Welcome!

Every Cloud Needs a Silver Lining

Gilad Parann-Nissany

Subscribe to Gilad Parann-Nissany: eMailAlertsEmail Alerts
Get Gilad Parann-Nissany via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gilad Parann-Nissany

Porticor, the leading cloud data security company delivering the only cloud-based data encryption solution that infuses trust into the cloud by ensuring customer keys are never exposed, today formally launched to make available the industry’s first solution combining data encryption with patented key management to protect critical data in public, private and hybrid cloud environments. Since Porticor uniquely addresses the fundamental cloud security issue of data encryption with keys managed in the cloud, companies are now assured that their private data stored in the cloud across a variety of storage types, including virtual disks, databases, distributed storage and file systems, is fully protected. “Many organizations have already realized the advantages of cloud infrastructure, but security hazards and regulation prevent many more from truly leveraging cloud ben... (more)

Porticor is Now a Red Hat Innovate Member

With an objective to deliver an end-to-end cloud data security solution based on Red Hat Enterprise Linux to Red Hat customers, Porticor – a company offering cloud data security solutions – recently joined the Red Hat Innovate program. By joining the Red Hat Innovate program, Porticor is able to leverage the power, openness and collaborative nature of open source communities, including enhanced access to Red Hat collaboration initiatives and software programs. The Red Hat Innovate program offers its members with benefits such as joint marketing opportunities; access to Red Hat ... (more)

Five Cloud Encryption Tips

A day doesn’t go by when we don’t hear about sensitive information being exposed or stolen. The culprits could be the government, professional hackers, careless employees with data on mobile devices, or internal employees with unauthorized access to data or unintentional release of data. It seems the wave of data breaches has gained momentum as data has moved from internal servers to the cloud; and access has gone mobile. Though the fact remains that there will be gaps in security, the goal of companies and IT departments should be to make those gaps as small and as difficult to ... (more)

What Types of Data Require Cloud Encryption?

Government laws and industry regulations in the United States and around the world mandate protection of sensitive data. Data must be secure when at rest, during transactions and when it transverses network connections. Each industry has specific regulations, which are commonly used in data centers and should be used in the cloud as well.  Whether cloud encryption is demanded by your government, your industry, your customers, or simply your own good business sense – it is a best practice for any business that operates in the cloud. Encryption is more important in the cloud than ... (more)

Disruptive Innovations and the 'Internet of Things' | @ThingsExpo [#IoT]

Disruptive Innovations in Cloud Computing The global village, mobile devices, online marketplaces, social networks, and on-demand entertainment all have a part to play. People all over the world are increasing the time they spend in the virtual world. They’re buying, selling, sharing, studying, developing apps, hanging out in social networks, and starting to use digital currencies that bypass traditional banking. Alongside these community-driven ideas, we are also seeing enormous change in business to business relationships. Cloud computing enables any size business to obtain and... (more)