Data Security

PhoenixNAP to Launch Data Security Cloud in Collaboration with VMware

Grazed from PhoenixNAP

PhoenixNAP, a global IT services provider offering cloud, bare-metal dedicated server, colocation, and Infrastructure-as-a-Service (IaaS) solutions, today announced the upcoming launch of its Data Security Cloud - a new cloud security platform architected on the latest VMware technologies. PhoenixNAP's Data Security Cloud will address growing security concerns for businesses of all sizes and across industries, including those with heavy compliance and security demands to protect their workloads in the cloud.

According to reports, more than 90 percent of traffic resides within the data center, where perimeter security protections do not inspect the traffic*, and the average data center experiences two successful attacks per day**. The problem is growing quickly as almost two billion data records around the world were lost or stolen during 918 different cyberattacks in the first half of 2017, an increase of 164 percent over the same period last year. The toll on businesses is significant: two-thirds of firms breached had their share price negatively impacted with a cost to shareholders of over $52.40 billion. Today the question for business and security leaders is not if there will be a breach but when and how to contain the impact.

WinMagic Enters Amazon Web Services (AWS) Marketplace With SecureDoc CloudVM

Grazed from WinMagic

In its mission to secure the agility and flexibility of cloud computing environments, today WinMagic announced the immediate availability of SecureDoc CloudVM in the Amazon Web Services Marketplace. WinMagic, an award-winning encryption and intelligent key management security solution provider, is now featured on the Marketplace's Software Infrastructure + Security category, bringing key management, volume and full disk encryption for customers operating on AWS cloud computing infrastructure. By combining WinMagic's SecureDoc CloudVM data security solution with the agility and elasticity of AWS public cloud services, enterprises can focus on driving business value, rather than trying to manage multiple security solutions.

"With over 1 Million active enterprise customers, Amazon Web Services' Marketplace provides a channel with near endless opportunity for WinMagic," states James LaPalme, VP of Cloud Solutions, WinMagic. "These enterprises have moved to the cloud to harness their greater need for agility, security, and efficiency. SecureDoc CloudVM provides customers greater control and certainty over their data security with an intelligent enterprise-controlled, Cloud-agnostic key management & encryption solution, protecting their sensitive data, no matter where it resides -- helping ensure enterprises realize Cloud benefits to their full potential."

Data Security Guidance for Small Businesses

With high profile cyber attacks occurring on a regular basis, people who run small businesses are becoming increasingly concerned about their data security processes. For regulated businesses, there is a requirement to provide evidence that the company complies with the minimum requirements. For small businesses that don't have the same level of scrutiny as the larger, highly regulated businesses it can be harder to find support and guidance on responsibilities. 

However, businesses of all sizes must start paying more attention to the threat of cyber attacks, given that the type of businesses that criminals are targeting varies from a small start-up business to a global company that is a household name. Recently we have seen numerous cyber attacks hitting the news headlines, such as payday loan company Wonga who was subjected to an attack, leaving 245,000 customers affected. 

Datrium Introduces Industry-First Blanket Encryption for Private Clouds

Grazed from Datrium

Datrium, the leading provider of Open Convergence for cloud builders, today announced Datrium Blanket Encryption, an industry-first software product that combines always-on efficient deduplication and compression technology with high-speed, end-to-end encryption: in use at the host, in flight across the network and at rest on persistent storage.

The number of breaches within the US have quadrupled from 2005 to 2015, and the year 2016 accounted for seven of the ten biggest data breaches ever. With threats rising, the requirement to encrypt data everywhere - from host-to-storage, between hosts, and between sites - is becoming standard. However, leading storage arrays and hyper-converged systems only protect data at rest and do not protect against host or network intrusions. Guest operating systems and hypervisors offer encryption at the source, but at the expense of data reduction required by the economics of modern flash storage.

Security and Economics Without Compromise
Datrium offers a fundamentally new and comprehensive approach.  By deduplicating and compressing data, then encrypting while it is still in the application host's memory (RAM), Datrium Blanket Encryption can then move data across hosts, networks and storage that is always encrypted and efficient. 

mLab Announces Encryption-at-Rest for Hosted MongoDB Databases

Grazed from mLab

mLab, the fully managed cloud Database-as-a-Service (DBaaS) for MongoDB, today announced that the platform’s most popular plans now include encryption-at-rest. This additional, opt-in data security measure will be available for customers at no additional cost.

mLab is making encryption-at-rest available to its Database-as-a-Service customers on Dedicated Standard and High Storage plans, covering deployments across both Amazon Web Services and Google Cloud Platform. Already offering customers in-flight encryption via SSL to secure data transmission over networks, encryption-at-rest furthers mLab’s commitment to enterprise security by encrypting data on disks and wherever backups are stored. The feature is designed so that there will be minimal performance impact on the database.
 

