Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Porticor’s Encryption Offering Protects Cloud Data While Stored And In Use

On Tuesday, Israeli data protection firm Porticor released the latest version of its Virtual Private Data (VPD) system. The VPD system is designed to protect data in cloud environments that were previously considered untrusted, and does so while the data is at rest or in use.

On Tuesday, Israeli data protection firm Porticor released the latest version of its Virtual Private Data (VPD) system. The VPD system is designed to protect data in cloud environments that were previously considered untrusted, and does so while the data is at rest or in use.

Porticor LogoPorticor’s VPD was created to protect data no matter its state, in public, private, or hybrid cloud environments – or a mix of the three. The newest version of the VPD system, the company says, solves the issue of trust by protecting encryption keys as they are in use.

The Virtual Key Management system that has been included with the VPD system uses homomorphic key encryption technology.

Homomorphic encryption is a technique that enables mathematical operations to be performed on encrypted data. It enables the VPD system to give the application access to the data store without exposing the master keys in an unencrypted state. This also ensures that if a master key is stolen, it can still never be used to access a data store.

Traditional cloud security solutions put customers’ encryption keys in the possession of the security vendor or cloud provider, and fail to fully protect cloud data and its encryption keys while stored and in use, the company explained in a statement.

“Potential cloud users worry about two things about information protection in the cloud — protecting it from other tenants and protecting it from the cloud provider,” said Neil MacDonald, VP and Gartner Fellow.

“Encryption is one protection option; however, when the encryption keys are used, data is at risk at that point,” MacDonald added. “A solution that works completely in the cloud, yet is able to keep the keys protected in memory would help reduce the scope of a possible breach entry point.”

Porticor VPD is available immediately, with pricing starting at $65 a month per virtual appliance.

More information is available online.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.