Welcome!

@CloudExpo Authors: Craig Lowell, Scott Millis, Kevin Benedict, Liz McMillan, Chris Kocher

Blog Feed Post

Interview with Gilad Parann-Nissany of Porticor

 logo virtual Interview with Gilad Parann Nissany of Porticor

 

 

(Originally posted by Virtual Strategy Magazine here)

VSM: It’s been a while since we’ve spoken, not since Q1 around Porticor’s company and initial product launch. What has the company been up to?

GPN: Thank you for asking. Porticor has been growing on the customer and partner front, and working hard on product innovations, which is why we are talking today. Since our launch we have signed key partnerships, including with Amazon Web Services, VMware, and HP. Customers and the industry continue to validate our solution, and Porticor this year has won some significant industry honors, including being named as the Most Innovative Company of the Year by the Stevie Awards Program.

VSM: And you have a new major release with the Porticor Virtual Private Data security solution? Can you tell us about it?

GPN: Yes, we have extended the functionality of the Porticor Virtual Data system to now protect and keep confidential the encryption keys while they are in use, further protecting data in virtual and cloud environments. As a result, we are helping to assure organizations that they can trust their virtual and cloud data to be safe.

VSM: How is this different than what Porticor previously released to protect organizations’ private data stored in virtual and cloud environments?

GPN: Porticor’s new release protects the encryption keys while in use, and previously the solution protected only data at rest. Specifically, the earlier solution introduced the industry to our patented split-key encryption technology, which protects data encryption keys while they are stored (at rest) by keeping the keys safely in the hands of the customer, not the security vendor or cloud service provider. We have now added the additional security assurance to protect the encryption keys even while in use.

VSM: What are the new use cases that can now be achieved securely in the cloud, and why?

GPN: With this new solution, there are many new private cloud and public cloud use case applications that open up. For example, a virtual bank service that must segregate and encrypt users’ data can now fully benefit from a virtual environment using this solution. Using Porticor, the ISV can now provide a secured virtual bank service while using a public cloud infrastructure. The ISV does not trust anyone but itself with the encryption keys and provides trust and control to its end users, while knowing the most sensitive data – its encryption keys – are secured while at rest and while in use.

VSM: Aren’t there current solutions already available addressing these issues?

GPN: No solution available keeps data encryption keys securely in the hands of the customer; and specific to Porticor’s new release, no solution available protects encryption keys while they are in use to fully secure virtual and cloud data. This is because of an innovation Porticor has rolled out which is the industry’s first commercial use of a highly technical mathematical algorithm called partially-homomorphic encryption technology.

VSM: Can you describe homomorphic technology, and how it’s used to protect virtual and cloud data?

GPN: Homomorphic encryption is a technique that enables mathematical operations to be performed on encrypted data. Porticor’s patent-pending technology implements partially homomorphic encryption techniques for combining and splitting encryption keys. It enables the Porticor VPD system to give the application access to the virtual and cloud data store without exposing the keys in an unencrypted state. This also ensures that if a master key is stolen, it can still never be used to break the entire virtual and cloud data store.

VSM: What is different about your solution? Why is this important?

GPN: Porticor’s system is the industry’s first data protection service delivering true trust to virtual and cloud environments by ensuring customer encryption keys are never exposed, either at rest (stored) or in use. Porticor is also the only data protection system that delivers data security across virtual disks, databases, distributed storage and file systems. This is important because Porticor solves the remaining obstacle to trust in the cloud – protecting the entire data store while keeping the encryption keys secure at all times.

VSM: What are some of the other benefits of this new technology?

GPN: With a lack of trust in the cloud, organizations are inhibited from fully leveraging the well-known business benefits the cloud has to offer. Now, organizations can benefit from the latest in cloud encryption technology from Porticor to leverage the benefits of the cloud, all with full confidence that their data will remain confidential, while maintaining compliance and the highest levels of cloud security. Being fully secure, Porticor also helps organizations meet compliance requirements for regulations such as SOX, HIPAA, PCI DSS, GLBA, EU Data Protection and the US Patriot Act, in these virtual and cloud environments.

VSM: What can we expect to see from Porticor in 2013?

GPN: Porticor’s unique technologies are essentially a “root of trust” for private and public cloud users. During 2013 we expect to continue strong growth with customers in industries like Finance, Health, Insurance, Media and Manufacturing. This allows them to adopt private and public clouds while being defended against a significant variety of threats.

VSM: It’s been great chatting with you today. Anything else you’d like to share about the state of virtualized data protection or the new Porticor solution?

GPN: This is the first commercial application of this type of homomorphic key encryption technique, and I know that many are unfamiliar with it. Porticor’s approach is unique in that it is open to rigorous mathematical proof and cryptographic analysis under explicit and well defined assumptions. For example, Dr. Alon Rosen, a Cryptography expert from the School of Computer Science at the Herzliya Interdisciplnary Center, has independently performed rigorous analysis, resulting in a proof that the approach and its associated protocols “securely realize the intended functionality.”

The post Interview with Gilad Parann-Nissany of Porticor appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

@CloudExpo Stories
Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th...
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We are a modern development application platform and we have a suite of products that allow you to application release automation, we do version control, and we do application life cycle management," explained Flint Brenton, CEO of CollabNet, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"Venafi has a platform that allows you to manage, centralize and automate the complete life cycle of keys and certificates within the organization," explained Gina Osmond, Sr. Field Marketing Manager at Venafi, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, shared the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effici...