Welcome!

Vormetric Big Data and Cloud Security

Vormetric Blog

Subscribe to Vormetric Blog: eMailAlertsEmail Alerts
Get Vormetric Blog via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Vormetric Blog

It's all ‘Bout That Access, ‘Bout That Access, ‘Bout That Access - 2015 Insider Threat Report Takeaways While a year ago the big breach of the day involved likes of Target, now the breach landscape – which was once about financial gain – has exploded. It’s exploded to a world of state-sponsored attacks, of hackers getting more intelligent and of political organizations cyber-attacking alongside using physical force. Today we issued our 2015 Vormetric Insider Threat report. Coming off of the Sony breach and Obama’s State of the Union address, we can’t think of a better time to deliver a report that provides so much insight into where the cyber security industry stands. Here’s one stat that really stands out: Despite this unsettling news, results from our 2015 Vormetric Insider Threat Report show that insider threat awareness levels have increased: 55% of responden... (more)

What does tokenization mean for our European customers?

You may have seen the recent blog post from Charles Goldberg, which provides an overview of tokenization and our new product offering in this area.  Here in the UK and Europe, we’re seeing specific demand for these capabilities around three key areas, which I’d like to highlight here. : Euro and UK Applications for Tokenisation and Data Masking from @Vormetric http://bit.ly/1KH4mR5 PCI DSS If an organisation has any need to handle payment card details, it must adhere to PCI compliance guidelines.  Although in many regards Europe is at the cutting edge of card secur... (more)

Getting Data Security Right By @KessAlan | @CloudExpo #Cloud

Getting Data Security Right: Healthcare, Retail, Financial Services and Government By Alan Kessler It seems like every time I write a blog, a new breach has occurred (for an up-to-date look at local, state and federal breaches I suggest you periodically review the Identity Theft Resource Center’s running list). Since I last penned a post, we’ve seen breaches of the Mayo Clinic, Citizen’s Bank, CVS and Arkansas BlueCross/BlueShield. To the average person, most breaches probably bleed together. If you’ve seen one breach, you’ve seen them all, right? If we’re going off of that logi... (more)

Internet of Things Drives Stronger Security for Big Data By @Vormetric | @ThingsExpo [#IoT]

IoT Drives Stronger Security for Big Data Environments By Ashvin Kamaraju The slogan “Internet of Things (IoT) X Big Data = Unprecedented Value!” caught my attention as I was listening to a presentation from Intel Corporation. The scale of the IoT disruption was described in terms of things, data and value: 50 billion devices are expected to connect to the Internet by 2016. As recently as 2013 this was 0.5 Billion These devices will generate 35 Zetabytes of data! And can create an estimated value of $2 to $6 trillion in global economic impact. Now that is huge by any measure! ... (more)

Full Disk Encryption Is Physical Security By @Vormetric | @CloudExpo [#Cloud]

Full Disk Encryption Is Physical Security, Not IT Security What threats are you trying to mitigate with full disk encryption? For a laptop that is moved around from office to home or out on a business trip full disk encryption should be standard. You need to protect that asset in the event of theft or loss of the device. It’s a great physical security. When properly implemented full disk encryption will render any information stored on that device useless. That’s great for a laptop, but what about your data center? ClickToTweet: Full Disk Encryption – Physical Security, Not IT Se... (more)