Cloud Security Authors: Pat Romanski, Elizabeth White, Zakia Bouachraoui, Yeshim Deniz, Liz McMillan

Related Topics: Cloud Security

News Feed Item

RSA Security Unveils Comprehensive Enterprise Data Protection Initiative

Protegrity Corporation Joins with RSA Security as Flagship Member of New RSA(R) Key Manager Partner Program

GARTNER IT Security Summit, WASHINGTON, June 5 /PRNewswire-FirstCall/ -- RSA Security today announced an initiative to provide companies with a more comprehensive approach to enterprise data protection (EDP). RSA Security's EDP approach is designed to provide a robust framework for protecting an organization's sensitive data in any place where data reside: at the application-level; within databases; in files and operating systems; on laptops and mobile devices, and in storage. In addition, this EDP framework addresses the management of associated encryption keys, access control and authentication -- helping organizations mitigate risk and reduce costs, while protecting consumer, employee and partner information.

As the cornerstone of this initiative, RSA Security also announced a new RSA Key Manager Partner Program and a strategic partnership with Protegrity(R) Corporation to deliver seamless interoperability between Protegrity Defiance(TM) Data Protection System (DPS) and Protegrity VPDisk, and RSA Key Manager software.

A New and Comprehensive Approach to Enterprise Data Protection

To date, EDP has focused on data in backup and storage systems. However, regional and vertical mandates -- such as U.S. state breach notification laws (e.g., California Senate Bill 1386), the European Union's Data Privacy Directive, Japan's Personal Information Protection Act and the Payment Card Industry standard -- are driving companies to take a more proactive stance on protecting data at rest. In addition, according to Gartner, Inc.: "Protecting customer data is much less expensive than dealing with a security breach in which records are exposed and potentially misused." Specifically, Gartner estimates that compromises involving more than 1 million accounts will be close to $50 per account. Smaller breaches carry significant costs, as well -- in 2002, Gartner estimated that the cost per account will be closer to $1,500 per account, not including market cap fluctuation, when about 5,000 accounts were compromised. (source: "Data Protection is Less Costly than Data Breaches," John Pescatore and Avivah Litan. September 16, 2005)

Organizations are seeking to avoid the financial and brand integrity costs associated with compromised data, while positioning themselves to take advantage of "safe harbors" which often protect companies from disclosure if appropriate steps have been taken to protect sensitive information. RSA Security's approach helps companies protect themselves through its EDP framework which includes the following components:

* Application protection: Institutes policies and procedures that enable software developers to effectively build security into enterprise applications * Data protection: Helps ensure that data are encrypted everywhere it may reside, including databases, laptops/mobile devices, files/OSs, and storage * Encryption key management: Enables organizations to effectively and efficiently manage encryption keys generated by disparate enterprise applications to help guarantee the seamless flow of protected information * Access control: Helps ensure that appropriate separation of duties is enforced among both general users and system administrators * Strong authentication: Enables organizations to have more surety in the identity of their system administrators. RSA Key Manager Partner Program

Core to RSA Security's EDP framework is the ability to manage encryption keys generated by disparate applications -- which also requires the integration of key management with data protection solutions. The RSA Key Manager Partner Program will allow organizations to certify the interoperability of data protection solutions with RSA Key Manager software, a stand-alone key lifecycle management offering. In addition, partners may also work with RSA Security in joint sales and marketing efforts.

This program furthers RSA Security's long-standing effort to ensure flexibility and choice, by allowing companies to leverage RSA Security's technology alongside offerings from other technology vendors. The program will also help maintain the free flow of information by centralizing ongoing administration of key management policies, encryption rules and access control policies, while going beyond enterprise encryption to tackle key management on a broader IT level.

Protegrity Partnership

Protegrity Corporation, a leading provider of data security management solutions, is the flagship partner in the new RSA Key Manager Partner program. Looking ahead, the companies anticipate delivering interoperability between RSA Key Manager software and:

* Protegrity Defiance DPS, a high-performance, enterprise-class software solution that helps secure sensitive data in databases, archives and storage * Protegrity VPDisk, which is designed to provide a transparent and easy-to-administer solution for securing sensitive files, and makes strong encryption a natural storage format for structured and unstructured information, enabling file-by-file, directory-by-directory, and tree-by-tree encryption, with flexible key management and file sharing.

By forging this strategic partnership, joint customers will have peace of mind knowing their data are protected by Protegrity's solutions, and that they have access to a fully interoperable key management solution.

"Protegrity and RSA Security are natural partners to lead the industry in this EDP initiative. We are combining our strengths to the security advantage of our clients," said Gordon Rapkin, president and CEO at Protegrity. "We view the RSA Key Manager Partner Program as a major advance in enabling corporations to truly adopt and manage an enterprise-wide culture of security to protect customer, employee, and corporate data."

RSA Security's Enterprise Data Protection Solution

Complementing RSA Key Manager and the RSA Key Manager Partner Program are solutions which enhance the company's EDP framework:

* Application protection: RSA Data Security Manager is a middleware software solution offering policy-driven encryption with easy-to-use interfaces for software developers * Access control: RSA ClearTrust(R) access management software provides the necessary separation of duties among users to help meet regulatory requirements * Authentication: RSA SecurID(R) two-factor authentication technology provides the ability to determine, with certainty, the identity of individuals accessing vital corporate resources.

