|By Marketwired .||
|June 10, 2014 12:30 PM EDT||
LAS VEGAS, NV -- (Marketwired) -- 06/10/14 -- HP (NYSE: HPQ) today announced new encryption capabilities as well as information protection and control solutions that help safeguard data throughout its entire life cycle.
New HP Atalla solutions support data whether it's at rest, in motion or in use -- across cloud, on-premises and mobile environments -- to ensure continuous protection of an organization's most sensitive information.
Organizations face on average 122 successful attacks per week.(1) With this constant threat of attack, security teams are no longer driven by whether their organization will be breached, but rather by the assumption that it has already been breached -- leaving critical data exposed. To prevent sensitive information from being stolen in the aftermath of a network breach, organizations turn to encryption to proactively protect data as it travels on open networks or is stored in the cloud.
"As organizations embrace the New Style of IT, protecting sensitive information as it moves within and outside the enterprise becomes more critical than ever before," said Art Gilliland, senior vice president and general manager, Enterprise Security Products, HP. "Building on decades of leadership in information protection, we are now extending the scale and power of HP Atalla's encryption technology from the data center to the cloud -- safeguarding data regardless of where it resides."
Significance of encryption in data security
Building on HP's more than 35 years of innovation in encryption technology and market leadership in protecting trillions of dollars annually for nine out of 10 of the world's largest banks, new HP Atalla solutions deliver advanced protection for data stored on-premises and in the cloud, as well as unstructured data such as confidential emails, payment information and electronic health records. Designed for organizations that need to protect sensitive information, including financial institutions, retailers, energy companies, healthcare providers and governments, HP Atalla solutions provide added protection against the exposure of sensitive data while supporting optimal performance and flexibility.
"As the largest processor of Visa debit transactions globally, Visa Debit Processing Services is responsible for securing more than 23 billion debit transactions in the U.S. and prepaid transactions in the U.S. and Canada on an annual basis," said Chris James, senior vice president, Product Development, Issuer Processing, Visa Inc. "HP Atalla is a critical piece of our enterprise IT portfolio, delivering innovative security solutions with the operational excellence, performance and reliability that helps Visa DPS enable secure access to business-critical payment processing data."
Business-critical encryption key management for the datacenter
High-profile data breaches and stringent regulatory compliance requirements have triggered wide-spread adoption of data encryption. When data is encrypted correctly, it significantly reduces the risk of financial losses and damage to an organization's reputation. However, deploying several disparate or incompatible encryption tools can create hundreds of thousands of encryption keys, resulting in new security risks, poor performance and complex manageability.
HP Secure Encryption with HP Enterprise Secure Key Manager (ESKM) 4.0 unifies and automates encryption controls to prevent unauthorized access to sensitive data. HP ESKM 4.0 reduces the cost and complexity of managing encryption keys across a distributed infrastructure with consistent security controls, automated key services and a single point of management. Easily integrating with HP hardware solutions, including HP ProLiant Gen 8 Servers, it secures and manages encryption keys without slowing server performance. HP ESKM 4.0 also fully supports the OASIS Key Management Interoperability Protocol (KMIP), bringing open standards to encryption key management.
Removing encryption complexities for cloud workloads
As companies must embrace and adopt the new era of cloud computing, retaining control over sensitive data while realizing the benefits of the cloud are often competing concerns. To maintain control of sensitive data, organizations need the ability to encrypt and manage encryption keys even as the data is transferred to the cloud.
Deployed in minutes, HP Atalla Cloud Encryption reduces the complexity of encryption and key management in public, private and hybrid cloud environments with split-key encryption, a method for combining and splitting keys during the encryption process. In addition, customers can leverage integration with HP Enterprise Secure Key Manager to automatically manage and protect master keys on-premises in FIPS 140-2 Level 2 validated security appliances.
Persistent protection for unstructured data
With the consumerization of IT and the explosion of social media, it is estimated that 2.5 exabytes of new data is created every day(2) and the volume of new data is doubling every 12 to 18 months.(3) In fact, nearly 90 percent of the digital content being created includes unstructured data types, or human-generated information, such as documents, social content, video, audio and images.(3) As this mounting volume of unstructured data moves across and outside of enterprise networks, organizations must ensure persistent protection at every stage in its life cycle.
HP Atalla Information Protection and Control (IPC) software protects sensitive enterprise data at every stage of the data life cycle -- from creation to collaboration to storage. The software uses an information-centric encryption approach that applies persistent protection to follow the data throughout its life cycle, no matter where it resides. The encryption technology is easily incorporated into business processes without adding complexity or time consuming and costly integration.
HP Enterprise Security products and services are designed to disrupt the adversary at all stages of the threat life cycle, manage risk and extend customer security capabilities that comprehensively protect an enterprise. HP Atalla solutions are the first line of defense in data loss prevention, encrypting sensitive data as it is created and blocking an attacker from accessing the keys to unlock it.
HP Secure Encryption with centralized key management is available immediately worldwide by ordering the required HP ProLiant Gen 8 server HP Smart Storage options together with enterprise key management and client licenses from HP Atalla. Enterprises also can retrofit their compatible environments with the required HP Smart Array controllers to take advantage of this solution.
