Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:42 PM
Dark Reading
Dark Reading
Products and Releases

New Vormetric Release Uses Chips To Make Enterprise Encryption Invisible

Vormetric Encryption V5 includes scalability enhancements

SAN JOSE, Calif. - Apr. 24, 2012 -Vormetric, Inc., the leader in enterprise systems encryption and key management, today announced Vormetric Encryption V5 which significantly reduces the cost and application impact of encryption. Vormetric Encryption V5 uses software enhancements and hardware encryption technologies such as Intel®'s AES-NI and SPARC Niagara Crypto accelerators when available to drive performance overhead to the lowest levels possible. Vormetric meets the stringent performance requirements demanded by enterprise applications for structured or unstructured data, while providing essential data protection.

According to Forrester Research, "Ubiquitous encryption is the only hope we have of maintaining some kind of parity with attackers in the new threat landscape. Not only does encryption devalue the data from the attacker's perspective, it generally places that data outside the scope of compliance regimes like PCI or US state privacy laws.. Compliance mandates and privacy laws have given companies incentives to deploy more and more encryption. As sensitive data very often resides in enterprise databases, it is no surprise that encryption of storage and databases is becoming more common. "

Breaking the Performance and Scalability Barrier

Ubiquitous enterprise encryption solutions need to transparently support any database and application environment with best in class performance. Vormetric Encryption V5 can secure any database or application environment while imposing near zero percent overhead for typical transaction workloads with hardware-assisted instructions (Intel® AES-NI) on x86 servers. This substantial performance boost enables enterprises to significantly lower the cost of encryption and free up CPU cycles for applications and data processing. In addition, Vormetric Encryption V5 includes scalability enhancements that make it possible to secure sizeable numbers of file systems and data volumes that are expected in large enterprise environments.

A single Vormetric Data Security Manager (DSM) appliance cluster can provide centralized policy and key management for the biggest enterprise servers with large numbers of data sets, and tens of thousands of multi-core server farms.

"Enterprises are being required to protect an increasing amount of data, be it for regulatory compliance requirements or to prevent intellectual property breaches. Until now, using encryption to secure large datasets has been hindered by performance overhead and scalability constraints," said Ashvin Kamaraju, vice president of product development at Vormetric.

"Vormetric Encryption V5 punches through the previous performance ceiling and scales to support the most powerful enterprise servers," he added.

Improved Manageability with Directory Services

The Data Security Manager simplifies the task of creating system, domain and security administrator accounts through selection of credentialed users from directory servers such as Active Directory or other directory services using the LDAP/LDAPS protocols. In addition, Vormetric software agents integrate with directory services for enforcing encryption access control policies to users, groups, and hosts.

Two-Factor Authentication

To ensure the highest level of security for administrative access, the Vormetric Encryption Data Security Manager provides two-factor authentication with support for RSA SecureID. This capability improves security by preventing attackers and malicious insiders from accessing Vormetric Data Security Manager appliances that control data security policies.

"Vormetric's unified approach to policy management allows enterprises to do more with less: protect more data, reduce IT administration costs, tighten security and centralize auditing for regulatory compliance reporting," concluded Ashvin Kamaraju.


Vormetric Encryption V5 for Linux/Solaris/AIX/Windows operating systems is available in May 2012. Vormetric customers with existing support contracts can upgrade their Vormetric Encryption V4 deployments to benefit from these new capabilities.

About Vormetric

Vormetric (@Vormetric) is the leader in enterprise system encryption. The Vormetric Data Security product line provides a single, manageable and scalable solution to manage any key and encrypt any file, any database, any application, anywhere it resides- without sacrificing application performance and avoiding key management complexity. Some of the largest and most security conscious organizations and government agencies in the world, including 15 of the Fortune 25, have standardized on Vormetric to provide strong, easily manageable data security. Vormetric technology has previously been selected by IBM as the database encryption solution for DB2 and Informix on LinuxTM, Unix® and Windows; and by Symantec to provide the Symantec Veritas NetBackupTM Media Server Encryption Option. For more information, visit www.vormetric.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-20
An unsafe deserialization vulnerability in Bridgecrew Checkov by Prisma Cloud allows arbitrary code execution when processing a malicious terraform file. This issue impacts Checkov 2.0 versions earlier than Checkov 2.0.26. Checkov 1.0 versions are not impacted.
PUBLISHED: 2021-04-20
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to us...
PUBLISHED: 2021-04-20
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS conf...
PUBLISHED: 2021-04-20
A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions...
PUBLISHED: 2021-04-19
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The hi...