Rohati Systems Extends Security Solutions to Virtualized Data Centers and Clouds
Rohati extends its on-premise security solutions to virtualized servers and off-premise cloud environments, software-as-a-service
August 19, 2009
PRESS RELEASE
SUNNYVALE, Calif. — Aug. 18, 2009 — To address growing security challenges in virtualized data center and cloud computing environments, Rohati Systems is announcing its Virtualized Cloud Security initiative. With this, Rohati will extend its on-premise security solutions to virtualized servers and off-premise cloud environments. IT organizations can leverage Rohati solutions to provide security and controls for accessing all applications and resources consistently and seamlessly, regardless of whether they reside on physical or virtual server infrastructures on-premise or in off-premise clouds.
"Just as every other computing revolution has left security to the last, cloud computing has been no different so far," stated Richard Stiennon, founder and chief research analyst of IT-Harvest, an independent analyst firm. "Moving forward, cloud computing is going to generate a high demand for secure processes, controls, and products to lock down an otherwise world-changing technology. Rohati's security initiative is a much needed step in this direction."
Enterprises leverage Rohati solutions for securing collaboration and simplifying compliance across all users and resources. The Virtualized Cloud Security initiative enables enterprises to leverage virtualized compute infrastructures as well as rent compute capacity on demand while continuing to collaborate securely and meet compliance demands. By extending internal security and controls to workloads and data that travel between the enterprise and virtualized clouds, enterprises will be able to rapidly realize elasticity and cost-effectiveness.
"Providing 'control and trust' is essential when it comes to collaboration and sensitive data in the cloud," said John Keagy, CEO and co-founder of GoGrid. "We are impressed with the accomplishments of the team behind Rohati, and in addition to being proud of their unique new approaches to security, we are proud of our partnership. Rohati's Virtualized Cloud Security initiative provides powerful security and controls for accessing data and applications in the cloud, and will help end-users move to the cloud quickly and with confidence."
"Virtualization and cloud computing have created a unique inflection point," said Prashant Gandhi, Rohati Systems president and CEO. "It demands new and innovative approaches for enabling dynamic security and controls while simultaneously reducing complexity and rigidity. We are very pleased to work with industry thought leaders to bring our security innovations to virtualization and cloud environments."
Rohati's Virtualized Cloud Security initiative will expand the capabilities of its flagship product, the Transaction Networking System (TNS), into virtualized servers, cloud computing, and software-as-a-service (SaaS) environments. Later this year, Rohati will be announcing specific product releases that support this strategic initiative. Contact Rohati at www.rohati.com/company/contact-us.php.
About Rohati Systems Rohati Systems, a data center and cloud security company, provides award-winning Transaction Networking Systems (TNS) to enable secure collaboration and simplify regulatory compliance. The TNS patent-pending agent-less architecture implements high-performance, identity, and application-fluent policies for controlling access to data center and cloud resources without touching applications, servers, operating systems, or clients. Granular, context-based policy controls are applied to all application resources, including virtualized and mobile workloads. TNS is available as a 1-RU fixed form-factor appliance for 1G server farms or as a 5 slot modular chassis for 10G data centers. #### Rohati, Transaction Networking System, TNS, and related logos are trademarks or registered trademarks of Rohati Systems, Inc. All other products or company names mentioned herein are trademarks or registered trademarks of their respective owners.
You May Also Like
Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024