Protegrity Announces More Flexible, Efficient Data Security Platform
June 23, 2014 --
STAMFORD, CT -- (Marketwired) -- 06/23/14 -- Protegrity, the world leader in enterprise data encryption and tokenization solutions, today announced the release of version 6.5.2 of the Protegrity Data Security Platform. This new release addresses developing industry trends, emerging new platforms, and incorporates customer feedback, in the fastest, most efficient and lightweight distribution to date.
'We're really excited about 6.5.2, with some of the new capabilities we've added for IBM PureData and Netezza, Hadoop 2.0 and YARN, and to the core software,' said Yigal Rozenberg, VP Product Development. 'There are also a number of significant improvements in usability to save security administrators time and make their jobs a little easier.'
Recognizing increasingly strict regulations on the storage and use of sensitive data, in particular PCI DSS 3.0, Protegrity has implemented a number of new features to assist in meeting and exceeding the new standards, including:
Two Factor Authentication Support for Secure System Login File Integrity Monitoring to Track Changes to Any Sensitive File or Configuration Improved Automated KEK Rotation with Centrally Driven, Push-Button Activation Upgraded Reporting Engine and Refined Audit Log Generation for Enhanced Forensics
Protegrity has also expanded support for a number of new platforms, most notably becoming the first vendor to provide comprehensive data security for IBM Netezza. Platform support has also been expanded for the Protegrity File Protector and the Protegrity Big Data Protector, which is now compatible with all distributions of Hadoop 2.X and YARN.
Demonstrating continued leadership in Big Data security innovation, in this new release Protegrity has unveiled the industry's first Extended HDFS Encryption, which utilizes native Hadoop infrastructure to deliver highly transparent file and folder encryption within HDFS.
'Protegrity is certainly unique in the level of security they can achieve within Big Data platforms while preserving data usability,' said Scott Mellegaard, Big Data Practice Architect, Trace3. 'They're on the forefront of Big Data security, in no small part due to Protegrity Vaultless Tokenization, which opens up avenues to securely work with sensitive data, and expose analytical value with minimal risk.'
Incorporating customer feedback, continued improvements in the scalability, flexibility and performance of the core software of the Protegrity Data Security Platform include:
Policy deployment upgraded to increase efficiency in extremely large scale environments Support for RESTful API added to Protection servers for simpler, more flexible web services User interface enhancements reduce time and effort on configuration and manual tasks Upgraded notification system provides more detailed alerts and faster resolutions Expanded tokenization format support to enable better business intelligence and data usability
About Protegrity Headquartered in Stamford, CT, Protegrity provides high performance, infinitely scalable, end-to-end data security solutions that protect sensitive information across the enterprise from the point of acquisition to deletion. The company's award-winning software products span a variety of data protection methods, including end-to-end encryption, Vaultless Tokenization, masking, and monitoring and are backed by several important data protection technology patents. Currently, more than 200 enterprise customers worldwide rely on Protegrity's comprehensive data security solutions to enable compliance for PCI DSS, HIPAA and other data protection mandates while protecting their sensitive data, brand, and business reputation. For more information, please visit www.protegrity.com.
Connect with Protegrity:Read the blog: http://ift.tt/1jcvjyU Follow us on Twitter: http://ift.tt/1sBspx3 Follow us on LinkedIn: http://ift.tt/1sBsn8m
Copyright @ Marketwire
Related Keywords:Security, Internet, Business Issues, Authentication, Authentication, Security, IT Management, Law & Regulations, Marketwire, IT (Information Technology), Security, Internet Technology, Business, Other,
Comments
Post a Comment