Welcome!

Microservices Expo Authors: Liz McMillan, Pat Romanski, Elizabeth White, Mehdi Daoudi, Yeshim Deniz

News Feed Item

Protegrity Extends HP NonStop Server Support to Include Data Security Tokenization

Data Security Vendor Will Make Next Generation Tokenization Available to Enterprises Using HP High Availability Servers

STAMFORD, CT -- (Marketwire) -- 01/24/12 -- Protegrity USA, Inc., a leading provider of end-to-end data security solutions, announces further support for HP's family of Integrity NonStop Servers, the mainstay of large-scale enterprises used across virtually every business sector. By combining Protegrity's patented tokenization technology with HP's highly available and scalable NonStop technology, enterprises will have ready access to this advanced, cost-effective protection for highly-sensitive data.

"Security breaches, along with the lawsuits and brand damage that accompany them, must be avoided at all costs. PCI compliance is a good start, but organizations are recognizing they must protect the widening range of personal, financial, and health data they have using methods that go far beyond basic passwords and access controls," said Suni Munshani, CEO of Protegrity. "By providing tokenization for this HP platform, we are helping to ensure enterprises won't be faced with the same humiliating situations encountered by Sony, Epsilon, Stratfor and Zappos."

HP Integrity NonStop systems provide 24/7/365 application availability for critical and complex enterprise applications. These systems are used by financial institutions, mobile operators, global manufacturing companies, hospitals and other private and public sector organizations grappling with increasing regulations such as PCI-DSS, along with emerging regulations targeted at personally identifiable information (PII) and personal health information (PHI).

Protegrity's patent-pending tokenization technology enables organizations to store high-risk data by replacing sensitive information with tokens that hold no value to anyone gaining unauthorized access to that data. The data replacement process uses random values, rendering it far more secure than predictable encryption keys and algorithms, which may be vulnerable to brute force attacks. Because tokens resemble the original data, there is no maintenance or conversion costs when securing data within applications or corporate databases. Protegrity's unique architecture is specifically designed to support high-performance, high availability environments, delivering the industry's fastest token creation (200,000 or more tokens per second) along with fast recovery of the original data when needed.

Protegrity Tokenization for HP NonStop will be available at the end of Q1 2012. For information, please call (203) 326-7200 or visit www.protegrity.com.

About Protegrity

Headquartered in Stamford, Conn., Protegrity provides high performance, infinitely scalable, end-to-end data security solutions that protect sensitive information across the enterprise from the point of acquisition to deletion. The company's award-winning software products span a variety of data protection methods, including end-to-end encryption, tokenization, masking, and monitoring and are backed by several important data protection technology patents. Currently, more than 200 enterprise customers worldwide rely on Protegrity's comprehensive data security solutions to enable compliance for PCI-DSS, HIPAA and other data protection mandates while protecting sensitive data, brand, and business reputation. For more information, please visit http://www.protegrity.com.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Media Contact:
Jennefer Traeger
Kickstart Consulting for Protegrity
(720) 988-6149
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Microservices Articles
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In their Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, and Mark Lav...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
If your cloud deployment is on AWS with predictable workloads, Reserved Instances (RIs) can provide your business substantial savings compared to pay-as-you-go, on-demand services alone. Continuous monitoring of cloud usage and active management of Elastic Compute Cloud (EC2), Relational Database Service (RDS) and ElastiCache through RIs will optimize performance. Learn how you can purchase and apply the right Reserved Instances for optimum utilization and increased ROI.
TCP (Transmission Control Protocol) is a common and reliable transmission protocol on the Internet. TCP was introduced in the 70s by Stanford University for US Defense to establish connectivity between distributed systems to maintain a backup of defense information. At the time, TCP was introduced to communicate amongst a selected set of devices for a smaller dataset over shorter distances. As the Internet evolved, however, the number of applications and users, and the types of data accessed and...
Consumer-driven contracts are an essential part of a mature microservice testing portfolio enabling independent service deployments. In this presentation we'll provide an overview of the tools, patterns and pain points we've seen when implementing contract testing in large development organizations.
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...