Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

HighCloud Security Launches Version 2.0 of Cloud Encryption Software

Cloud Encryption and Key Management Solution Encrypts Data Across Private, Hybrid and Public Cloud Environments

HighCloud Security, a provider of cloud encryption and key management software, today released version 2.0 of its cloud encryption and key management software for virtual machines (VMs).

Cloud Encryption and Key Management Solution Encrypts Data Across Private, Hybrid and Public Cloud Environments

HighCloud Security, a provider of cloud encryption and key management software, today released version 2.0 of its cloud encryption and key management software for virtual machines (VMs).

Version 2.0 brings a cloud encryption solution that enables enterprises and cloud service providers to protect data in private, hybrid and public cloud environments by securing selected virtual disks and other files within the VM using NIST-approved AES 128 and 256-bit encryption.

As the foundation of cloud infrastructures, virtualization introduces new security and compliance challenges, the company explained. The nature of virtualization results in data being co-mingled in hardware, they added, something that gives cloud administrators much broader access, and backups and snapshots can leave sensitive data vulnerable.

HighCloud Security 2.0 Diagram

For organizations that want to encrypt applications and data in public cloud environments, they can install the Data Security Module into the OS of their virtual machine or server, which will secure data regardless of where the VM resides, according to product documentation.

“With HighCloud Security, enterprises and cloud service providers can significantly reduce attack vectors mitigating data privacy risks, ensuring compliance with data privacy mandates like HIPAA/HITECH and PCI DSS, and enabling a secure move to the cloud,” the company said in a statement.

“It is HighCloud Security’s vision to de-mystify encryption, making it drop-dead easy to deploy and manage across all cloud infrastructures,” said Bill Hackenberger, CEO of Mountain View, California-based HighCloud Security.

HighCloud Security 2.0 is available immediately, and can be deployed through both freemium and free trial programs.

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.