Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

11/29/2012
05:39 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Voltage Security Leverages Persistent Systems To Deliver Solution Upgrades And Security Alerts

Voltage is now able to deliver solution upgrades within 18 hours

Santa Clara and Cupertino, CA – November 29, 2012: Persistent Systems (BSE & NSE: PERSISTENT), the global leader in software product and technology services, and Voltage Security®, the world leader in data-centric encryption and key management, today announced an innovative arrangement that greatly accelerates the process through which 1,000 enterprise users of Voltage SecureData™ data protection solution will receive product releases and patches. Working with Persistent Systems’ expert engineering team, Voltage can now deliver solution upgrades within 18 hours, while many competitive options still take up to a week. There’s also a faster time to market for new features and security alerts, the ability to work across 13 operating systems and elimination of the potential for human error.

“In the security field, we don’t have the luxury of time—our customers expect fast release cycles and security alerts, and they should,” said John Weald, vice president, Engineering at Voltage. “Persistent Systems understood our ‘Agile Scrum’ environment and was able to help accelerate the release process without compromising quality. Reducing the turnaround time from days to hours gives our customers a huge strategic advantage, and further demonstrates Voltage Security’s commitment to both innovation and customer support.”

Voltage Security provides data-centric encryption solutions to some of the largest companies in the world across a wide variety of industries, including payment systems, financial services, insurance, healthcare and e-commerce. When the company moved to Agile Scrum development, the specific goal was to provide releases simultaneously across all platforms the company supports. Voltage turned to Persistent Systems to help ensure that Voltage SecureData would run across multiple versions of Microsoft Windows, Sun Solaris, Red Hat Enterprise Linux, AIX, HP-UX and others.

“Persistent Systems has a world-class team of engineering experts in development, porting and QA, and we’re privileged to be working with Voltage Security in speeding the time to market for this critical product line,” said Nitin Kulkarni, executive director and COO, Persistent Systems Ltd. “Our joint efforts ensure that enterprise customers around the world are more secure, the call on help desks is reduced and Voltage Security can respond faster to new business opportunities.”

About Voltage

Voltage Security®, Inc. is the leading data protection provider, delivering secure, scalable, and proven data-centric encryption and key management solutions, enabling customers to effectively combat new and emerging security threats. Powered by ground-breaking encryption innovations, including Identity-Based Encryption™ (IBE), Format-Preserving Encryption™ (FPE), and Page-Integrated Encryption™ (PIE), our powerful data protection solutions allow any company to seamlessly secure all types of sensitive corporate and customer information, wherever it resides, while efficiently meeting regulatory compliance and privacy requirements. For more information, please www.voltage.com.

About Persistent Systems:

Established in 1990, Persistent Systems (BSE & NSE: PERSISTENT) is a global company specializing in software product and technology services. For more than two decades, Persistent has been an innovation partner for the world’s largest technology brands, leading enterprises and pioneering start-ups. With a global team of more than 6,000 employees, Persistent has 300 customers spread across North America, Europe, and Asia. Today, Persistent focuses on developing best-in-class solutions in four key next-generation technology areas: Cloud Computing, Mobility, Analytics and Collaboration, for telecommunications, life sciences, consumer packaged goods, banking & financial services and healthcare verticals. For more information, please visit: http://www.persistentsys.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-26030
PUBLISHED: 2021-04-14
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate escaping allowed XSS attacks using the logo parameter of the default templates on error page
CVE-2021-26031
PUBLISHED: 2021-04-14
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate filters on module layout settings could lead to an LFI.
CVE-2021-27710
PUBLISHED: 2021-04-14
Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system funct...
CVE-2021-28484
PUBLISHED: 2021-04-14
An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send i...
CVE-2021-29654
PUBLISHED: 2021-04-14
AjaxSearchPro before 4.20.8 allows Deserialization of Untrusted Data (in the import database feature of the administration panel), leading to Remote Code execution.