Vormetric

Type: Company
Name: Vormetric
First reported 5 hours ago - Updated 5 hours ago - 1 reports

McKesson To Speak At Gartner Security Summit On Award Winning Cloud Architecture With Vormetric

World News: 14:00 GMT Thursday 19th June 2014 . [ ]SAN JOSE, Calif. June 19, 2014 Vormetric, a leader in enterprise data security for physical, virtual and cloud environments, today announced that Kevin Peterson , Information Security and Risk Management ... [Published SPi World News - 5 hours ago]
First reported Jul 10 2014 - Updated Jul 10 2014 - 4 reports

Con-way Delivers Securely with Vormetric Transparent Encryption

SAN JOSE, Calif., July 10, 2014 /PRNewswire/ -- Vormetric, a leader in enterprise data security for physical, virtual and cloud environments, announced today that a case study on Con-way Inc. and its implementation of Vormetric Transparent Encryption ... [Published Auto & Transportation - Jul 10 2014]
First reported Jul 10 2014 - Updated Jul 10 2014 - 1 reports

With Great Data Comes Great Legal Consequences – Preparing for the Next Encryption Battle

With penalties as high as $500k a new Florida law, effective July 1, adds big teeth to the state’s data breach notification statute. One of the most interesting changes redefines the concept of ‘personal information.’ The new Florida Information Protection ... [Published Security Bloggers Network - Jul 10 2014]
First reported Jul 08 2014 - Updated Jul 08 2014 - 1 reports

Security measures to go under spotlight as new Data Protection Directive approaches

The existing EU data protection regime is built around the Data Protection Directive 1995 (the 1995 Directive) and the Privacy and Electronic Communications Directive 2002 (ePrivacy Directive).  With a new EU Data Protection law said to be on-track for ... [Published Security Bloggers Network - Jul 08 2014]
First reported Jul 04 2014 - Updated Jul 04 2014 - 1 reports

Securing Big Data HADOOP Performance with Vormetric Transparent Encryption

Download Now Free registration requiredExecutive SummaryThis White Paper shows the performance of several benchmark tests of Vormetric Transparent Encryption running on a Cloudera HADOOP system using several different workloads. The overhead is minimal ... [Published Tech Republic - Jul 04 2014]
First reported Jul 04 2014 - Updated Jul 04 2014 - 1 reports

The Federal Government Should Have NIST As Well

Download Now Free registration requiredExecutive SummaryCritical to certification for meeting FIPS, is the implementation of security controls from NIST 800-53, Appendix F. Focusing on the capabilities needed to meet these requirements, this paper provides ... [Published Tech Republic - Jul 04 2014]
First reported Jul 01 2014 - Updated Jul 01 2014 - 1 reports

The Vormetric 2013 Insider Threat Report

The 2013 Vormetric Insider Threat Report administered by The Enterprise Strategy Group (ESG), revealed insider threats (i.e., threats posed by employees, third parties with insider privileges, or malicious software that uses legitimate access rights to ... [Published ITworld.com - Jul 01 2014]
First reported Jun 25 2014 - Updated Jun 25 2014 - 2 reports

McKesson to Present at Gartner Security Summit on Cloud Architecture with Vormetric

at 02:26 AM EDT Vormetric reported that Kevin Peterson, Information Security and Risk Management for global healthcare market company McKesson, will speak at the Gartner Security Summit in Washington DC on June 25, at 9:30 AM in room Potomac 1.... ... [Published Industrial Info Financials - Jun 25 2014]
First reported Jun 20 2014 - Updated Jun 20 2014 - 2 reports

Vormetric Insider Threat Report – European Edition (EMEA)

Download Type: Adobe PDFThe 2014 Vormetric Insider Threat Report - European Edition represents the result of analysis of interviews with over 500 IT and Security managers in major European enterprises around the question of insider threats.Insider threats ... [Published Infosecurity Today - Jun 20 2014]
First reported Jun 19 2014 - Updated Jun 19 2014 - 4 reports

McKesson To Speak At Gartner Security Summit On Award Winning Cloud Architecture With Vormetric

--SAN JOSE, Calif. , June 19, 2014 /PRNewswire/ -- Vormetric,a leader inenterprise data security for physical, virtual and cloud environments,today announced that Kevin Peterson , Information Security and Risk Management for global healthcare market leader ... [Published IT Business Net - Jun 19 2014]
First reported Jun 17 2014 - Updated Jun 17 2014 - 3 reports

Vormetric Collaborates with MongoDB to Bolster Data-at-Rest Protection for NoSQL Big Data Environments

Vormetric has reported a partnership with MongoDB that extends its data protection solutions to MongoDB NoSQL powered big data environments. In its release, Vormetric said that its Transparent Encryption and ... ... [Published Crawford Financial Planning - Jun 17 2014]
First reported Jun 12 2014 - Updated Jun 12 2014 - 1 reports

Vormetric, MongoDB Form Database Security Partnership; Tina Stewart Comments

Vormetric and open-source database firm MongoDB have partnered to help enterprise customers protect data and applications in a NoSQL environment by using Vormetric’s security products.The Vormetric encryption suite works to manage sensitive data at rest ... [Published New New Internet - Jun 12 2014]

