Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Pat Romanski, Elizabeth White, Yeshim Deniz, Liz McMillan

News Feed Item

Vormetric Vault Prevents Downtime and Revenue Loss Associated with Expired Digital Certificates and Lost or Stolen Encryption Keys

Vormetric, Inc., the leader in enterprise data security, today announced Vormetric Vault, an all-in-one scalable solution for protecting and managing digital certificates, encryption keys and other security objects such as password files. By securing these assets and automating reporting and tracking processes, Vormetric Vault prevents the downtime and revenue loss that can occur when keys are lost or stolen, or when certificates expire or become misplaced. Vormetric Vault supports a wide range of security objects, including certificates, symmetric keys, asymmetric keys and files.

Click to Tweet: @Vormetric Vault automates #encryption certificate/key management and protection http://bit.ly/KgtDYZ

Vaulting, Reporting and Alerting

Vormetric Vault is the newest addition to the Vormetric Data Security platform, which includes Vormetric Encryption and Vormetric Key Management. Vormetric products enable enterprises to secure sensitive data at rest and protect security materials, including certificates, as well as control access to this information and report on who is accessing it. Vormetric Data Security supports all major platforms – LinuxTM, Unix®, Windows® – and can be used in physical, virtual and cloud environments.

For secure storage of certificates, keys and other security objects, Vormetric Vault is FIPS 140-2 certified and is integrated with the Vormetric Data Security Manager (DSM). Vormetric’s DSM provides centralized key and policy management and can be clustered for high availability. Administration and reporting are performed via a Web GUI, while a software tool provides bulk key import, ingest, renewal and removal.

Vormetric Vault provides the following capabilities:

Vaulting: securely stores certificates, keys, and other sensitive materials such as password files, credit card numbers, etc.

Reporting: centralizes tracking and reporting on vaulted objects to eliminate the need for manual spreadsheet-based management processes. This also facilitates responding to certificate authority breach inquiries.

Alerting: automatically notifies IT staff when vaulted objects are about to expire and require renewal, to prevent application downtime from expiring certificates.

“Even the strongest form of encryption cannot protect data if the keys are stolen, and expired certificates can make data inaccessible, leading to frustration and costly downtime,” said Ashvin Kamaraju, vice president of product development for Vormetric. “Vormetric Vault mitigates the risk of stolen encryption keys or expired certificates in one automated, easy-to-use solution that takes the guess work out of managing and securing large numbers of these objects.”

Availability

Vormetric Vault is available immediately from Vormetric and its business partners worldwide.

About Vormetric

Vormetric (@Vormetric) is the leader in enterprise encryption for physical, virtual and cloud environments. The Vormetric Data Security product line provides a single, manageable and scalable solution to manage any key and encrypt any file, any database, any application, anywhere it resides— without sacrificing application performance and avoiding key management complexity. Some of the largest and most security-conscious organizations and government agencies in the world, including 17 of the Fortune 25, have standardized on Vormetric to provide strong, easily manageable data security. Vormetric technology has previously been selected by IBM as the database encryption solution for DB2 and Informix on Linux, Unix and Windows; and by Symantec to provide the Symantec Veritas NetBackupTM Media Server Encryption Option. For more information, visit www.vormetric.com.

Vormetric is a trademark of Vormetric, Inc. All other names mentioned are trademarks, registered trademarks or service marks of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-centric compute for the most data-intensive applications. Hyperconverged systems already in place can be revitalized with vendor-agnostic, PCIe-deployed, disaggregated approach to composable, maximizing the value of previous investments.
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the steps so your team's apps not only function but also can be monitored and understood from their machine data when running in production.
A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organizers to pass great deals to great conferences, helping you discover new conferences and increase your return on investment.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure using the Kublr platform, and how Kubernetes objects, such as persistent volumes, ingress rules, and services, can be used to abstract from the infrastructure.