SaberLogic Releases New SaaS Product to Provide Secure Mobile Access to Enterprise Data

Grazed from SaberLogic

SaberLogic has released Bezlio, a new SaaS product that makes it easy for companies to provide data from sources like ERP and accounting systems to any PC or device, including mobile devices like smartphones (iPhone and Android) and tablets. The software uses a unique process of transferring data securely without opening any holes in the firewall or storing any information in the cloud. 

How It Works

Bezlio uses a secure, token-based system through an encrypted cloud-based communication network to connect the data that sits behind your firewall, inside of your private network, with any trusted mobile device across the Internet.  Administrators can control which users are permitted to connect and the data they can read and edit. 

HyTrust Cloud Survey Finds Enterprises Are Rapidly Embracing Multi-Cloud Strategies, Slacking on Data Encryption and Security

Grazed from HyTrust

Today, HyTrust Inc., a leading workload security provider, announced findings from its latest cloud survey conducted at VMworld 2016, in Las Vegas. The survey of over 400 respondents assesses the current use of public cloud vendors, the industry shift to utilizing a multi-cloud model, and how enterprises are protecting data in these cloud environments.

The results, which highlight enterprise preferences for key public cloud providers including Amazon Web Services (AWS), Microsoft Azure, IBM Cloud, and VMware's vCloud Air, also found that more than a quarter of organizations deploying data, applications, and workloads to public cloud ecosystems are not using any form of encryption, leaving sensitive data vulnerable to breaches. As we see more and more enterprises move critical data to multiple clouds, the lack of data security and encryption is not only counter to security being named the leading concern, but it may become even more of an issue with broader negative consequences.

Don't Rush Into Containers Without a Security Strategy - Join this Beta Program

Written by Fei Huang, Founder & CEO of NeuVector

NeuVector's Container Security Solution - Join Beta Program

There are many benefits of containers which are driving the popularity of container platforms like Docker.

It is easy to forget that container deployments are fairly new and the threats unknown. Like virtualization did, containers will bring a new set of risks, threats, and vulnerabilities to be assessed and mitigated. Lock

At NeuVector we're developing a run-time container security solution which protects running containers where and when they are most at risk - at run-time. In a nutshell, without giving away too many secrets, NeuVector will:

Subpar Data Security Continues in Healthcare Industry

Grazed from VMblog.com. Author: Kayla Matthews

2015 has a notorious characterization as a terrible year for data breaches in the healthcare industry. Unfortunately, even though 2016 is well underway, companies haven't made the substantial preventative measures needed to prevent the same thing from happening again. That's the conclusion reached by the Ponemon Institute after compiling data from its sixth annual survey.

Let's take a look at some of the glaring problems related to data security in healthcare, and explore why they're still so prevalent.

 
 

Microsoft-Centric Innovators Gridstore and 5nine Software Showcase Advanced Security With HyperConverged Infrastructure

Grazed from Gridstore and 5nine Software

Gridstore, the leader in hyper-converged all flash infrastructure for the Microsoft Cloud-Inspired Datacenter and 5nine Software, the leading global Hyper-V virtualization security and management provider, today announced they will be presenting their recently launched integrated solution that delivers advanced security for hyperconverged infrastructure at the upcoming Microsoft Cloud and Hosting Summit, May 10-12 at the Hyatt Regency in Bellevue, Washington. Delegates at this exclusive invitation-only event are invited to visit Gridstore and 5nine at booth #27.

The 2016 Microsoft Cloud and Hosting Summit provides a unique opportunity for dialogue with industry leaders including Microsoft executives, technologists and the Microsoft hosting team. Participants will gain in-depth knowledge of Microsoft's vision for the hosting industry and its strategy for growth with hosting providers. Attendees can collaborate with fellow innovators on meeting the challenges of the hosting industry. Ultimately, professionals will leave the Summit empowered with a better understanding of how to create, optimize, and grow their business.