Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 26 February 2011

CREDANT TECHNOLOGIES LAUNCHES BETA PROGRAM FOR CLOUD ENCRYPTION SOFTWARE

Posted on 08:36 by Unknown

CREDANT Removes Major Roadblock to Cloud Adoption through Unique Data Encryption Approach

London, February 2011: CREDANT Technologies, the trusted experts in data protection, today announced immediate availability of the beta program for its cloud encryption software for virtual desktop infrastructure (VDI) private cloud infrastructures. The new CREDANT cloud security platform provides enterprise customers with the ability to more rapidly embrace cloud infrastructure by removing the primary roadblock to adoption – data security. With this launch, CREDANT enables organizations to control and enforce security whether corporate data is located in private, hybrid or public cloud infrastructures. The CREDANT cloud security platform provides the only cloud data security approach to enable granular encryption, access control and key management that allows enterprises, including the cloud provider itself.

Tweet this: #CREDANT launches cloud encryption software beta. Register here to participate: http://bit.ly/e3sTii  (new url is www.credant.com/cloudsecurity)

CREDANT, the comprehensive provider of endpoint, mobile, and cloud data protection, is breaking down the security barriers for clients moving to cloud computing models.  CREDANT’s approach, new to the field of cloud security, is to protect data itself rather than protecting specific volumes, drives, or devices. Its encryption technology is the only automated, centrally managed, policy-based solution on the market, providing real-time protection and peace of mind for enterprise and governmental customers with sensitive data. Competitive solutions are either unworkable in cloud infrastructures or are highly labor intensive and have so far failed to meet the needs of enterprise customers wishing to move to the cloud.

The solution will enable businesses and governmental organizations to deploy private cloud infrastructures as part of their long-term roadmap to full cloud utilization by putting data security in the control of the enterprise—not the cloud administrator.  By enabling the IT security organization to control encryption of critical data on cloud platforms centrally, and in a way that is fully integrated with other data protection and encryption solutions already in place, organizations can safely embrace private, hybrid, and public cloud computing models with the knowledge that their data is safe from co-tenants, hackers, and malicious insiders. The CREDANT cloud security platform:

· Effectively eliminates the risk of an insider (either within the organization or working for an outsourced provider) accessing or stealing sensitive data;

· Provides granular access to decrypted information to the authorized user only while;  administrators (local and third-party) access only the system and not the protected data; and,

· Enables seamless management of data security on physical infrastructure, mobile devices, removable media, private clouds, virtual desktop infrastructures, and hybrid/public cloud models, in a way that is transparent to users.

· Prevents unprotected data leakage to removable media while enabling secure usage and control of removable storage.

“CREDANT’s robust key management technology and data-centric encryption technology allows us to solve one of the core Cloud security problems in a fundamentally different way ,” said Chris Burchett, Chief Technology Officer and co-founder, CREDANT Technologies. “The complexity of managing cloud infrastructures requires a new model for data security, and our new offering defines the path for organizations to more rapidly and securely adopt cloud models by removing the risks of data theft and insider attack wherever the data resides.  This isn’t just about security – it’s about accelerating the transformation to the cloud for our customers.”

The CREDANT is the first of a series of releases targeting data security in the cloud. It provides simple, centrally managed security for data in private cloud infrastructures utilizing VDI. This new solution offers a far more secure and business-aligned approach to protect data, and is built upon CREDANT’s extensive expertise as the world’s largest endpoint data security specialist. The beta program is now available; organizations can register to participate by visiting www.credant.com/cloudsecurity.

CREDANT Technologies is the trusted expert in data protection. CREDANT's data security solutions mitigate risk, preserve customer brand, and reduce the cost of compliance, enabling business to "protect what matters." CREDANT has been recognized by Inc. magazine as the #1 fastest growing security software company in 2008 and 2007; was selected by Red Herring as one of the top 100 privately held companies and top 100 Innovators; and was named Ernst & Young Entrepreneur of the Year® 2005. Austin Ventures, Menlo Ventures, Crescendo Ventures, Intel Capital (NASDAQ:INTC), and Cisco Systems (NASDAQ:CSCO) are investors in CREDANT Technologies. For more information, visit www.credant.com.

Source: Eskenzi PR

This press release is presented without editing for your information only.

Full Disclosure Statement: The ICT REVIEW received no compensation for any component of this article.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ▼  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ▼  February (30)
      • Security Concerns over Cloud Storage
      • Lieberman Software warns on new hacking trend of m...
      • 95% of parents found children accessing internet p...
      • Parallels to leverage Scality RING technology in i...
      • Connectria selects Scality to launch a public clou...
      • Flash disk security is very different to magnetic ...
      • New Financial Trojan OddJob Keeps Online Banking S...
      • US worries over Internet `kill switch' highlights ...
      • CREDANT TECHNOLOGIES LAUNCHES BETA PROGRAM FOR CLO...
      • Beware the Enemy Within
      • Infosecurity Europe welcomes plans for rapid taked...
      • ISACA’s EuroCACS Examines Data Protection, Cloud C...
      • Imperva warns on the real insider security threat
      • Tufin unveils new functionality & updated PCI DSS ...
      • Trusteer Secure Web Access prevents attacks that e...
      • Venafi launches 1st universal automated management...
      • Safer Internet Day - The role of Security within S...
      • `What are the banks not telling us about card frau...
      • DES Offers Free Encryption
      • Tufin introduces next generation firewall manageme...
      • Infosecurity Europe 2011 Hall of Fame nominations ...
      • Huddersfield NHS laptop loss highlights need to pr...
      • Innovative software solutions to reduce business e...
      • Talk of Intel developing IT security game-changer ...
      • SOURCEFIRE’S IMMUNET ANTI-MALWARE SOLUTION DELIVERS
      • Lieberman Software and Q1 Labs Partner to stop ins...
      • Data governance and leaks drives Varonis growth
      • ISACA report emphasizes governance's central role ...
      • WikiLeaks DDoS arrests welcomed by Infosecurity Eu...
      • KOBIL mIDentity secures e-Banking of the BBVA (Sui...
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ►  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile