|By Cloud Best Practices Network||
|December 12, 2012 11:40 AM EST||
New York, NY – December 12, 2012 — Vaultive, a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services, today announced the formation of its Advisory Board, which includes notable cloud computing industry luminaries Dave Cullinane, CEO of SecurityStarfish, Jim Reavis, co-founder and executive director of the Cloud Security Alliance, and Dr. Eran Tromer of Tel Aviv University’s School of Computer Science.
Vaultive’s enterprise-class cloud data encryption solutions enable encryption in use, encryption in transit and encryption at rest, while the organization’s IT department retains control of the encryption keys. Vaultive enables data to be searched, sorted, indexed, and otherwise processed in the cloud without ever being decrypted there. Vaultive protects data from unauthorized access by integrating industry-standard AES-256 encryption into enterprise cloud applications, and lets customers enable and manage additional cloud application functionality using proprietary cryptographic extensions. These capabilities effectively address the four principal business challenges that organizations face when migrating data to the cloud: data security, regulatory compliance, unauthorized data disclosure and access, and international privacy/ data residency regulations.
Vaultive’s Advisory Board members are amongst the world’s thought leaders on cloud security. They have been actively involved in educating the market on the need for greater cloud security as well as defining the standards by which it can be adopted. Dave Cullinane is a globally recognized leader and visionary in the IT security industry. Cullinane was formerly the chief information security officer (CISO) of eBay, where he was responsible for security programs to protect eBay and its many businesses. Under his leadership, eBay’s security team was named “Security Team of the Year” by SC Magazine in 2010. Prior to joining eBay, Cullinane was the CISO for one of the largest banks in the United States. Cullinane is also a founding member and chairman of the board of the Cloud Security Alliance and president of the Information Sharing and Analysis Center.
Jim Reavis was recently named as one of the Top 10 cloud computing leaders by SearchCloudComputing.com. As co-founder and executive director of the Cloud Security Alliance, Reavis leads the most important and influential organization working to define industry best practices for cloud security. Reavis is also president of Reavis Consulting Group, LLC, where he advises security companies, large enterprises and other organizations on the implications of new trends and how to take advantage of them. He was previously an international board member of the ISSA and served as the association’s executive director. Reavis was also a co-founder of the Alliance for Enterprise Security Risk Management, a partnership between the ISSA, ISACA and ASIS, formed to address the enterprise risk issues associated with the convergence of logical and traditional security.
Dr. Eran Tromer is well known for his expertise in the areas of cryptography, information security, and the challenges raised by imperfect real-world computer systems. His research on side-channel attacks demonstrated information leakage in commercial cloud computing services, efficient cache-based attacks on AES encryption and acoustic attacks on RSA encryption. He actively pursues means of improving security at the levels of networks, algorithms, protocols, operating systems and hardware circuits. He is the co-author of many industry papers and presentations, including “Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds.” Dr. Tromer’s Ph.D. dissertation at the Weizmann Institute of Science (2007), advised by Prof. Adi Shamir, drastically reduced the projected cost of breaking RSA keys, leading to revision of government standards. Dr. Tromer has served on numerous program committees and academic panels, as in industry consulting roles. Prior to joining Tel Aviv University, Dr. Tromer pursued his research at the Massachusetts Institute of Technology and at Microsoft Research.
“When building our Advisory Board, we sought out recognized leaders and visionaries in the cloud data security and encryption industries that could provide strategic council to help Vaultive in the ongoing development of its groundbreaking solutions,” said Maayan Tal, co-founder and CTO of Vaultive. “We are thrilled to have Dave Cullinane, Jim Reavis and Eran Tromer join our Advisory Board. Their collective insights and expertise – developed from decades of industry experience – will be an invaluable asset to Vaultive as we continue to be an innovator in cloud data encryption technologies.”
As members of Vaultive’s Advisory Board, Cullinane, Reavis, and Tromer will join other notable industry luminaries in providing input, ideas and expert advice to the company as Vaultive continues to grow.
“I am excited to be a part of Vaultive’s Advisory Board, having experienced firsthand the challenges and concerns of moving proprietary enterprise data to the cloud,” said Cullinane. “What Vaultive is doing is truly unique in that its smart encryption solution allows organizations to retain complete ownership and exclusive control of data, while still reaping all of the benefits of the cloud. Deploying it should be a best practice for anyone migrating to the cloud and Vaultive is enabling widespread adoption of cloud computing by organizations that would otherwise be challenged to do so.”
Vaultive is a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services. Vaultive’s encryption secures data at rest, data in transit and data in use in a format that can be searched, sorted and indexed — while the organization’s IT department retains control of the encryption keys. This addresses the principal business challenges of migrating data to the cloud including data security, regulatory compliance, unauthorized data disclosure and access, and international privacy/ data residency regulations. Optimized for Microsoft® Office 365 Encryption, the Vaultive platform supports best practices for the control and ownership of corporate data in the cloud. Vaultive has raised more than $10 million from leading venture capital firms .406 Ventures, New Science Partners, Harmony Partners and Security Growth Partners.
For more information, visit www.vaultive.com or follow us on Twitter at https://twitter.com/vaultive.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Oct. 1, 2016 01:30 PM EDT Reads: 861
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Oct. 1, 2016 01:00 PM EDT Reads: 5,188
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Oct. 1, 2016 12:30 PM EDT Reads: 636
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
Oct. 1, 2016 12:30 PM EDT Reads: 630
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Oct. 1, 2016 12:30 PM EDT Reads: 3,105
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
Oct. 1, 2016 12:30 PM EDT Reads: 5,538
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Oct. 1, 2016 12:30 PM EDT Reads: 3,270
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Oct. 1, 2016 12:30 PM EDT Reads: 2,338
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Oct. 1, 2016 11:45 AM EDT Reads: 2,813
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
Oct. 1, 2016 11:45 AM EDT Reads: 312
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Oct. 1, 2016 11:30 AM EDT Reads: 1,335
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Oct. 1, 2016 11:15 AM EDT Reads: 888
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Oct. 1, 2016 10:45 AM EDT Reads: 638
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
Oct. 1, 2016 10:30 AM EDT Reads: 729
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Oct. 1, 2016 10:30 AM EDT Reads: 1,734
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Oct. 1, 2016 10:00 AM EDT Reads: 533
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
Oct. 1, 2016 10:00 AM EDT Reads: 3,217
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Oct. 1, 2016 10:00 AM EDT Reads: 3,333
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Oct. 1, 2016 09:15 AM EDT Reads: 1,690
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Oct. 1, 2016 08:30 AM EDT Reads: 3,449