Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/6/2014
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Porticor delivers protection of OpenStack computing with cloud key management security

Newest Virtual Private Data System Leverages Software-Defined Key Management to Enhance Security and Cloud Data Protection Across OpenStack and VMware Environments.

CAMPBELL, Calif. – Nov. 4, 2014 – Porticor®, a leading cloud data security company delivering the only cloud-based key management and data encryption solution that infuses trust into the cloud and keeps cloud data confidential, today announced that its latest Porticor Virtual Private Data (VPD) release supports the OpenStack cloud operating system, securing datacenter information across compute, storage, and networking resources.

The Porticor Virtual Private Data system is the industry’s only solution combining patented split-key encryption and homomorphic key management technologies with data encryption to protect critical data in public, private and hybrid cloud environments.  OpenStack customers can now leverage the Porticor technology for key management and data encryption in a pure OpenStack deployment, or in a hybrid environment, such as across a private VMware cloud, OpenStack and Amazon Web Services.

With this announcement, OpenStack customers can leverage Porticor for full disk encryption, database encryption and application level encryption.  Uniquely, customers can define encryption policies using a UI or a RESTful API for fine grained encryption on any level of their data stack.

In addition to OpenStack and existing AWS support, the new Porticor version includes significant enhancements for VMware customers by even more closely integrating with the VMware platform, including adding the ability to bring up additional Porticor Virtual Appliances, or create encrypted volumes directly from the Porticor user interface.  Also part of the new release are significant usability enhancements for enterprise customers, including upgrade tools and more support for multiple geographical regions.

“With today’s launch, Porticor now more fully secures enterprise virtualization with support for private and public clouds from VMware, Amazon Web Services, and the up-and-coming OpenStack platform,” said Yaron Sheffer, Porticor CTO and co-founder.  “No matter which cloud selection you make, Porticor delivers the highest usability and security for protecting cloud data.”

Porticor has also expanded the high availability of its virtual key management service further, leveraging its availability across multiple regions and availability zones, to provide a service level agreement for availability of 99.99 percent.

Unlike traditional data encryption solutions, which are complicated and expensive to deploy and manage, Porticor’s split-key encryption and homomorphic key management system is offered as the industry’s first cloud data protection service of its kind, delivering true confidentiality of data in the cloud by ensuring customer encryption keys are not exposed.

While other solutions require encryption keys to be manually managed for every disk, distributed storage or database record, or to be owned by a cloud provider, Porticor’s homomorphic split-key encryption technology eliminates both complexity and compromises.  Porticor restores key ownership to customers while automatically managing customer encryption keys with maximum security.  With homomorphic key management, the keys are protected at all times – even while they are in use.  Porticor protects the entire data layer stack, including virtual disks, distributed storage, databases, and applications.  It dynamically encrypts and decrypts virtual data whenever the application needs access, and delivers a key management system that is fully hosted in the cloud, yet offers the confidentiality, security and trust of a system that is hosted inside the datacenter.  Within minutes, customers can encrypt their entire data layer with the proven AES 256-bit encryption algorithm.

For more information on the new release, see: release note link:
https://pvkm.porticor.com/porticor-setup/release-notes.php.

Pricing and Availability
Available today, pricing for the new version of Porticor starts at $599 per month.  Customers can evaluate Porticor free of charge from: https://pvkm.porticor.com/setup/register.php.

About Porticor
Porticor is the leading cloud security company delivering easy-to-use and scalable security solutions for cloud key management and data encryption.  The Porticor Virtual Private Data™ (VPD) system is the industry’s first solution combining patented split-key encryption and homomorphic key management with data encryption to protect critical data in public, private and hybrid cloud environments.  Using breakthrough split-key encryption and homomorphic key management, the Porticor VPD is the only system available that offers the ease-of-use of cloud-based key management without sacrificing trust.  Porticor is an Amazon Web Services Technology Partner, a VMware Technology Alliance Partner, and an HP technology partner.  The company is headquartered in Tel Aviv, Israel, with offices in Silicon Valley, and is venture backed.  For more information, visit: http://www.porticor.com/.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15058
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.
CVE-2020-15059
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter.
CVE-2020-15060
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to conduct persistent XSS attacks by leveraging administrative privileges to set a crafted server name.
CVE-2020-15061
PUBLISHED: 2020-08-07
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to denial-of-service the device via long input values.
CVE-2020-15062
PUBLISHED: 2020-08-07
DIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.