Welcome!

Big Data Journal Authors: Pat Romanski, Elizabeth White, Adrian Bridgwater, Liz McMillan, Kevin Benedict

News Feed Item

HP Extends Persistent Data Protection From Data Center to Cloud With Encryption Innovations

New HP Atalla Solutions Help Safeguard Sensitive Data in Cloud, On-Premises and Mobile Environments Against Information Theft

LAS VEGAS, NV -- (Marketwired) -- 06/10/14 -- HP (NYSE: HPQ) today announced new encryption capabilities as well as information protection and control solutions that help safeguard data throughout its entire life cycle.

New HP Atalla solutions support data whether it's at rest, in motion or in use -- across cloud, on-premises and mobile environments -- to ensure continuous protection of an organization's most sensitive information.

Organizations face on average 122 successful attacks per week.(1) With this constant threat of attack, security teams are no longer driven by whether their organization will be breached, but rather by the assumption that it has already been breached -- leaving critical data exposed. To prevent sensitive information from being stolen in the aftermath of a network breach, organizations turn to encryption to proactively protect data as it travels on open networks or is stored in the cloud.

"As organizations embrace the New Style of IT, protecting sensitive information as it moves within and outside the enterprise becomes more critical than ever before," said Art Gilliland, senior vice president and general manager, Enterprise Security Products, HP. "Building on decades of leadership in information protection, we are now extending the scale and power of HP Atalla's encryption technology from the data center to the cloud -- safeguarding data regardless of where it resides."

Significance of encryption in data security
Building on HP's more than 35 years of innovation in encryption technology and market leadership in protecting trillions of dollars annually for nine out of 10 of the world's largest banks, new HP Atalla solutions deliver advanced protection for data stored on-premises and in the cloud, as well as unstructured data such as confidential emails, payment information and electronic health records. Designed for organizations that need to protect sensitive information, including financial institutions, retailers, energy companies, healthcare providers and governments, HP Atalla solutions provide added protection against the exposure of sensitive data while supporting optimal performance and flexibility.

"As the largest processor of Visa debit transactions globally, Visa Debit Processing Services is responsible for securing more than 23 billion debit transactions in the U.S. and prepaid transactions in the U.S. and Canada on an annual basis," said Chris James, senior vice president, Product Development, Issuer Processing, Visa Inc. "HP Atalla is a critical piece of our enterprise IT portfolio, delivering innovative security solutions with the operational excellence, performance and reliability that helps Visa DPS enable secure access to business-critical payment processing data."

Business-critical encryption key management for the datacenter
High-profile data breaches and stringent regulatory compliance requirements have triggered wide-spread adoption of data encryption. When data is encrypted correctly, it significantly reduces the risk of financial losses and damage to an organization's reputation. However, deploying several disparate or incompatible encryption tools can create hundreds of thousands of encryption keys, resulting in new security risks, poor performance and complex manageability.

HP Secure Encryption with HP Enterprise Secure Key Manager (ESKM) 4.0 unifies and automates encryption controls to prevent unauthorized access to sensitive data. HP ESKM 4.0 reduces the cost and complexity of managing encryption keys across a distributed infrastructure with consistent security controls, automated key services and a single point of management. Easily integrating with HP hardware solutions, including HP ProLiant Gen 8 Servers, it secures and manages encryption keys without slowing server performance. HP ESKM 4.0 also fully supports the OASIS Key Management Interoperability Protocol (KMIP), bringing open standards to encryption key management.

Removing encryption complexities for cloud workloads
As companies must embrace and adopt the new era of cloud computing, retaining control over sensitive data while realizing the benefits of the cloud are often competing concerns. To maintain control of sensitive data, organizations need the ability to encrypt and manage encryption keys even as the data is transferred to the cloud.

Deployed in minutes, HP Atalla Cloud Encryption reduces the complexity of encryption and key management in public, private and hybrid cloud environments with split-key encryption, a method for combining and splitting keys during the encryption process. In addition, customers can leverage integration with HP Enterprise Secure Key Manager to automatically manage and protect master keys on-premises in FIPS 140-2 Level 2 validated security appliances.

Persistent protection for unstructured data
With the consumerization of IT and the explosion of social media, it is estimated that 2.5 exabytes of new data is created every day(2) and the volume of new data is doubling every 12 to 18 months.(3) In fact, nearly 90 percent of the digital content being created includes unstructured data types, or human-generated information, such as documents, social content, video, audio and images.(3) As this mounting volume of unstructured data moves across and outside of enterprise networks, organizations must ensure persistent protection at every stage in its life cycle.

HP Atalla Information Protection and Control (IPC) software protects sensitive enterprise data at every stage of the data life cycle -- from creation to collaboration to storage. The software uses an information-centric encryption approach that applies persistent protection to follow the data throughout its life cycle, no matter where it resides. The encryption technology is easily incorporated into business processes without adding complexity or time consuming and costly integration.

