Welcome!

@CloudExpo Authors: Olivier Huynh Van, Elizabeth White, Jnan Dash, Darren Anstee, Pat Romanski

Blog Feed Post

Porticor’s Latest Release Delivers Industry’s Only Security System for Full Trust and Confidentiality of Data in The Cloud

Mathematically Proven as Secure, Porticor Virtual Private Data System Offers Industry’s First Approach to Uniquely Protect Cloud Data while Stored and in Use

 

TEL AVIV, Israel – Oct. 30, 2012 – Porticor®, a leading cloud data security company delivering the only cloud-based data encryption solution that infuses trust into the cloud and keeps cloud data confidential, today introduced the latest release of its Porticor Virtual Private Data™ (Porticor VPD™) system, which fully protects cloud data while stored and in use, delivering total security to cloud environments which previously were considered untrusted.

Porticor’s VPD system remains the industry’s only solution to fully protect data stored in public, private and hybrid clouds and deliver trust in the security of these environments.  With today’s release, Porticor solves the remaining obstacle to trust in the cloud – protecting the encryption keys of data while they are being used.

With a lack of trust in the cloud, organizations are inhibited from fully leveraging the well-known business benefits the cloud has to offer.  Traditional cloud security solutions put customers’ encryption keys in the possession of the security vendor or cloud provider, and fail to fully protect cloud data and its encryption keys while stored and in use.  Now, organizations can benefit from the latest in cloud encryption technology from Porticor to leverage the benefits of the cloud, all with full confidence that their data will remain confidential, while maintaining compliance and the highest levels of cloud security.

“Potential cloud users worry about two things about information protection in the cloud – protecting it from other tenants and protecting it from the cloud provider,” said Neil MacDonald, VP and Gartner Fellow.  “Encryption is one protection option; however, when the encryption keys are used, data is at risk at that point.  A solution that works completely in the cloud, yet is able to keep the keys protected in memory would help reduce the scope of a possible breach entry point.”

Porticor’s patented Virtual Key Management service, with breakthrough split-key encryption technology uniquely keeps encryption keys in customer’s control, delivering a trusted cloud-based key management system for cloud data at rest.  Now with homomorphic key encryption technology added to its solution, Porticor keeps the master encryption keys fully encrypted and secured even while being used to access cloud data.  With the world’s first commercial application of homomorphic encryption technology, organizations can now fully trust that their cloud data is secure and cannot be compromised both while stored or being accessed.

Unlike traditional data encryption solutions, which are complicated and expensive to deploy and manage, and do not resolve the issue of full security and trust in the cloud, Porticor’s split-key management system is the industry’s first cloud data protection service delivering true trust to the cloud by ensuring customer encryption keys are never exposed.  Porticor is the only cloud data protection system that delivers data security across virtual disks, databases, distributed storage and file systems.  Furthermore, Porticor’s new homomorphic key-encryption approach is open to rigorous mathematical proof and cryptographic analysis under explicit and well-defined mathematical assumptions.  Dr. Alon Rosen, a cryptography expert from the Herzliya Interdisciplinary Center, has independently completed a rigorous analysis, and proves the Porticor system is secure.  For more information on Dr. Rosen’s findings and for a free copy of his analysis and report, see http://www.porticor.com/hkm-analysis.

Homomorphic encryption is a technique that enables mathematical operations to be performed on encrypted data.  Porticor’s patent-pending technology implements partially homomorphic encryption techniques for combining and splitting encryption keys.  It enables the Porticor VPD system to give the application access to the data store without exposing the master keys in an unencrypted state.  This also ensures that if a master key is stolen, it can still never be used to access a data store.

“As part of our solution we often maintain sensitive compliance incident data from our enterprise customers’ public social media presence,” said Devin Redmond, Social iQ Networks CEO and Co-founder.  “Doing so on a cloud infrastructure required us to adopt a different cloud data security approach.  By deploying Porticor we are able to guarantee that our customers’ data is encrypted at all times.  But more importantly, using Porticor’s unique key-splitting and homomorphic key encryption technology, we know that no one but our customers have access to the encryption keys.”

The Porticor VPD system is made up of the Porticor Virtual Appliance and the Porticor Virtual Key Management Service, delivering the industry’s highest level of data privacy in a public environment for data protection and compliance to regulations such as SOX, HIPAA, PCI DSS and GLBA, while also solving the issues raised by EU Data Protection and the U.S. Patriot Act.  Porticor enables IaaS and PaaS cloud users to create a secured environment within minutes while completely eliminating the need to trust a security vendor or cloud provider with their encryption keys, solving the biggest challenge for data encryption in the cloud – protecting the cloud data encryption keys while stored and in use.

“With this release, Porticor enhances the high levels of trust it was already infusing into the cloud with our split-key method to now fully protect cloud data at rest and in use,” said Gilad Parann-Nissany, Porticor founder and CEO.  “Now, organizations can trust their data to the cloud, knowing that their data encryption keys are kept private 100-percent of the time.  Because the encryption keys are never exposed to risk, Porticor’s cloud data security system delivers the highest levels of data security available on premise or in the cloud.”

Pricing and Availability

The new release of Porticor VPD is available today directly from Porticor at http://www.porticor.com/pricing-plans/.  VPD is deployed in the cloud and managed from Porticor’s customer portal.  Pricing starts at $65 per month per Porticor Virtual Appliance.

About Porticor

Porticor is the leading cloud security company delivering easy-to-use and scalable security solutions for cloud data encryption and key management without sacrificing trust.  The Porticor Virtual Private Data (VPD) system is the industry’s first solution combining data encryption, patented split-key management and homomorphic encryption to protect critical data in public, private and hybrid cloud environments.  Within minutes, customers can encrypt their entire data layer with the proven AES 256-bit encryption algorithm.  Porticor is an official Amazon Web Services Solution provider, a VMware Technology Alliance Partner, and supports other clouds, and was the only cloud security semi-finalist in the AWS 2011 Startup Challenge.  The company is headquartered in Tel Aviv, Israel, and is venture backed by Glilot Capital.  For more information, visit: http://www.porticor.com/.

###

Porticor®, Porticor Virtual Private Data™, Porticor Virtual Key Management™, PVKM™ and Porticor VPD™ are trademarks of Porticor. Copyright© Porticor 2012. All other products and/or services referenced are trademarks of their respective companies.

The post Porticor’s Latest Release Delivers Industry’s Only Security System for Full Trust and Confidentiality of Data in The Cloud appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

@CloudExpo Stories
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
Vidyo, Inc., has joined the Alliance for Open Media. The Alliance for Open Media is a non-profit organization working to define and develop media technologies that address the need for an open standard for video compression and delivery over the web. As a member of the Alliance, Vidyo will collaborate with industry leaders in pursuit of an open and royalty-free AOMedia Video codec, AV1. Vidyo’s contributions to the organization will bring to bear its long history of expertise in codec technolo...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...