Welcome!

Vormetric Big Data and Cloud Security

Vormetric Blog

Subscribe to Vormetric Blog: eMailAlertsEmail Alerts
Get Vormetric Blog via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Vormetric Blog

We’ve just released our third annual Vormetric Insider Threat Report – Global Edition, and I thought I’d share with you a roll up of what I found most significant for cloud providers from the data. We’re especially happy with the results this year – polling was provided by Harris Poll, an especially strong global survey organization, with results from 818 IT Decision makers in both US and Global enterprises.  The author for the report is once again Ovum Analyst Andrew Kellett – an expert in global IT Security technologies and risks for enterprise customers. : In #2015InsiderThreat- Enterprises want SaaS/Cloud Security Commitments Front and Center says @CJRad http://bit.ly/1z8bu5L It won’t be any surprise that enterprises are worried about their cloud and SaaS implementations. They were most worried about sensitive data stored in cloud applications, and... (more)

Data Security Platform Should Be Priority By @Vormetric | @CloudExpo [#Cloud]

Why a Data Security Platform Should Be a Priority for Your Enterprise by Derek Tumulak When it comes to data security, identifying what you consider your crown jewels is the first step in the data security recovery program. Legacy products can be expensive and negatively impact performance. Organizations need to realize that the complexity and fear of access control is a thing of the past. Before we get started on recovery, here are a few things you need to ask yourself: How much privacy do employees warrant? What level of control do I need to monitor activity? Organizations’ s... (more)

Data Breaches & Five Stages of Grief By @Vormetric | @CloudExpo [#Cloud]

Data Breaches and the Five Stages of Grief: A Prediction for Next Year By Charles Goldberg I try to keep on top of the news, particularly as it relates to the nature and severity of cyber attacks taking place. Sadly, there’s been no shortage of reading material lately. Last month, there were reports on breaches at Kmart and Dairy Queen (my family loves Blizzards). Updates then came out about a massive breach at Home Depot. Then more recently, there’s been the spate of nation-state attacks on the USPS, National Oceanic and Atmospheric Administration (NOAA), Sony Entertainment and ... (more)

Internet of Things Drives Stronger Security for Big Data By @Vormetric | @ThingsExpo [#IoT]

IoT Drives Stronger Security for Big Data Environments By Ashvin Kamaraju The slogan “Internet of Things (IoT) X Big Data = Unprecedented Value!” caught my attention as I was listening to a presentation from Intel Corporation. The scale of the IoT disruption was described in terms of things, data and value: 50 billion devices are expected to connect to the Internet by 2016. As recently as 2013 this was 0.5 Billion These devices will generate 35 Zetabytes of data! And can create an estimated value of $2 to $6 trillion in global economic impact. Now that is huge by any measure! ... (more)

Full Disk Encryption Is Physical Security By @Vormetric | @CloudExpo [#Cloud]

Full Disk Encryption Is Physical Security, Not IT Security What threats are you trying to mitigate with full disk encryption? For a laptop that is moved around from office to home or out on a business trip full disk encryption should be standard. You need to protect that asset in the event of theft or loss of the device. It’s a great physical security. When properly implemented full disk encryption will render any information stored on that device useless. That’s great for a laptop, but what about your data center? ClickToTweet: Full Disk Encryption – Physical Security, Not IT Se... (more)