Welcome!

Artificial Intelligence Authors: Zakia Bouachraoui, Liz McMillan, Yeshim Deniz, Elizabeth White, William Schmarzo

Blog Feed Post

Porticor Locks Down Data in the Cloud

 CCJ Logo 1 Porticor Locks Down Data in the Cloud

 

 

(Originally posted by Maureen O’gara on Cloud Computing Journal)

Porticor has fleshed out its security widgetry and figures it can now deliver the only system anywhere that can secure data in the cloud.

It does it with an algorithm that protects cloud data while it’s stored and in use.

The two-year-old Tel Aviv company’s next trick will be to protect the data while it’s in motion.

The unique widgetry, said to offer higher protection than available to a physical data center, comes in Proticor’s Virtual Private Data (VPD) system. It combines data encryption with the firm’s patented key management and protects data stored in public, private and hybrid clouds.

 Porticor%20468 0 Porticor Locks Down Data in the Cloud

See, traditional cloud encryption solutions give customer encryption keys to security vendors and cloud providers, creating the possibility of a breach. Porticor keeps encryption keys in the customer’s control, unexposed to risk and not in the cloud. It solves the security issues surrounding data at rest in the cloud.

It works across virtual disks, databases, distributed storage and file systems. Porticor says IaaS and PaaS cloud users can create a secured environment in minutes while eliminating the need to trust a security vendor or cloud provider with their encryption keys.

The company has added homomorphic key encryption technology to the widgetry to keep the master keys fully encrypted and secure while being used to access cloud data.

It’s the world’s first commercial application of homomorphic encryption technology, and Porticor says “organizations can now fully trust that their cloud data is secure and cannot be compromised while stored or being accessed.”

Homomorphic encryption lets mathematical operations be run on encrypted data. Porticor’s patent-pending technology implements partially homomorphic encryption techniques for combining and splitting encryption keys. It enables the Porticor VPD system to give the application access to the data store without exposing the master keys in an unencrypted state. This also ensures that if a master key is stolen, it can still never be used to access a data store.

Porticor founder and CEO Gilad Parann-Nissany said that if a hacker did manage to penetrate the first server, that’s as far as he could get.

The company says its homomorphic key-encryption approach is open to rigorous mathematical proof and cryptographic analysis under explicit and well-defined mathematical assumptions. See www.porticor.com/hkm-analysis.

The solution should increase cloud adoption especially by healthcare, media, manufacturing and financial services companies.

VPD, which includes Porticor’s Virtual Appliance and its Virtual Key Management Service, is deployed in the cloud and managed from Porticor’s customer portal.

It meets compliance regulations such as SOX, HIPAA, PCI DSS and GLBA, while also solving issues raised by EU Data Protection and the US Patriot Act.

Pricing starts at $65 a month per Porticor Virtual Appliance. See www.porticor.com/pricing-plans/.

The company is an official Amazon Web Services Solution provider, a VMware Technology Alliance Partner, and supports other clouds.

The post Porticor Locks Down Data in the Cloud appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

IoT & Smart Cities Stories
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform elimi...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace.
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Ca...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, will provide an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life ...