HP Atalla Cloud Encryption and HP Atalla Information Protection and Control (IPC) are available immediately worldwide.
New investment solutions are also available globally from HP Financial Services to help enterprises quickly embrace the power of HP Atalla and maintain cost control in their businesses through a simple and predictable financing option.(4)
HP's annual enterprise security user conference, HP Protect, takes place September 8-11 in Washington, D.C.
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers' most complex challenges in every region of the world. More information about HP is available at http://www.hp.com.
(1) HP Ponemon Cost of Cyber Crime Study, September 2013.
(2) The Disruptive Power of Big Data, Vertica White Paper, November 2013.
(3) IDC Predictions 2012: Competing for 2020.
(4) Financing and service offerings available through Hewlett-Packard Financial Services Company and its subsidiaries and affiliates (collectively HPFSC) in certain countries and is subject to credit approval and execution of standard HPFSC documentation. Rates and terms are based on customer's credit rating, offering types, services and/or equipment type and options. Not all customers may qualify. Not all services or offers are available in all countries. Other restrictions may apply. HPFSC reserves the right to change or cancel this program at any time without notice.
© 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
In most cases, it is convenient to have some human interaction with a web (micro-)service, no matter how small it is. A traditional approach would be to create an HTTP interface, where user requests will be dispatched and HTML/CSS pages must be served. This approach is indeed very traditional for a web site, but not really convenient for a web service, which is not intended to be good looking, 24x7 up and running and UX-optimized. Instead, talking to a web service in a chat-bot mode would be muc...
Feb. 13, 2016 11:45 AM EST Reads: 310
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee...
Feb. 13, 2016 11:45 AM EST
SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
Feb. 13, 2016 11:45 AM EST Reads: 267
Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ...
Feb. 13, 2016 11:30 AM EST Reads: 153
SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc...
Feb. 13, 2016 11:00 AM EST Reads: 144
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
Feb. 13, 2016 11:00 AM EST
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
Feb. 13, 2016 11:00 AM EST
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, will give users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion w...
Feb. 13, 2016 10:30 AM EST
Join us at Cloud Expo | @ThingsExpo 2016 – June 7-9 at the Javits Center in New York City and November 1-3 at the Santa Clara Convention Center in Santa Clara, CA – and deliver your unique message in a way that is striking and unforgettable by taking advantage of SYS-CON's unmatched high-impact, result-driven event / media packages.
Feb. 13, 2016 10:00 AM EST
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
Feb. 13, 2016 09:45 AM EST Reads: 229
Recognizing the need to identify and validate information security professionals’ competency in securing cloud services, the two leading membership organizations focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)^2, joined together to develop an international cloud security credential that reflects the most current and comprehensive best practices for securing and optimizing cloud computing environments.
Feb. 13, 2016 08:00 AM EST
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, will discuss using predictive analytics to ...
Feb. 13, 2016 06:45 AM EST Reads: 422
Silver Spring Networks, Inc. (NYSE: SSNI) extended its Internet of Things technology platform with performance enhancements to Gen5 – its fifth generation critical infrastructure networking platform. Already delivering nearly 23 million devices on five continents as one of the leading networking providers in the market, Silver Spring announced it is doubling the maximum speed of its Gen5 network to up to 2.4 Mbps, increasing computational performance by 10x, supporting simultaneous mesh communic...
Feb. 13, 2016 05:00 AM EST
Eighty percent of a data scientist’s time is spent gathering and cleaning up data, and 80% of all data is unstructured and almost never analyzed. Cognitive computing, in combination with Big Data, is changing the equation by creating data reservoirs and using natural language processing to enable analysis of unstructured data sources. This is impacting every aspect of the analytics profession from how data is mined (and by whom) to how it is delivered. This is not some futuristic vision: it's ha...
Feb. 13, 2016 04:45 AM EST Reads: 472
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, will provide an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profes...
Feb. 13, 2016 03:45 AM EST Reads: 250
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, will discuss how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved effi...
Feb. 13, 2016 12:45 AM EST Reads: 286
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection.
Feb. 12, 2016 10:00 PM EST Reads: 251
Data-as-a-Service is the complete package for the transformation of raw data into meaningful data assets and the delivery of those data assets. In her session at 18th Cloud Expo, Lakshmi Randall, an industry expert, analyst and strategist, will address: What is DaaS (Data-as-a-Service)? Challenges addressed by DaaS Vendors that are enabling DaaS Architecture options for DaaS
Feb. 12, 2016 09:45 PM EST Reads: 392
SYS-CON Events announced today that Catchpoint Systems, Inc., a provider of innovative web and infrastructure monitoring solutions, has been named “Silver Sponsor” of SYS-CON's DevOps Summit at 18th Cloud Expo New York, which will take place June 7-9, 2016, at the Javits Center in New York City, NY. Catchpoint is a leading Digital Performance Analytics company that provides unparalleled insight into customer-critical services to help consistently deliver an amazing customer experience. Designed...
Feb. 12, 2016 06:00 PM EST Reads: 410
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Feb. 12, 2016 04:30 PM EST Reads: 202