Government laws and industry regulations in the United States and around the
world mandate protection of sensitive data. Data must be secure when at rest,
during transactions and when it transverses network connections. Each
industry has specific regulations, which are commonly used in data centers
and should be used in the cloud as well. Whether cloud encryption is
demanded by your government, your industry, your customers, or simply your
own good business sense – it is a best practice for any business that
operates in the cloud.
Encryption is more important in the cloud than in the physical data center.
This is, quite simply, because clouds do not have walls like data centers do.
Encryption is an excellent solution for creating a mathematical replacement
for physical walls – keeping data secure and private, and keeping the bad
The following types of d... (more)
Top Executive: Gilad Parann-Nissany, Founder & CEO
Porticor’s Virtual Private Data system combines encryption with key
management to protect data in public, private and hybrid cloud environments.
With split-key encryption technology, Porticor Virtual Private Data ensures
keys remain under customer control and are never exposed in storage.
See the list here.
The post Emerging Vendors 2013: Security Vendors appeared first on Porticor
Cloud Computing – the buzz words of the technology sector this decade: if
you’re not already doing it, you’re missing out. Articles have been
written. Experts have been crowned. Events have been attended. We all
agree – the cloud presents opportunities for cost savings, elasticity, and
But for companies that are bound by Payment Card Industry Data Security
Standard (PCI DSS), securing financial data in “the cloud” presents new
How is the Cloud Different? Securing brick and mortar businesses was one
thing, securing data centers and hardware was an added ... (more)
A day doesn’t go by when we don’t hear about sensitive information being
exposed or stolen. The culprits could be the government, professional
hackers, careless employees with data on mobile devices, or internal
employees with unauthorized access to data or unintentional release of data.
It seems the wave of data breaches has gained momentum as data has moved from
internal servers to the cloud; and access has gone mobile. Though the fact
remains that there will be gaps in security, the goal of companies and IT
departments should be to make those gaps as small and as difficult to ... (more)
Introduction to PCI DSS and the Cloud
The news is always full of major incidents of consumer credit card
information being compromised. To protect against dangerous hacks that can
lead to thefts of business data or customer identities, best practices are
set forth in the Payment Card Industry Data Security Standard (PCI DSS).
These 12 steps set up a framework for a secure payment environment.
If your business stores, processes, or transmits payment cardholder data in
the cloud, you are bound by PCI DSS. But unlike “brick and mortar” data
centers that must also adhere to PCI DSS, t... (more)