HP Enterprise Security products and services are designed to disrupt the adversary at all stages of the threat life cycle, manage risk and extend customer security capabilities that comprehensively protect an enterprise. HP Atalla solutions are the first line of defense in data loss prevention, encrypting sensitive data as it is created and blocking an attacker from accessing the keys to unlock it.

Availability
HP Secure Encryption with centralized key management is available immediately worldwide by ordering the required HP ProLiant Gen 8 server HP Smart Storage options together with enterprise key management and client licenses from HP Atalla. Enterprises also can retrofit their compatible environments with the required HP Smart Array controllers to take advantage of this solution.

HP Atalla Cloud Encryption and HP Atalla Information Protection and Control (IPC) are available immediately worldwide.

New investment solutions are also available globally from HP Financial Services to help enterprises quickly embrace the power of HP Atalla and maintain cost control in their businesses through a simple and predictable financing option.(4)

Additional information about HP Atalla solutions is available at www.hp.com/go/atalla. Additional information about HP Enterprise Security Products is available at www.hpenterprisesecurity.com.

HP's annual enterprise security user conference, HP Protect, takes place September 8-11 in Washington, D.C.

About HP
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers' most complex challenges in every region of the world. More information about HP is available at http://www.hp.com.

(1) HP Ponemon Cost of Cyber Crime Study, September 2013.
(2) The Disruptive Power of Big Data, Vertica White Paper, November 2013.
(3) IDC Predictions 2012: Competing for 2020.
(4) Financing and service offerings available through Hewlett-Packard Financial Services Company and its subsidiaries and affiliates (collectively HPFSC) in certain countries and is subject to credit approval and execution of standard HPFSC documentation. Rates and terms are based on customer's credit rating, offering types, services and/or equipment type and options. Not all customers may qualify. Not all services or offers are available in all countries. Other restrictions may apply. HPFSC reserves the right to change or cancel this program at any time without notice.

© 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories from Big Data Journal
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With “smart” appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user’s habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps,...
Predicted by Gartner to add $1.9 trillion to the global economy by 2020, the Internet of Everything (IoE) is based on the idea that devices, systems and services will connect in simple, transparent ways, enabling seamless interactions among devices across brands and sectors. As this vision unfolds, it is clear that no single company can accomplish the level of interoperability required to support the horizontal aspects of the IoE. The AllSeen Alliance, announced in December 2013, was formed wi...
Goodness there is a lot of talk about cloud computing. This ‘talk and chatter’ is part of the problem, i.e., we look at it, we prod it and we might even test it out – but do we get down to practical implementation, deployment and (if you happen to be a fan of the term) actual cloud ‘rollout’ today? Cloud offers the promise of a new era they say – and a new style of IT at that. But this again is the problem and we know that cloud can only deliver on the promises it makes if it is part of a well...
There’s Big Data, then there’s really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at 6th Big Data Expo®, Hannah Smalltree, Director at Treasure Data, to discuss how IoT, B...
SYS-CON Events announced today that Connected Data, the creator of Transporter, the world’s first peer-to-peer private cloud storage device, will exhibit at SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Connected Data is the creator of Transporter, the world’s first peer-to-peer private cloud storage device. Connected Data is focused on providing elegantly designed solutions for consumers, professi...
Cisco on Wedesday announced its intent to acquire privately held Metacloud. Based in Pasadena, Calif., Metacloud deploys and operates private clouds for global organizations with a unique OpenStack-as-a-Service model that delivers and remotely operates production-ready private clouds in a customer's data center. Metacloud's OpenStack-based cloud platform will accelerate Cisco's strategy to build the world's largest global Intercloud, a network of clouds, together with key partners to address cu...
I write and study often on the subject of digital transformation - the digital transformation of industries, markets, products, business models, etc. In brief, digital transformation is about the impact that collected and analyzed data can have when used to enhance business processes and workflows. If Amazon knows your preferences for particular books and films based upon captured data, then they can apply analytics to predict related books and films that you may like. This improves sales. T...
Technology is enabling a new approach to collecting and using data. This approach, commonly referred to as the “Internet of Things” (IoT), enables businesses to use real-time data from all sorts of things including machines, devices and sensors to make better decisions, improve customer service, and lower the risk in the creation of new revenue opportunities. In his session at Internet of @ThingsExpo, Dave Wagstaff, Vice President and Chief Architect at BSQUARE Corporation, will discuss the real...
IoT is still a vague buzzword for many people. In his session at Internet of @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, will discuss the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. The presentation will also discuss how IoT is perceived by investors and how venture capitalist access this space. Other topics to discuss are barriers to success, what is n...
When one expects instantaneous response from video generated on the internet, lots of invisible problems have to be overcome. In his session at 6th Big Data Expo®, Tom Paquin, EVP and Chief Technology Officer at OnLive, to discuss how to overcome these problems. A Silicon Valley veteran, Tom Paquin provides vision, expertise and leadership to the technology research and development effort at OnLive as EVP and Chief Technology Officer. With more than 20 years of management experience at lead...