Perimeter
6/18/2012
02:52 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Vormetric Prevents Big Data Toxic Leaks

Vormetric Encryption secures structured and unstructured information stored in Big Data platforms

SAN JOSE, Calif. - June 12, 2012 -Vormetric, Inc., the leader in enterprise encryption and key management, today announced that Vormetric Encryption secures structured and unstructured information stored in Big Data platforms including Hadoop, Cassandra and MongoDB. Unlike relational databases, these new platforms, which are used to store and analyze huge volumes of data from social networks, customer behavior, sensors, IT systems, and other sources, lack basic security controls. Vormetric ensures data in these platforms is protected against unauthorized disclosure and removes custodial risk associated with infrastructure providers and administrators.

According to Forrester Research, "It is imperative, however, that users of the data understand that these massive data stores contain significant amounts of 'toxic' data. Toxic data is any data that could be damaging to an organization if it leaves that organization's control. Typically, toxic data includes custodial data - such as credit card numbers, personally identifiable information (PII) like Social Security Numbers, and personal health information (PHI) - and sensitive intellectual property, including business plans and product designs."

Vormetric Encryption enables enterprises to transparently encrypt and control access to Big Data. These repositories introduce a new and very large target for malicious parties seeking to compromise private data. If hackers compromise an organization's perimeter defenses, they can gain unrestricted access to a jackpot of data that is stored in one place. Vormetric Encryption places controls on the data itself to establish a comprehensive last line of security.

Protecting sensitive data in Big Data environments augments Vormetric Data Security's existing ability to protect structured and unstructured data in Linux, Unix and Windows environments. With Vormetric, enterprises can unify encryption policy and key management for Big Data across physical, virtual and cloud infrastructures using a single system.

"Enterprises are placing a tremendous amount of accumulated data and new data in single huge repositories using Big Data tools in order to turn it into actionable business intelligence," said Ashvin Kamaraju, vice president of product development and technology strategy at Vormetric.

"Much of this data is sensitive in nature and would trigger regulatory consequences if it were compromised, yet it is being housed in non-relational data stores with virtually no controls," he added.

"Vormetric Data Security allows enterprises to implement and extract business value from Big Data deployments without sacrificing data security or violating privacy and regulatory compliance requirements," he concluded.

Availability Vormetric Encryption with support for Hadoop, Cassandra and MongoDB is available immediately.

About Vormetric Vormetric (@Vormetric) is the leader in enterprise encryption. The Vormetric Data Security product line provides a single, manageable and scalable solution to manage any key and encrypt any file, any database, any application, anywhere it resides- without sacrificing application performance and avoiding key management complexity. Some of the largest and most security conscious organizations and government agencies in the world, including 15 of the Fortune 25, have standardized on Vormetric to provide strong, easily manageable data security. Vormetric technology has previously been selected by IBM as the database encryption solution for DB2 and Informix on LinuxTM, Unix® and Windows; and by Symantec to provide the Symantec Veritas NetBackupTM Media Server Encryption Option. For more information, visit www.vormetric.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web