Welcome!

Containers Expo Blog Authors: Elizabeth White, XebiaLabs Blog, Roger Strukhoff, Liz McMillan, Derek Weeks

Blog Feed Post

Vaultive Announces Appointment of Leading Cloud Security Industry Experts to Advisory Board

New York, NY – December  12, 2012 — Vaultive, a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services, today announced the formation of its Advisory Board, which includes notable cloud computing industry luminaries Dave Cullinane, CEO of SecurityStarfish, Jim Reavis, co-founder and executive director of the Cloud Security Alliance, and Dr. Eran Tromer of Tel Aviv University’s School of Computer Science.

Vaultive’s enterprise-class cloud data encryption solutions enable encryption in use, encryption in transit and encryption at rest, while the organization’s IT department retains control of the encryption keys. Vaultive enables data to be searched, sorted, indexed, and otherwise processed in the cloud without ever being decrypted there.  Vaultive protects data from unauthorized access by integrating industry-standard AES-256 encryption into enterprise cloud applications, and lets customers enable and manage additional cloud application functionality using proprietary cryptographic extensions.  These capabilities effectively address the four principal business challenges that organizations face when migrating data to the cloud: data securityregulatory complianceunauthorized data disclosure and access, and international privacy/ data residency regulations.

Vaultive’s Advisory Board members are amongst the world’s thought leaders on cloud security.  They have been actively involved in educating the market on the need for greater cloud security as well as defining the standards by which it can be adopted.  Dave Cullinane is a globally recognized leader and visionary in the IT security industry.  Cullinane was formerly the chief information security officer (CISO) of eBay, where he was responsible for security programs to protect eBay and its many businesses. Under his leadership, eBay’s security team was named “Security Team of the Year” by SC Magazine in 2010.  Prior to joining eBay, Cullinane was the CISO for one of the largest banks in the United States. Cullinane is also a founding member and chairman of the board of the Cloud Security Alliance and president of the Information Sharing and Analysis Center.

Jim Reavis was recently named as one of the Top 10 cloud computing leaders by SearchCloudComputing.com.  As co-founder and executive director of the Cloud Security Alliance, Reavis leads the most important and influential organization working to define industry best practices for cloud security.  Reavis is also president of Reavis Consulting Group, LLC, where he advises security companies, large enterprises and other organizations on the implications of new trends and how to take advantage of them. He was previously an international board member of the ISSA and served as the association’s executive director. Reavis was also a co-founder of the Alliance for Enterprise Security Risk Management, a partnership between the ISSA, ISACA and ASIS, formed to address the enterprise risk issues associated with the convergence of logical and traditional security.

Dr. Eran Tromer is well known for his expertise in the areas of cryptography, information security, and the challenges raised by imperfect real-world computer systems. His research on side-channel attacks demonstrated information leakage in commercial cloud computing services, efficient cache-based attacks on AES encryption and acoustic attacks on RSA encryption. He actively pursues means of improving security at the levels of networks, algorithms, protocols, operating systems and hardware circuits. He is the co-author of many industry papers and presentations, including “Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds.” Dr. Tromer’s Ph.D. dissertation at the Weizmann Institute of Science (2007), advised by Prof. Adi Shamir, drastically reduced the projected cost of breaking RSA keys, leading to revision of government standards.  Dr. Tromer has served on numerous program committees and academic panels, as in industry consulting roles.  Prior to joining Tel Aviv University, Dr. Tromer pursued his research at the Massachusetts Institute of Technology and at Microsoft Research.

“When building our Advisory Board, we sought out recognized leaders and visionaries in the cloud data security and encryption industries that could provide strategic council to help Vaultive in the ongoing development of its groundbreaking solutions,” said Maayan Tal, co-founder and CTO of Vaultive. “We are thrilled to have Dave Cullinane, Jim Reavis and Eran Tromer join our Advisory Board. Their collective insights and expertise – developed from decades of industry experience – will be an invaluable asset to Vaultive as we continue to be an innovator in cloud data encryption technologies.”

As members of Vaultive’s Advisory Board, Cullinane, Reavis, and Tromer will join other notable industry luminaries in providing input, ideas and expert advice to the company as Vaultive continues to grow.

“I am excited to be a part of Vaultive’s Advisory Board, having experienced firsthand the challenges and concerns of moving proprietary enterprise data to the cloud,” said Cullinane. “What Vaultive is doing is truly unique in that its smart encryption solution allows organizations to retain complete ownership and exclusive control of data, while still reaping all of the benefits of the cloud.   Deploying it should be a best practice for anyone migrating to the cloud and Vaultive is enabling widespread adoption of cloud computing by organizations that would otherwise be challenged to do so.”

About Vaultive
Vaultive is a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services. Vaultive’s encryption secures data at rest, data in transit and data in use in a format that can be searched, sorted and indexed — while the organization’s IT department retains control of the encryption keys. This addresses the principal business challenges of migrating data to the cloud including data security, regulatory compliance, unauthorized data disclosure and access, and international privacy/ data residency regulations. Optimized for Microsoft® Office 365 Encryption, the Vaultive platform supports best practices for the control and ownership of corporate data in the cloud. Vaultive has raised more than $10 million from leading venture capital firms .406 Ventures, New Science Partners, Harmony Partners and Security Growth Partners.
For more information, visit www.vaultive.com or follow us on Twitter at https://twitter.com/vaultive.

For additional information, contact:
Jill Colna or Jordan Bouclin
SVM Public Relations
401-490-9700
[email protected]
[email protected]


Read the original blog entry...

More Stories By Cloud Best Practices Network

The Cloud Best Practices Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at http://CloudBestPractices.net

@ThingsExpo Stories
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for s...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2017 New York. The 20th Cloud Expo and 7th @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Internet to enable us all to im...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.