|By Cloud Best Practices Network||
|December 12, 2012 11:40 AM EST||
New York, NY – December 12, 2012 — Vaultive, a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services, today announced the formation of its Advisory Board, which includes notable cloud computing industry luminaries Dave Cullinane, CEO of SecurityStarfish, Jim Reavis, co-founder and executive director of the Cloud Security Alliance, and Dr. Eran Tromer of Tel Aviv University’s School of Computer Science.
Vaultive’s enterprise-class cloud data encryption solutions enable encryption in use, encryption in transit and encryption at rest, while the organization’s IT department retains control of the encryption keys. Vaultive enables data to be searched, sorted, indexed, and otherwise processed in the cloud without ever being decrypted there. Vaultive protects data from unauthorized access by integrating industry-standard AES-256 encryption into enterprise cloud applications, and lets customers enable and manage additional cloud application functionality using proprietary cryptographic extensions. These capabilities effectively address the four principal business challenges that organizations face when migrating data to the cloud: data security, regulatory compliance, unauthorized data disclosure and access, and international privacy/ data residency regulations.
Vaultive’s Advisory Board members are amongst the world’s thought leaders on cloud security. They have been actively involved in educating the market on the need for greater cloud security as well as defining the standards by which it can be adopted. Dave Cullinane is a globally recognized leader and visionary in the IT security industry. Cullinane was formerly the chief information security officer (CISO) of eBay, where he was responsible for security programs to protect eBay and its many businesses. Under his leadership, eBay’s security team was named “Security Team of the Year” by SC Magazine in 2010. Prior to joining eBay, Cullinane was the CISO for one of the largest banks in the United States. Cullinane is also a founding member and chairman of the board of the Cloud Security Alliance and president of the Information Sharing and Analysis Center.
Jim Reavis was recently named as one of the Top 10 cloud computing leaders by SearchCloudComputing.com. As co-founder and executive director of the Cloud Security Alliance, Reavis leads the most important and influential organization working to define industry best practices for cloud security. Reavis is also president of Reavis Consulting Group, LLC, where he advises security companies, large enterprises and other organizations on the implications of new trends and how to take advantage of them. He was previously an international board member of the ISSA and served as the association’s executive director. Reavis was also a co-founder of the Alliance for Enterprise Security Risk Management, a partnership between the ISSA, ISACA and ASIS, formed to address the enterprise risk issues associated with the convergence of logical and traditional security.
Dr. Eran Tromer is well known for his expertise in the areas of cryptography, information security, and the challenges raised by imperfect real-world computer systems. His research on side-channel attacks demonstrated information leakage in commercial cloud computing services, efficient cache-based attacks on AES encryption and acoustic attacks on RSA encryption. He actively pursues means of improving security at the levels of networks, algorithms, protocols, operating systems and hardware circuits. He is the co-author of many industry papers and presentations, including “Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds.” Dr. Tromer’s Ph.D. dissertation at the Weizmann Institute of Science (2007), advised by Prof. Adi Shamir, drastically reduced the projected cost of breaking RSA keys, leading to revision of government standards. Dr. Tromer has served on numerous program committees and academic panels, as in industry consulting roles. Prior to joining Tel Aviv University, Dr. Tromer pursued his research at the Massachusetts Institute of Technology and at Microsoft Research.
“When building our Advisory Board, we sought out recognized leaders and visionaries in the cloud data security and encryption industries that could provide strategic council to help Vaultive in the ongoing development of its groundbreaking solutions,” said Maayan Tal, co-founder and CTO of Vaultive. “We are thrilled to have Dave Cullinane, Jim Reavis and Eran Tromer join our Advisory Board. Their collective insights and expertise – developed from decades of industry experience – will be an invaluable asset to Vaultive as we continue to be an innovator in cloud data encryption technologies.”
As members of Vaultive’s Advisory Board, Cullinane, Reavis, and Tromer will join other notable industry luminaries in providing input, ideas and expert advice to the company as Vaultive continues to grow.
“I am excited to be a part of Vaultive’s Advisory Board, having experienced firsthand the challenges and concerns of moving proprietary enterprise data to the cloud,” said Cullinane. “What Vaultive is doing is truly unique in that its smart encryption solution allows organizations to retain complete ownership and exclusive control of data, while still reaping all of the benefits of the cloud. Deploying it should be a best practice for anyone migrating to the cloud and Vaultive is enabling widespread adoption of cloud computing by organizations that would otherwise be challenged to do so.”
Vaultive is a provider of cloud data encryption solutions designed to maintain the control, security and compliance of data processed by cloud-based services. Vaultive’s encryption secures data at rest, data in transit and data in use in a format that can be searched, sorted and indexed — while the organization’s IT department retains control of the encryption keys. This addresses the principal business challenges of migrating data to the cloud including data security, regulatory compliance, unauthorized data disclosure and access, and international privacy/ data residency regulations. Optimized for Microsoft® Office 365 Encryption, the Vaultive platform supports best practices for the control and ownership of corporate data in the cloud. Vaultive has raised more than $10 million from leading venture capital firms .406 Ventures, New Science Partners, Harmony Partners and Security Growth Partners.
For more information, visit www.vaultive.com or follow us on Twitter at https://twitter.com/vaultive.
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
Jan. 20, 2017 10:45 AM EST Reads: 3,687
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
Jan. 20, 2017 10:45 AM EST Reads: 6,068
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Jan. 20, 2017 09:45 AM EST Reads: 2,911
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, introduced the technologies required for implementing these idea...
Jan. 20, 2017 08:30 AM EST Reads: 4,738
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
Jan. 20, 2017 08:15 AM EST Reads: 4,920
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jan. 20, 2017 08:15 AM EST Reads: 4,704
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Jan. 20, 2017 07:15 AM EST Reads: 2,970
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
Jan. 20, 2017 07:00 AM EST Reads: 9,072
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Jan. 20, 2017 07:00 AM EST Reads: 6,860
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Jan. 20, 2017 03:00 AM EST Reads: 895
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
Jan. 20, 2017 02:30 AM EST Reads: 5,032
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Jan. 20, 2017 02:00 AM EST Reads: 6,577
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...
Jan. 20, 2017 01:45 AM EST Reads: 4,269
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Jan. 20, 2017 12:45 AM EST Reads: 2,858
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Jan. 20, 2017 12:45 AM EST Reads: 4,130
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Jan. 20, 2017 12:00 AM EST Reads: 6,350
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Jan. 19, 2017 09:45 PM EST Reads: 6,833
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Jan. 19, 2017 09:45 PM EST Reads: 7,723
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Jan. 19, 2017 07:30 PM EST Reads: 4,247
Providing secure, mobile access to sensitive data sets is a critical element in realizing the full potential of cloud computing. However, large data caches remain inaccessible to edge devices for reasons of security, size, format or limited viewing capabilities. Medical imaging, computer aided design and seismic interpretation are just a few examples of industries facing this challenge. Rather than fighting for incremental gains by pulling these datasets to edge devices, we need to embrace the i...
Jan. 19, 2017 05:30 PM EST Reads: 3,662