Welcome!

Agile Computing Authors: Pat Romanski, Yeshim Deniz, Liz McMillan, Elizabeth White, Andy Thurai

Blog Feed Post

Vaultive Announces Appointment of Leading Cloud Security Industry Experts to Advisory Board

New York, NY – December  12, 2012 — Vaultive, a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services, today announced the formation of its Advisory Board, which includes notable cloud computing industry luminaries Dave Cullinane, CEO of SecurityStarfish, Jim Reavis, co-founder and executive director of the Cloud Security Alliance, and Dr. Eran Tromer of Tel Aviv University’s School of Computer Science.

Vaultive’s enterprise-class cloud data encryption solutions enable encryption in use, encryption in transit and encryption at rest, while the organization’s IT department retains control of the encryption keys. Vaultive enables data to be searched, sorted, indexed, and otherwise processed in the cloud without ever being decrypted there.  Vaultive protects data from unauthorized access by integrating industry-standard AES-256 encryption into enterprise cloud applications, and lets customers enable and manage additional cloud application functionality using proprietary cryptographic extensions.  These capabilities effectively address the four principal business challenges that organizations face when migrating data to the cloud: data securityregulatory complianceunauthorized data disclosure and access, and international privacy/ data residency regulations.

Vaultive’s Advisory Board members are amongst the world’s thought leaders on cloud security.  They have been actively involved in educating the market on the need for greater cloud security as well as defining the standards by which it can be adopted.  Dave Cullinane is a globally recognized leader and visionary in the IT security industry.  Cullinane was formerly the chief information security officer (CISO) of eBay, where he was responsible for security programs to protect eBay and its many businesses. Under his leadership, eBay’s security team was named “Security Team of the Year” by SC Magazine in 2010.  Prior to joining eBay, Cullinane was the CISO for one of the largest banks in the United States. Cullinane is also a founding member and chairman of the board of the Cloud Security Alliance and president of the Information Sharing and Analysis Center.

Jim Reavis was recently named as one of the Top 10 cloud computing leaders by SearchCloudComputing.com.  As co-founder and executive director of the Cloud Security Alliance, Reavis leads the most important and influential organization working to define industry best practices for cloud security.  Reavis is also president of Reavis Consulting Group, LLC, where he advises security companies, large enterprises and other organizations on the implications of new trends and how to take advantage of them. He was previously an international board member of the ISSA and served as the association’s executive director. Reavis was also a co-founder of the Alliance for Enterprise Security Risk Management, a partnership between the ISSA, ISACA and ASIS, formed to address the enterprise risk issues associated with the convergence of logical and traditional security.

Dr. Eran Tromer is well known for his expertise in the areas of cryptography, information security, and the challenges raised by imperfect real-world computer systems. His research on side-channel attacks demonstrated information leakage in commercial cloud computing services, efficient cache-based attacks on AES encryption and acoustic attacks on RSA encryption. He actively pursues means of improving security at the levels of networks, algorithms, protocols, operating systems and hardware circuits. He is the co-author of many industry papers and presentations, including “Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds.” Dr. Tromer’s Ph.D. dissertation at the Weizmann Institute of Science (2007), advised by Prof. Adi Shamir, drastically reduced the projected cost of breaking RSA keys, leading to revision of government standards.  Dr. Tromer has served on numerous program committees and academic panels, as in industry consulting roles.  Prior to joining Tel Aviv University, Dr. Tromer pursued his research at the Massachusetts Institute of Technology and at Microsoft Research.

“When building our Advisory Board, we sought out recognized leaders and visionaries in the cloud data security and encryption industries that could provide strategic council to help Vaultive in the ongoing development of its groundbreaking solutions,” said Maayan Tal, co-founder and CTO of Vaultive. “We are thrilled to have Dave Cullinane, Jim Reavis and Eran Tromer join our Advisory Board. Their collective insights and expertise – developed from decades of industry experience – will be an invaluable asset to Vaultive as we continue to be an innovator in cloud data encryption technologies.”

As members of Vaultive’s Advisory Board, Cullinane, Reavis, and Tromer will join other notable industry luminaries in providing input, ideas and expert advice to the company as Vaultive continues to grow.

“I am excited to be a part of Vaultive’s Advisory Board, having experienced firsthand the challenges and concerns of moving proprietary enterprise data to the cloud,” said Cullinane. “What Vaultive is doing is truly unique in that its smart encryption solution allows organizations to retain complete ownership and exclusive control of data, while still reaping all of the benefits of the cloud.   Deploying it should be a best practice for anyone migrating to the cloud and Vaultive is enabling widespread adoption of cloud computing by organizations that would otherwise be challenged to do so.”

About Vaultive
Vaultive is a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services. Vaultive’s encryption secures data at rest, data in transit and data in use in a format that can be searched, sorted and indexed — while the organization’s IT department retains control of the encryption keys. This addresses the principal business challenges of migrating data to the cloud including data security, regulatory compliance, unauthorized data disclosure and access, and international privacy/ data residency regulations. Optimized for Microsoft® Office 365 Encryption, the Vaultive platform supports best practices for the control and ownership of corporate data in the cloud. Vaultive has raised more than $10 million from leading venture capital firms .406 Ventures, New Science Partners, Harmony Partners and Security Growth Partners.
For more information, visit www.vaultive.com or follow us on Twitter at https://twitter.com/vaultive.

For additional information, contact:
Jill Colna or Jordan Bouclin
SVM Public Relations
401-490-9700
[email protected] 
[email protected]


Read the original blog entry...

More Stories By Cloud Best Practices Network

The Cloud Best Practices Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at http://CloudBestPractices.net

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...