"As regulatory mandates bear down on companies across industries and regions, it has become clear that focusing only on encrypting data in storage and backup will not be sufficient in terms of protecting sensitive business information," said Rick Welch, senior vice president and general manager, Developer Solutions Division at RSA Security. "We are excited about our relationship with Protegrity, and believe that this partnership, and the RSA Key Manager Partner Program, will offer businesses a unique and robust framework for protecting enterprise data."

Web Seminar: RSA Security and Protegrity strategic partnership Further details regarding the strategic partnership between RSA Security and Protegrity will be available in a Web seminar, scheduled for Thursday, June 22 at 1:30 pm ET -- to register please visit http://www.rsasecurity.com/go/webcast/2006/060622DSG/060622_webcast_invi... l.

About the Gartner IT Security Summit

The Gartner IT Security Summit hits the critical spot between strategic planning and tactical advice. Gartner analysts, industry experts and IT security practitioners deliver unbiased, realistic analysis on the current state of IT security, as well as an independent overview of the market over the next 12-18 months. Covering the depth and breadth of topics comprising IT security today, the Gartner IT Security Summit has a single objective: to bring to light the repeatable, manageable security processes needed to address today's and tomorrow's threats. Additional information is available at http://www.gartner.com/us/itsecurity.

About RSA Security Inc.

RSA Security Inc. is the expert in protecting online identities and digital assets. The inventor of core security technologies for the Internet, the Company leads the way in strong authentication, encryption and anti-fraud protection, bringing trust to millions of user identities and the transactions that they perform. RSA Security's portfolio of award-winning identity & access management solutions helps businesses to establish who's who online -- and what they can do.

With a strong reputation built on a 20-year history of ingenuity, leadership and proven technologies, we serve more than 20,000 customers -- including financial institutions representing hundreds of millions of consumers around the globe -- and interoperate with over 1,000 technology and integration partners. For more information, please visit http://www.rsasecurity.com/

About Protegrity

Protegrity Corporation delivers enterprise-wide data security management solutions for end-to-end protection for applications and sensitive data, enabling companies to deploy comprehensive security policies with centralized management and auditing. Protegrity is committed to protecting sensitive data wherever it resides in today's highly distributed and heterogeneous computing environments.

Protegrity empowers management to take responsibility for sensitive data by mitigating legal and financial risks associated with security breaches and assuring compliance with regulatory requirements for data security.

For more than ten years, Protegrity's award-winning technology has enabled customers to address and resolve critical security challenges. Protegrity invented the core technology used for data-level encryption and owns key patents for database and application security and protection. For more information, visit http://www.protegrity.com/ or call 203.326.7200 x1004.

ClearTrust, RSA, RSA Security and SecurID are either registered trademarks or trademarks of RSA Security Inc. in the United States and/or other countries. Protegrity and Defiance are either registered trademarks or trademarks of Protegrity Corporation. All other trademarks are the property of their respective owners.

For more information: Kelli Gail Dave Howell OutCast Communications RSA Security Inc. (646) 442-3772 (781) 515-6303 [email protected]@rsasecurity.com For Protegrity Steven Blinn or Eileen Michaels Paul Giardina BlinnPR Protegrity (212) 675-4777 (203) 326-7200 [email protected]@[email protected]

RSA Security Inc.

CONTACT: Kelli Gail of OutCast Communications, for RSA Security Inc.,
+1-646-442-3772, [email protected]; Dave Howell of RSA Security Inc.,
+1-781-515-6303, [email protected]; Steven Blinn, [email protected], or
Eileen Michaels, [email protected], both of BlinnPR, for Protegrity,
+1-212-675-4777; or Paul Giardina of Protegrity, +1-203-326-7200,
[email protected]

Web site: http://www.rsasecurity.com/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The graph represents a network of 1,329 Twitter users whose recent tweets contained "#DevOps", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Thursday, 10 January 2019 at 23:50 UTC. The tweets in the network were tweeted over the 7-hour, 6-minute period from Thursday, 10 January 2019 at 16:29 UTC to Thursday, 10 January 2019 at 23:36 UTC. Additional tweets that were mentioned in this...
Over the course of two days, in addition to insightful conversations and presentations delving into the industry's current pressing challenges, there was considerable buzz about digital transformation and how it is enabling global enterprises to accelerate business growth. Blockchain has been a term that people hear but don't quite understand. The most common myths about blockchain include the assumption that it is private, or that there is only one blockchain, and the idea that blockchain is...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Never mind that we might not know what the future holds for cryptocurrencies and how much values will fluctuate or even how the process of mining a coin could cost as much as the value of the coin itself - cryptocurrency mining is a hot industry and shows no signs of slowing down. However, energy consumption to mine cryptocurrency is one of the biggest issues facing this industry. Burning huge amounts of electricity isn't incidental to cryptocurrency, it's basically embedded in the core of "mini...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
The term "digital transformation" (DX) is being used by everyone for just about any company initiative that involves technology, the web, ecommerce, software, or even customer experience. While the term has certainly turned into a buzzword with a lot of hype, the transition to a more connected, digital world is real and comes with real challenges. In his opening keynote, Four Essentials To Become DX Hero Status Now, Jonathan Hoppe, Co-Founder and CTO of Total Uptime Technologies, shared that ...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...