Application Security

4/13/2017
03:25 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

HPE Unveils FIPS-Validated Format-Preserving Encryption Tool

PALO ALTO, Calif., April 13, 2017 – Hewlett Packard Enterprise (HPE) today announced that HPE SecureData has achieved the industry’s first Federal Information Processing Standard (FIPS) 140-2 validation of Format-Preserving Encryption (FPE). HPE SecureData with Hyper FPE delivers a NIST-standardized method of protecting data at-rest, in-motion, and in-use, and maintains the format, meaning, value and logic in the data. Now, government agencies and private contractors serving government customers, can leverage the same powerful and proven technology that has transformed cybersecurity in the private sector.

A major challenge faced by federal agencies, including those attacked by nation state adversaries, is the dependency on legacy applications and platforms with limited native data security options. HPE SecureData helps build data security into both new and legacy applications, de-identifying high-value data classes; for example, protecting classified information, or eliminating reliance on using Social Security Numbers for business processes. Security assurance is increased, while unleashing the utility of data for secure adoption of big data analytics such as Hadoop and other new applications and solutions.

“Government agencies set the high bar for protecting both their sensitive data and citizen data across multiple platforms and applications, both legacy and modern,” said Albert Biketi, vice president and general manager, HPE Security – Data Security at Hewlett Packard Enterprise. “With the HPE SecureData FIPS validation, government agencies and contractors can now use a standardized data security product with extensive enterprise deployments, neutralizing data breaches while liberating analytics and innovation.”

HPE SecureData has the world’s first FIPS-validated AES-FF1 encryption configuration option to operate in strict FIPS mode. This enables public sector customers to take advantage of true FIPS-validated and approved cryptography when building compliance programs for regulations such as the Cybersecurity Act of 2015 data security requirements, DFARS CUI, and General Data Protection Regulations (GDPR).

HPE SecureData with Hyper FPE has the ability to “de-identify” virtually unlimited data types, from sensitive personally identifiable information (PII), to IDs, health information or classified data, rendering it useless to attackers in the event of a security breach. This allows government agencies to securely leverage the de-identified data for big-data analytics, and collaborate with shared data between other agencies or contractors. It also provides accelerated encryption speeds that enable government agencies to adopt new technologies, such as the cloud or Hadoop or invest in innovations such as IoT, all while lowering the risk of disclosing sensitive personal data or compromising high value data.

Full integration with HPE Atalla HSM

HPE SecureData is fully integrated with HPE Atalla HSM, a hardware appliance validated to FIPS 140-2 Level 3, offering organizations greater physical and logical data protection. HPE Atalla HSM stores and manages root keys, with centralized configuration and security policy enforcement, making it simple for customers to take a holistic approach to managing data protection.

Availability

HPE SecureData with FIPS validation is currently available globally, and delivers data security for governance, risk and compliance across public and private sector mission-critical systems for cloud, big data, IoT, payments, mobile data capture, and applications.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
The Case for a Human Security Officer
Ira Winkler, CISSP, President, Secure Mentem,  12/5/2018
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-8651
PUBLISHED: 2018-12-12
A cross site scripting vulnerability exists when Microsoft Dynamics NAV does not properly sanitize a specially crafted web request to an affected Dynamics NAV server, aka "Microsoft Dynamics NAV Cross Site Scripting Vulnerability." This affects Microsoft Dynamics NAV.
CVE-2018-8652
PUBLISHED: 2018-12-12
A Cross-site Scripting (XSS) vulnerability exists when Windows Azure Pack does not properly sanitize user-provided input, aka "Windows Azure Pack Cross Site Scripting Vulnerability." This affects Windows Azure Pack Rollup 13.1.
CVE-2018-8617
PUBLISHED: 2018-12-12
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8...
CVE-2018-8618
PUBLISHED: 2018-12-12
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8...
CVE-2018-8619
PUBLISHED: 2018-12-12
A remote code execution vulnerability exists when the Internet Explorer VBScript execution policy does not properly restrict VBScript under specific conditions, aka "Internet Explorer Remote Code Execution Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Exp...