Aberdeen Group, Quantifying The Risk of a Data Breach For Teradata Users
Derek Brink, VP, Research Fellow, IT Security at Aberdeen Group discusses his analysis of the risk of a single data breach for Teradata Systems users and demonstrates the business case for investments in controls including encryption with key management.
Watch this short demo to learn how Vormetric Transparent Encryption makes it easy to deploy file and database encryption with privileged user access controls and security intelligence log collection across all your server environments (physical, virtual, big data and cloud) with centralized policy and key management. This demo includes an animated demonstration, policy configuration, insider abuse demonstration, and review of the actual audit logs produced.
Find out just how secure your data can be without impacting business operations. This demo will show you how to secure your most crucial asset, while maintaining the same user experience your stakeholders have learned to expect.
Watch this short demo video to learn how you can create secure and compliant object storage and enterprise file sync and share (EFSS) services for your company. The demo is broken up into four short sections: challenge, solution, configuration and reporting.
Aberdeen Group, Selecting Encryption for “Data at Rest” in Back-End Systems
Derek Brink, VP, Research Fellow, IT Security at Aberdeen Group discusses his research on the most common security risks for data at rest in back end storage systems and the different encryption methods for defending that data. He compares full disk encryption (FDE) vs File Level Encryption.
Demo: Vormetric Integration With Splunk Enterprise
With the Splunk Enterprise, & Vormetric Data Security Platform you will gain insight to not only see what is happening from the “outside-in”, but also from nefarious activity that is happening on the “inside”. Check out our demo that gives you an “over the techie shoulder view” of Vormetric Data Security and Splunk Enterprise operating in real life scenarios.
You have deployed McAfee Enterprise Security Manager (ESM) to collect, analyze and report on advanced perimeter attacks. Now gain the visibility of what is happening on the inside. Check out our demo that gives you an “over the techie shoulder view” of Vormetric Data Security and McAfee ESM working in real life scenarios.
What Would Data Look Like If It Could Defend Itself?
Whether physical, hybrid, virtual or cloud based, if you are online, you are vulnerable for a security hack or compliance risk. It can be a scary world out there. Vormetric can help protect your most sensitive and valuable asset – your data. Learn more >
Introduction to Vormetric Application Encryption Tutorial Video
This video is a tutorial on the Vormetric Data Security Platform with a detailed look into the use cases for application-layer encryption and an overview of the Vormetric Application Encryption product.
Data breaches have reached an all-time high profile with serious and highly publicized incidents. The Insider Threat Report combines global survey data from over 800 IT professionals polled by Nielsen’s Harris with analyst firm Ovum’s analysis to pinpoint risks, security stances and insights into how organizations can keep from becoming a statistic.
McKesson Presents its Award Winning Cloud Architecture Presented at the 2014 Gartner Security and Risk Summit
McKesson is a Fortune 500 healthcare market leader. Kevin Peterson, Information Security and Risk Management, discusses their solution that overcame security, compliance, performance, and political obstacles to migrate multiple software applications to both public and private clouds at the Gartner Security & Risk Management Summit, National Harbor, MD, June 23 – 26, 2014. The case study includes Charles Goldberg, Sr. Dir Marketing, Vormetric summarizing and comparing US vs. Europe Insider Threat survey results and describing the Vormetric Data Security Platform capabilities.
2014 Vormetric Insider Threat Report – European Edition
EU AND US ENTERPRISES STRUGGLE TO DETECT INSIDER THREATS
Vormetric's latest Insider Threat Report, developed in collaboration with Ovum and other industry leaders, noted that nearly half of organizations considered lack of visibility into infrastructure as the major concern for cloud systems, followed by the potential for illegal access to data (46%) and lack of control over where the information is captured (44%).
The Threats from Inside: Insiders and Attacks on Insider Credentials – SkyNews TV with Vormetric’s Damian Harvey
Perimeter security is failing to protect sensitive data. From the external side, phishing and web application attacks are used to compromise credentials of legitimate users, effectively becoming the insider. Insiders in technical roles – privileged users who manage systems and infrastructure are sometimes both target and perpetrators of these breaches. Learn how these attacks happen, as well as how to place protections for data, with data to reduce attack surfaces and protect your organization.
Vormetric's Derek Tumulak comments on 2014 Data Breach Survey
SC Magazine’s Associate Editor, Teri Robinson, sits with Derek Tumulak, VP of product management at Vormetric, to discuss the findings of SC Magazine's recent data breach study. “While a majority of security practitioners indicate that they're strengthening their efforts to raise awareness and boost the security of their data, but they may not necessarily be doing enough”, according to Tumulak.
Moving to the Cloud with Confidence – Virtustream, Intel and Vormetric
Virtustream has worked very closely with Intel and Vormetric to be the 1st Cloud Computing provider to embed policy-based security and trust into their Cloud Computing platform.