Quotes

...it is located across our whole environment," said Praveen Sharabu, Senior Director, IT Infrastructure and Vendor Management Office, Con-way Inc. "What we really appreciate – beyond the advanced features and level of protection we've been able to deploy – is Vormetric integrating everything into a very intuitive package that met our goals for data-level security, operational simplicity and user transparency."
...MongoDB to gain timely, meaningful insights and build deep customer relationships", said Tina Stewart Vice President of Marketing for Vormetric . "With Vormetric , organizations gain the security controls needed to reap these benefits while protecting sensitive data within the environment against data breaches, meeting regulatory requirements and adhering to compliance mandates."
...barrier for organizations that need to protect data-at-rest across multiple applications and environments," said Alan Kessler CEO of Vormetric . "For these organizations, the addition of Vormetric Application Encryption to the Vormetric Data Security Platform is a game changer. With our single, flexible, centralized platform, organizations can now meet legal and industry governance requirements that mandate encryption of data without the expense and overhead inherent in multiple solutions."
...Analyst with 451 Research. "The most common use case for this combined solution is to help customers address regulatory compliance or data residency needs without the expense of purchasing separate application encryption offerings, encryption gateways, key management or tokenization functionality. Customizing apps isn't always easy or desirable, but in cases where field-level encryption is mandated for certain applications as a supplement to file-level encryption, the potential cost savings and efficiencies of a platform approach can ease the process."

More Content

All (145) | News (69) | Reports (0) | Blogs (76) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
McKesson To Speak At Gartner Security Summit On... [Published SPi World News - 5 hours ago]
Con-way Delivers Securely with Vormetric Transp... [Published Auto & Transportation - Jul 10 2014]
Con-way Delivers Securely with Vormetric Transp... [Published Indianapolis Business Journal - Jul 10 2014]
Con-way Delivers Securely with Vormetric Transp... [Published Nations Restaurant News - Jul 10 2014]
Con-way Delivers Securely with Vormetric Transp... [Published Auto & Transportation - Jul 10 2014]
With Great Data Comes Great Legal Consequences ... [Published Security Bloggers Network - Jul 10 2014]
Security measures to go under spotlight as new ... [Published Security Bloggers Network - Jul 08 2014]
2014 Insider Threat Report [Published Tech Republic - Jul 04 2014]
The Federal Government Should Have NIST As Well [Published Tech Republic - Jul 04 2014]
Securing Big Data HADOOP Performance with Vorme... [Published Tech Republic - Jul 04 2014]
Meeting PCI DSS 3.0 Requirements with Data-at-R... [Published Tech Republic - Jul 04 2014]
Using Encryption and Access Control for HIPAA C... [Published Tech Republic - Jul 04 2014]
Incite 7/2/2014 — Relativity [Published Security Bloggers Network - Jul 02 2014]
Incite 7/2/2014 — Relativity [Published Securosis Highlights - Jul 02 2014]
The Vormetric 2013 Insider Threat Report [Published ITworld.com - Jul 01 2014]
The problem with international use of personal ... [Published Security Bloggers Network - Jul 01 2014]
Looking Back at the Gartner Security and Risk S... [Published Security Bloggers Network - Jun 30 2014]
Best Practices for Protecting Sensitive Data fr... [Published Virtualization Review - Jun 27 2014]
How can businesses best protect themselves agai... [Published BusinessTechnology - Jun 26 2014]
Gartner: Best practices for Amazon AWS security [Published NetworkWorld - Jun 25 2014]
McKesson to Present at Gartner Security Summit ... [Published Industrial Info Financials - Jun 25 2014]
McKesson to Present at Gartner Security Summit ... [Published Insurance News Net - Jun 25 2014]
Demystifying Cloud Security with a Visit to Hom... [Published Security Bloggers Network - Jun 24 2014]
Vormetric Insider Threat Report – European Edit... [Published Infosecurity Today - Jun 20 2014]
Key Management a Fast Growing Space [Published Cloud Computing Journal - Jun 20 2014]
CONTRIBUTION FROM VORMETRIC ON THE IMPACT OF TH... [Published Global Banking & Finance Review - Jun 20 2014]
McKesson To Speak At Gartner Security Summit On... [Published IT Business Net - Jun 19 2014]
McKesson To Speak At Gartner Security Summit On... [Published Indianapolis Business Journal - Jun 19 2014]
Cloud Security – 9 Keys to Protecting Enterpris... [Published Security Bloggers Network - Jun 19 2014]
McKesson To Speak At Gartner Security Summit On... [Published CEOWorld Magazine - Jun 19 2014]
1 2 3 4 5
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
With Great Data Comes Great Legal Consequences ... [Published Security Bloggers Network - Jul 10 2014]
With penalties as high as $500k a new Florida law, effective July 1, adds big teeth to the state’s data breach notification statute. One of the most interesting changes redefines the concept of ‘personal information.’ The new Florida Information Protection ...
Security measures to go under spotlight as new ... [Published Security Bloggers Network - Jul 08 2014]
The existing EU data protection regime is built around the Data Protection Directive 1995 (the 1995 Directive) and the Privacy and Electronic Communications Directive 2002 (ePrivacy Directive).  With a new EU Data Protection law said to be on-track for ...
Incite 7/2/2014 — Relativity [Published Security Bloggers Network - Jul 02 2014]
As you get older, it seems that time move faster. There may be something to these theories of Einstein. It’s hard to believe that yesterday was July 1. That means half of 2014 is in the rear view mirror. HALF That’s unbelievable to me. Time is flying ...
Incite 7/2/2014 — Relativity [Published Securosis Highlights - Jul 02 2014]
As you get older, it seems that time move faster. There may be something to these theories of Einstein. It’s hard to believe that yesterday was July 1. That means half of 2014 is in the rear view mirror. HALF That’s unbelievable to me. Time is flying ...
The problem with international use of personal ... [Published Security Bloggers Network - Jul 01 2014]
Introduction Let’s suppose the United States I.R.S. is in the process of chasing down a tax-dodging expatriate and wants access to financial records from a Finnish company the expat has done business with. The U.S. would simply ask the company to fork ...
1 2 3 4 5 6 7 8 9 10 ...
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.