Welcome!

IBM Cloud Authors: Yeshim Deniz, Elizabeth White, Pat Romanski, Liz McMillan, Stefan Bernbo

News Feed Item

Vormetric Vault Prevents Downtime and Revenue Loss Associated with Expired Digital Certificates and Lost or Stolen Encryption Keys

Vormetric, Inc., the leader in enterprise data security, today announced Vormetric Vault, an all-in-one scalable solution for protecting and managing digital certificates, encryption keys and other security objects such as password files. By securing these assets and automating reporting and tracking processes, Vormetric Vault prevents the downtime and revenue loss that can occur when keys are lost or stolen, or when certificates expire or become misplaced. Vormetric Vault supports a wide range of security objects, including certificates, symmetric keys, asymmetric keys and files.

Click to Tweet: @Vormetric Vault automates #encryption certificate/key management and protection http://bit.ly/KgtDYZ

Vaulting, Reporting and Alerting

Vormetric Vault is the newest addition to the Vormetric Data Security platform, which includes Vormetric Encryption and Vormetric Key Management. Vormetric products enable enterprises to secure sensitive data at rest and protect security materials, including certificates, as well as control access to this information and report on who is accessing it. Vormetric Data Security supports all major platforms – LinuxTM, Unix®, Windows® – and can be used in physical, virtual and cloud environments.

For secure storage of certificates, keys and other security objects, Vormetric Vault is FIPS 140-2 certified and is integrated with the Vormetric Data Security Manager (DSM). Vormetric’s DSM provides centralized key and policy management and can be clustered for high availability. Administration and reporting are performed via a Web GUI, while a software tool provides bulk key import, ingest, renewal and removal.

Vormetric Vault provides the following capabilities:

Vaulting: securely stores certificates, keys, and other sensitive materials such as password files, credit card numbers, etc.

Reporting: centralizes tracking and reporting on vaulted objects to eliminate the need for manual spreadsheet-based management processes. This also facilitates responding to certificate authority breach inquiries.

Alerting: automatically notifies IT staff when vaulted objects are about to expire and require renewal, to prevent application downtime from expiring certificates.

“Even the strongest form of encryption cannot protect data if the keys are stolen, and expired certificates can make data inaccessible, leading to frustration and costly downtime,” said Ashvin Kamaraju, vice president of product development for Vormetric. “Vormetric Vault mitigates the risk of stolen encryption keys or expired certificates in one automated, easy-to-use solution that takes the guess work out of managing and securing large numbers of these objects.”

Availability

Vormetric Vault is available immediately from Vormetric and its business partners worldwide.

About Vormetric

Vormetric (@Vormetric) is the leader in enterprise encryption for physical, virtual and cloud environments. The Vormetric Data Security product line provides a single, manageable and scalable solution to manage any key and encrypt any file, any database, any application, anywhere it resides— without sacrificing application performance and avoiding key management complexity. Some of the largest and most security-conscious organizations and government agencies in the world, including 17 of the Fortune 25, have standardized on Vormetric to provide strong, easily manageable data security. Vormetric technology has previously been selected by IBM as the database encryption solution for DB2 and Informix on Linux, Unix and Windows; and by Symantec to provide the Symantec Veritas NetBackupTM Media Server Encryption Option. For more information, visit www.vormetric.com.

Vormetric is a trademark of Vormetric, Inc. All other names mentioned are trademarks, registered trademarks or service marks of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determ...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...