Perimeter
11/29/2012
05:39 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Voltage Security Leverages Persistent Systems To Deliver Solution Upgrades And Security Alerts

Voltage is now able to deliver solution upgrades within 18 hours

Santa Clara and Cupertino, CA – November 29, 2012: Persistent Systems (BSE & NSE: PERSISTENT), the global leader in software product and technology services, and Voltage Security®, the world leader in data-centric encryption and key management, today announced an innovative arrangement that greatly accelerates the process through which 1,000 enterprise users of Voltage SecureData™ data protection solution will receive product releases and patches. Working with Persistent Systems’ expert engineering team, Voltage can now deliver solution upgrades within 18 hours, while many competitive options still take up to a week. There’s also a faster time to market for new features and security alerts, the ability to work across 13 operating systems and elimination of the potential for human error.

“In the security field, we don’t have the luxury of time—our customers expect fast release cycles and security alerts, and they should,” said John Weald, vice president, Engineering at Voltage. “Persistent Systems understood our ‘Agile Scrum’ environment and was able to help accelerate the release process without compromising quality. Reducing the turnaround time from days to hours gives our customers a huge strategic advantage, and further demonstrates Voltage Security’s commitment to both innovation and customer support.”

Voltage Security provides data-centric encryption solutions to some of the largest companies in the world across a wide variety of industries, including payment systems, financial services, insurance, healthcare and e-commerce. When the company moved to Agile Scrum development, the specific goal was to provide releases simultaneously across all platforms the company supports. Voltage turned to Persistent Systems to help ensure that Voltage SecureData would run across multiple versions of Microsoft Windows, Sun Solaris, Red Hat Enterprise Linux, AIX, HP-UX and others.

“Persistent Systems has a world-class team of engineering experts in development, porting and QA, and we’re privileged to be working with Voltage Security in speeding the time to market for this critical product line,” said Nitin Kulkarni, executive director and COO, Persistent Systems Ltd. “Our joint efforts ensure that enterprise customers around the world are more secure, the call on help desks is reduced and Voltage Security can respond faster to new business opportunities.”

About Voltage

Voltage Security®, Inc. is the leading data protection provider, delivering secure, scalable, and proven data-centric encryption and key management solutions, enabling customers to effectively combat new and emerging security threats. Powered by ground-breaking encryption innovations, including Identity-Based Encryption™ (IBE), Format-Preserving Encryption™ (FPE), and Page-Integrated Encryption™ (PIE), our powerful data protection solutions allow any company to seamlessly secure all types of sensitive corporate and customer information, wherever it resides, while efficiently meeting regulatory compliance and privacy requirements. For more information, please www.voltage.com.

About Persistent Systems:

Established in 1990, Persistent Systems (BSE & NSE: PERSISTENT) is a global company specializing in software product and technology services. For more than two decades, Persistent has been an innovation partner for the world’s largest technology brands, leading enterprises and pioneering start-ups. With a global team of more than 6,000 employees, Persistent has 300 customers spread across North America, Europe, and Asia. Today, Persistent focuses on developing best-in-class solutions in four key next-generation technology areas: Cloud Computing, Mobility, Analytics and Collaboration, for telecommunications, life sciences, consumer packaged goods, banking & financial services and healthcare verticals. For more information, please visit: http://www.persistentsys.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web