Juniper combined with the world-class security that we put into the cloud," explained Lisa Guess, VP of Systems Engineering at Juniper Networks, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Historically, some banking activities such as trading have been relying heavily on analytics and cutting edge algorithmic tools. The coming of age of powerful data analytics solutions combined with the development of intelligent algorithms have created new opportunities for financial institutions. In his session at 20th Cloud Expo, Sebastien Meunier, Head of Digital for North America at Chappuis Halder & Co., discussed how these tools can be leveraged to develop a lasting competitive advantage ...
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
The question before companies today is not whether to become intelligent, it’s a question of how and how fast. The key is to adopt and deploy an intelligent application strategy while simultaneously preparing to scale that intelligence. In her session at 21st Cloud Expo, Sangeeta Chakraborty, Chief Customer Officer at Ayasdi, will provide a tactical framework to become a truly intelligent enterprise, including how to identify the right applications for AI, how to build a Center of Excellence to ...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.