Rohati Systems Extends Security Solutions to Virtualized Data Centers and CloudsRohati Systems Extends Security Solutions to Virtualized Data Centers and Clouds
Rohati extends its on-premise security solutions to virtualized servers and off-premise cloud environments, software-as-a-service
August 19, 2009
SUNNYVALE, Calif. — Aug. 18, 2009 — To address growing security challenges in virtualized data center and cloud computing environments, Rohati Systems is announcing its Virtualized Cloud Security initiative. With this, Rohati will extend its on-premise security solutions to virtualized servers and off-premise cloud environments. IT organizations can leverage Rohati solutions to provide security and controls for accessing all applications and resources consistently and seamlessly, regardless of whether they reside on physical or virtual server infrastructures on-premise or in off-premise clouds.
"Just as every other computing revolution has left security to the last, cloud computing has been no different so far," stated Richard Stiennon, founder and chief research analyst of IT-Harvest, an independent analyst firm. "Moving forward, cloud computing is going to generate a high demand for secure processes, controls, and products to lock down an otherwise world-changing technology. Rohati's security initiative is a much needed step in this direction."
Enterprises leverage Rohati solutions for securing collaboration and simplifying compliance across all users and resources. The Virtualized Cloud Security initiative enables enterprises to leverage virtualized compute infrastructures as well as rent compute capacity on demand while continuing to collaborate securely and meet compliance demands. By extending internal security and controls to workloads and data that travel between the enterprise and virtualized clouds, enterprises will be able to rapidly realize elasticity and cost-effectiveness.
"Providing 'control and trust' is essential when it comes to collaboration and sensitive data in the cloud," said John Keagy, CEO and co-founder of GoGrid. "We are impressed with the accomplishments of the team behind Rohati, and in addition to being proud of their unique new approaches to security, we are proud of our partnership. Rohati's Virtualized Cloud Security initiative provides powerful security and controls for accessing data and applications in the cloud, and will help end-users move to the cloud quickly and with confidence."
"Virtualization and cloud computing have created a unique inflection point," said Prashant Gandhi, Rohati Systems president and CEO. "It demands new and innovative approaches for enabling dynamic security and controls while simultaneously reducing complexity and rigidity. We are very pleased to work with industry thought leaders to bring our security innovations to virtualization and cloud environments."
Rohati's Virtualized Cloud Security initiative will expand the capabilities of its flagship product, the Transaction Networking System (TNS), into virtualized servers, cloud computing, and software-as-a-service (SaaS) environments. Later this year, Rohati will be announcing specific product releases that support this strategic initiative. Contact Rohati at www.rohati.com/company/contact-us.php.
About Rohati Systems Rohati Systems, a data center and cloud security company, provides award-winning Transaction Networking Systems (TNS) to enable secure collaboration and simplify regulatory compliance. The TNS patent-pending agent-less architecture implements high-performance, identity, and application-fluent policies for controlling access to data center and cloud resources without touching applications, servers, operating systems, or clients. Granular, context-based policy controls are applied to all application resources, including virtualized and mobile workloads. TNS is available as a 1-RU fixed form-factor appliance for 1G server farms or as a 5 slot modular chassis for 10G data centers. #### Rohati, Transaction Networking System, TNS, and related logos are trademarks or registered trademarks of Rohati Systems, Inc. All other products or company names mentioned herein are trademarks or registered trademarks of their respective owners.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023