Encryption

Encryption Software Market is expected to reach $2.5 Billion, Globally by 2021

Grazed from Allied Market Research.

Global Encryption Software Market Report, published by Allied Market Research, forecasts that the global market is expected to garner $2.5 billion by 2021, registering a CAGR of 14.2% during the period 2016 - 2022. North America is expected to be the leading contributor during the forecast period, owing to higher adoption of end-point security solutions among organizations and prevalence of higher data protection & compliance regulations. However, Asia-Pacific region is anticipated to grow at the fastest rate, due to the growing penetration of cloud computing and increasing workforce mobility.

The encryption software market by usage comprises encryption for data-at-rest and encryption for data-in-transit. In 2014, data-at-rest encryption software segment accounted for approximately 93.4% of the total encryption software market by value. For data-at-rest, the two most commonly used encryption software methods include full disk encryption (FDE) and file level encryption (FLE), with full disk encryption being the most widely deployed method for protecting data against theft and ensuring compliance with data privacy and data breach notification laws. FDE is preferred over the FLE primarily due to the two major advantages, viz. ease of deployment and management, and complete security.

Cloud Computing: Everyday quantum computing is years off - so why are some firms already doing quantum encryption?

Grazed from ZDNet. Author: Tina Amirtha.

Phone companies around the world are working to protect their customers' data from a threat does not yet exist: large quantum computers. Although the arrival of these advanced machines could be as far off as 15 years, telecoms companies are already implementing new quantum encryption algorithms.

These firms are preparing for the possibility that quantum computers will one day scale sufficiently to break through even the most sophisticated of today's encryption barriers. The most common quantum encryption method utilizes a technology called quantum key distribution, which can be implemented on existing fiber-optic connections...

Researcher Develops New Cloud Security Method for Mobile Users

Grazed from UCMerced.edu. Author: Editorial Staff.

A UC Merced researcher has come up with a new, super-efficient encryption system for smart phones that lets users secure data being sent to and retrieved from the cloud. Encrypting data on your phone or tablet — including pictures, documents and videos — protects against the kinds of leaks and hacks that seem to be in the news almost every week. But those devices have energy and storage limits, and encryption systems can be costly.

In the Cloud LabOpens a new window at UC Merced, graduate student Mehdi Bahrami, who works with Chancellor’s Professor Mukesh Singhal in the School of Engineering, devised a new lightweight data privacy method for mobile clients to store data in one or multiple clouds without using a lot of a mobile device’s resources...

Cloud Computing: Bring Your Own Encryption - balancing security with practicality

Grazed from UnionGazette.  Author: Editorial Staff.

Given that the start off of the 21st century, safety has emerged from scare-story status to grow to be one of IT users' largest difficulties &ndash as survey after survey confirms. Along the way a quantity of uncomfortable lessons have been learned, and are still getting discovered.

The initially lesson is that security technology should generally be deemed in a human context. No one particular nevertheless believes in a technological repair that will put an finish to all safety problems, since time and once again we hear of new kinds of cyber-attack that bypass sophisticated and safe technology by targeting human nature &ndash from alarming emails ostensibly from official sources, to friendly social invitations to share a funny download. Or indeed a harmless seeking USB stick 'accidentally' dropped by the office entrance, or a fake policeman demanding a couple of private specifics to confirm that you are not criminally liable...

Cloud Computing: EU to developers - Your encryption is lacking

Grazed from TheHill. Author: Cory Bennett.

The European Union updated its guidelines for protecting personal information under EU data security laws, which are more stringent than those in the U.S. In short, EU officials told developers they were doing a bad job encrypting data. While all the basic building blocks of good encryption methods exist, they said, implementation is lacking and testing is ineffective.

“The scientific study of such protocols can be said to be still not mature enough,” said the report, which was compiled by the European Network and Information Security Agency (ENISA). EU officials have also encouraged companies to ensure the U.S. government does not have unfettered access to EU citizens’ data...

How Encryption Works in Cloud Computing

Grazed from ClouderPC. Author: Editorial Staff.

Cloud, as a flowing intangible balloon with different kinds of information, has been celebrated in the last few years as a real pivotal point in the data storing and sharing process. The cloud offers a wide range of new possibilities that can improve business communication and work in general, as well as everyday computer experience of ordinary people.

Since the data on the cloud can be accessed from any Internet-provided spot in the world, it is obvious that people do not have to carry their flash drives or external disks with them, but simply log into their cloud account and have easy access all the data they need. No matter how convenient and fabulous this might sound, there must be a drawback or, better to say, a threat to that feature. Namely, every item of content uploaded to the cloud must be appropriately encrypted, to make sure it is safe from hackers’ attacks...

Cloud computing threat intelligence platforms: The next big thing?

Grazed from TechTarget. Author: Editorial Staff.

With FireEye Inc.'s announcement of a new threat analytics platform for Amazon Web Services, threat intelligence for the cloud is now becoming a reality. But will cloud-based threat analytics systems displace traditional security information and event management products and threat analytics systems in the near future?

Announced last week, FireEye's threat analytics platform (TAP) for Amazon Web Services (AWS) is the first of its kind because, according to Milpitas, Calif.-based FireEye, the product was built natively on Amazon's cloud and it combines FireEye's threat intelligence with event monitoring and analytics across AWS as well as a client's on-premise IT environment...

Encrypted data in the cloud? Be sure to control your own keys

Grazed from NetworkWorld.  Author: Linda Musthaler.

With cloud computing there's no longer a question about whether you should encrypt data. That's a given. The question today is, who should manage and control the encryption keys?

Whether talking to an infrastructure provider like Amazon or Microsoft, or a SaaS provider, it's imperative to have the discussion about key control. The topic is more relevant than ever as more companies move regulated data into the cloud and as concerns about data privacy grow...

Microsoft doubles down on cloud encryption, transparency

Grazed from BusinessCloud. Author: Editorial Staff.

Microsoft is “in the midst of a comprehensive engineering effort” to strengthen encryption across its portfolio of cloud services, and increase transparency for customers and governments by allowing more access to the code at the foundation of its services, the company said. According to Matt Thomlinson, vice president of trustworthy computing security at Microsoft the company has successfully taken large strides towards making its services more secure.

Microsoft has added Transport Layer Security (TLS) encryption to inbound and outbound emails sent through Outlook.com, and Perfect Forward Secrecy (PFS) encryption support for sending and receiving mail between email providers, and for the company’s cloud storage service OneDrive...

IPR International Partners with AFORE to Offer Encryption as a Service (EaaS)

Grazed from PRNewsWire. Author: PR Announcement.

With security threats multiplying daily, the need to provide clients with an arsenal of tools for protecting their data has never been greater. IPR International is pleased to announce a new partnership with leading cloud security and encryption management provider AFORE Solutions, Inc. that will give IPR's clients the ability to add Encryption as a Service (EaaS) as an additional layer of security for their cloud environments.

Using AFORE's CloudLink encryption platform, clients can choose to layer encryption at multiple points within their cloud computing stack. Encryption solutions are available at the storage, virtual machine, file, and application levels and can be deployed and managed from a common framework. Just last week, AFORE announced the addition of two new CloudLink modules to its platform, providing even greater deployment flexibility through more granular security controls...