|[February 13, 2013]
Vormetric Improves Enterprise Data Security Intelligence
SAN JOSE, Calif. --(Business Wire)--
Vormetric, the leader in enterprise data
security for physical, virtual and cloud environments, today
announced its strategy and initial steps to enhance enterprise security
intelligence. As hackers improve their ability to penetrate traditional
defenses with attacks such as advanced persistent threats (APTs),
Vormetric Data Security can help enterprises gather security
intelligence around what is happening to their sensitive data so they
can counter such threats better and faster.
As a recent Forrester (News - Alert) Research analysis1 summarized,
"Targeted attacks are on the rise. The attacks are increasingly more
sophisticated, and our detection and response capabilities are woefully
inadequate. Advanced persistent threats (APTs), espionage, spear
phishing, and seemingly perpetual disrupted denial of service (DDoS)
attacks dominate the headlines. We typically don't have to wait more
than a month before we learn of a major organization suffering a
significant security incident."
Vormetric's security intelligence strategy builds on the existing
capabilities of the Vormetric Data Security product portfolio. Vormetric
Data Security currently helps enable enterprises to better understand
their security posture and avoid data breaches by providing Security
Informatin and Event Management (SIEM) solutions - like Splunk (News - Alert), HP
ArcSight, LogRhythm and others - with valuable security and audit data.
Vormetric's support for log file formats, including CEF and RFC 5424,
enables enterprises to quickly feed information from Vormetric Data
Security into their existing SIEM environment. By "watching the watcher"
and reporting on root and system administrator activities, Vormetric
enables enterprises to understand unusual data access patterns before
data breaches occur.
Vormetric's near-term plans are to enhance the existing solution with
cloud service provider (CSP (News - Alert)) security intelligence information to its
Vormetric Data Security solution. Longer-term, the company's vision is
to provide an ecosystem of data security related security intelligence
collection and analysis resource offerings that connect to security
intelligence and SIEM solutions, providing Vormetric customers with the
ability to understand quickly and easily what is happening to their
sensitive information, wherever it resides.
"As recent compromises at the New York Times, Wall Street Journal, and
Washington Post highlight, perimeters are permeable and enterprises need
to improve their knowledge of what is happening to sensitive
information," said Ashvin Kamaraju, Vormetric's vice president for
product development. "Vormetric allows enterprises to protect what
matters by providing critical security intelligence information about
sensitive information assets."
Vormetric (@Vormetric) is the industry leader in data security solutions
that span physical, virtual and cloud environments. Data is the new
currency and Vormetric helps enterprise customers and government
agencies protect what matters - their sensitive data - from both
internal and external threats. In a world of Advanced Persistent Threats
(APTs), Vormetric's market-leading privileged user access controls and
security intelligence are invaluable. The company's scalable solution
suite protects any file, any database and any application - anywhere it
resides - while maintaining application performance and avoiding key
management complexity. Many of the world's largest and most
security-conscious organizations and government agencies, including 17
of the Fortune 25, have standardized on Vormetric to protect their
sensitive data and provide them with advanced security intelligence. For
more information, visit www.vormetric.com.
Vormetric is a trademark of Vormetric, Inc. All other names mentioned
are trademarks, registered trademarks or service marks of their
1 Forrester Research (News - Alert), Inc., "Five Steps To Build An Effective
Threat Intelligence Capability" by Rick Holland, 15 January 2013
[ Back To Cloud Computing 's Homepage ]