Virtustream, Intel and Vormetric deliver Enterprise Class Cloud by enabling Trusted Computing, using Intel TXT, Intel Data Protection Technologies and Vormetric Transparent Encryption, and Virtustream xStream Cloud Management. This combined solution assures that companies can begin to securely migrate applications to the cloud. Vormetric data encryption takes advantage of Intel AES-NI to significantly reducing the latency and overhead typically associated with advanced encryption algorithms. Vormetric also enables the customers to be the sole custodian of their encryption keys so that they always control the polices of the users and applications that can access their data.
Data can't fly away. Data can't grow teeth. Data can't wield a sword. It needs Vormetric Data Security for advanced encryption, access policy control, and security intelligence. Protect what matters, where it matters.
BECAUSE DATA CAN’T DEFEND ITSELF
Our data is in great peril from attacks every day. Unfortunately, data has no natural defenses – it cannot save itself. But if data could defend itself, what would it look like?
Defender of DataGuard Dog
Defender of DataFighter Jet
Defender of DataKnight
Defender of DataSamurai
To stand up to the imminent threats it needs the best protection.
Vormetric gives your once vulnerable data a strong system of defense to fall back on.
Our data is in great peril every day. Unfortunately, data has no natural defenses. It needs Vormetric – the defenders of data. Vormetric Data Security Platform safeguards your most sensitive data, even against attackers inside the fence. Because with today’s modern threats, in order to protect what matters, you have to protect where it matters.
When implementing solutions that contain sensitive or regulated data within Amazon Web Services (AWS) organizations must be able to secure and control the data in this multitenant infrastructure that is not under their direct control. The Vormetric Data Security Platform delivers a combination of strong encryption, access and privileged user control policies enforcement, and security intelligence. Data Security Platform protection and controls can easily be applied to structured databases, unstructured files and file shares to protect and help maintain compliance of the data. Through centralized policy management the firewall secures and control data everywhere, across traditional data centers as well as virtual and cloud environments – including AWS. Watch this video to learn more about the solution and how you can start a free trial at http://www.vormetric.com/aws-trial
Vormetric Data Security: Complying with PCI DSS Encryption Rules
Download the whitepaper 'Vormetric Data Security: Complying with PCI DSS Encryption Rules from www.vormetric.com/pci82
This whitepaper outlines how Vormetric addresses PCI DSS compliance; it addresses Vormetric's position relative to the Payment Card Industry Security Standards Council's (PCI SSC) guidance on point-to-point encryption solutions. The whitepaper also features case studies of PCI DSS regulated companies leveraging Vormetric for PCI DSS compliance and maps PCI DSS requirements to Vormetric Data Security capabilities.
Vormetric Data Security helps organizations meet PCI DSS compliance demands with a transparent data security approach for diverse IT environments that requires minimal administrative support and does not undermine performance.
Insider threat security: The potential of damage from insider threats, such as Edward Snowden who worked at the NSA, is not only real, but widespread. This type of insider threat exists across borders (both geographic and otherwise) and in both traditional and cloud environments.
Systems administrators and other privileged users have had unrestricted access to far too many systems and the sensitive, valuable data they house. Individuals in IT roles simply do not need that level of data access to do their jobs – the right level of security controls have simply not been put in place.
Traditional perimeter security is failing, and Advanced Persistent Threats (APTs) are the culprits, and the Mandiant report on the threat landscape tells it all. As security breaches escalate, Lawmakers and Regulators around the world continue to implement new and expanded frameworks to protect critical data. Failure to comply results in loss of certification, trust and business. Along with the changing compliance landscape, the IT footprint for enterprises is undergoing radical change as well. Cloud adoption, Big Data and Virtualization are bringing economic benefits and business agility while also fundamentally changing where computing takes place, and where protected data is used. Security is the #1 concern. What's needed is Data Security strategy. Defense in depth with security intelligence that starts from the inside out (where the data is), not from the outside in. Protect What Matters -- The Data
Organizations are placing a tremendous amount of data collected from various sources into huge repositories. These Big Data repositories introduce a new, large and attractive target for malicious parties seeking to gain unrestricted access to this data. And by nature, Big Data leverages a big infrastructure -- dispersed applications servers running analytics on data and storage systems containing massive amounts of data. Today organizations need to develop a strategy up front to securely lock down and control data access instead of implementing a Big Data environment and making security an afterthought. Big Data means Big Risk -- Protect What Matters.
Protect What Matters - Timeline of Data and Data Breaches
The potential of damage from insider threats is not only real, but widespread. It exists across borders and in both traditional and cloud environments. Systems administrators and other privileged users have had unrestricted access to many systems and the sensitive data they house...
Vormetric Data Security - Security Breach Supercut
Security breach! Some great clips from 50 years of iconic movies about data breaches, computer hacks, and encryption cracks all in one fun supercut. None of them, we're pretty sure, used Vormetric data security solutions.