Every Cloud Needs a Silver Lining

Gilad Parann-Nissany

Subscribe to Gilad Parann-Nissany: eMailAlertsEmail Alerts
Get Gilad Parann-Nissany: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Gilad Parann-Nissany
Healthcare businesses are adopting cloud computing in record numbers due to the available cost-efficiency, scalability, and flexibility. According to a report by Accenture, nearly one-third of healthcare sector decision makers said they are using cloud applications, and 73% said they a...
MySQL encryption is one of the most common use cases we’re seeing in infrastructure clouds. Enterprises or software as a service (SaaS) vendors store sensitive or regulated data in the cloud using MySQL, and the immediate consequence is a requirement for data encryption. Below, I’ll co...
Increased Security: Perhaps the most controversial benefit of SDS is that it offers increased security. Hardware enthusiasts will argue that there is nothing stronger than the sticks and bricks of the physical data center and the metal of the hardware devices. But this is not necessari...
When asked how companies can protect themselves, Schmidt says “They need to properly scope encryption [and] use encryption where it is available.” According to another expert, BBC.com writer Paul Rubens, “Even if cloud service providers are infiltrated or compelled to disclose data,...
Cloud computing is increasingly becoming part of the enterprise IT landscape. In fact, a recent cloud security survey conducted by HP reveals that 70 percent of all respondents say their company is using some form of the cloud. The study also found that cloud penetration jumps to 80 pe...
Several current trends in cloud computing leading into 2015 actually exhibit a tension between themselves. One trend, a well-known fact that will continue in the New Year to a greater extent, is that enterprises are rapidly moving to the cloud because of its operational efficiencies. T...
Porticor Honored for its Innovative Cloud Key Management and Data Encryption Solution Protecting Private Data Stored in the Cloud CAMPBELL, Calif. – Dec. 11, 2014 – Porticor®, a leading cloud data security company delivering the only cloud-based key management and data encryption  solu...
The global village, mobile devices, online marketplaces, social networks, and on-demand entertainment all have a part to play. People all over the world are increasing the time they spend in the virtual world. They’re buying, selling, sharing, studying, developing apps, hanging out in ...
Cloud computing is your future operational platform, (virtual) data center, and application platform – all rolled into one concept from multiple vendors. The following are 25 recent statistics about the current and future state of the cloud that will help you understand the bread...
Porticor’s Cloud Key Management and Data Encryption Solution Protects Cloud-based Cardholder and Financial Information from Holiday Hackers and Threats at Organizations such as Payze CAMPBELL, Calif. – Dec. 2, 2014 – Porticor®, a leading cloud data security company delivering the only ...
Got a plan for your move to the cloud? If you do, you’re in the minority. According to a recent study, a mere 31 percent of those planning a move to the cloud actually have a strategy for migrating data and applications. The rest don’t. To avoid the complexity and cost, we recommend h...
The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee ...
Cloud security is a top concern for any organization migrating to the cloud. The threats are many. For example, the fact your data resides in a shared, multi-tenant environment is a threat that has become a reality with the latest Xen virtualization bug, which allowed a malicious fu...
This year’s Amazon Web Services Re:Invent event was spectacular. We met many partners, customers, and friends and learned some amazing information. Cloud has become the new normal It is no longer a “disruptive technology” or industry jargon. The cloud is now ubiquitous, unavoidable, an...
Cloud computing is quickly becoming a mainstay for many technology companies today because of its superior flexibility, accessibility, and capacity compared to traditional online computing and storage methods. But just like traditional storage and data sharing methods, cloud computing ...
Many Amazon Web Services (AWS) users lose control of their data by giving up control of their encryption keys to Amazon or a third party, warns Gilad Parann-Nissany with cloud security provider Porticor. “This is definitely not the best practice and compromises their data and the...
Newest Virtual Private Data System Leverages Software-Defined Key Management to Enhance Security and Cloud Data Protection across OpenStack and VMware Environments CAMPBELL, Calif. – Nov. 4, 2014 – Porticor®, a leading cloud data security company delivering the only cloud-based key man...
The Amazon Web Services public infrastructure cloud is seeing massive adoption, and for good reason. Using AWS arms companies with advanced infrastructure that, in most cases, they could not possibly achieve in their own datacenters. In fact, According to Gartner, AWS has 5 times more ...
One mistake AWS users make is losing control of the data by ‘allowing Amazon or a third party to control their encryption keys’ Using AWS and Solving All Security Issues The Amazon Web Services public infrastructure cloud is seeing massive adoption, and for good reason. Using AWS arms ...
It has been well-studied, documented, and reported that our greatest concern with regard to acceptance of and migration to cloud computing is security. In 2014’s “The Future of Cloud Computing” Survey, 49 percent of respondents cited security as an inhibitor to cloud adoption.  And, tr...
The post AWS: Cloud Security Mistakes Discussed by Experts appeared first on Porticor Cloud Security.
Every process needs some form of training. Information security is no exception and, because of the ever- increasing impacts of failure, it is more important than ever to get the training right. Perhaps training has a bad name it still struggles to throw off. When I first started work ...
Porticor’ Virtual Private Data (VPD) solution It is a well-documented need, spanning regulatory compliance requirements to basic industry best practiced, that stored data in the cloud needs to be encrypted. This is not unique as many solutions across the industry offer data encryption....
IT Departments of companies of all sizes across all industries and geographies are realizing the value of virtualization. We are migrating data and apps to the cloud in record amounts. In fact, Information Week recently reported Gartner findings that the public cloud services market wi...
Former Gazzang Customers Can Benefit from Porticor’s Software-Defined Encryption Key Management for Total Security of Cloud Data Porticor®, a leading cloud data security company delivering the only cloud-based data encryption and key management solution that infuses trust into the clou...
Data is arguably the most prolific and most valuable of resources. As such, it needs to be protected both as a company asset and in keeping with data privacy laws. Data protection is most acute in healthcare, which is something of a latecomer to fast-evolving heterogeneous electronic e...
Porticor’s Data Encryption and Key Management Solution Enables Health Organizations to Secure Protected Health Information in the Cloud and Meet Safe Harbor Compliance CAMPBELL, Calif. – Sept. 16, 2014 – Porticor®, a leading cloud data security company delivering the only cloud-based k...
Hackers breached a HealthCare.gov test server, reportedly affecting no records, but the repercussions could spread across many medical organizations. Thursday’s disclosure that hackers breached a HealthCare.gov test server this summer sparked more concern about the overall vulner...
Porticor Adds Software-Defined Encryption Key Management to nScaled’s Leading IT BCDR Platform for Complete Protection of Replicated Data in the Cloud   CAMPBELL, Calif., and SAN FRANCISCO – Sept. 3, 2014 – Porticor® and nScaled today announced the industry’s first joint solution ...
Achieving the best data security in the cloud has multiple steps. In our tip of the month series, we have been addressing many of them and have received extensive feedback from you that these tips are helping you secure your data, achieve compliance, and attain peace of mind knowing th...
In a Feb 2014 survey, 94 percent of organizations surveyed reported running applications or experimenting with infrastructure-as-a-service.[1] According to research firm Nasumi, there is over one exabyte currently stored in the cloud. An exabyte is over a billion GB.[2] Considering the...
A prominent cloud data security company recently announced an update to its security software by adding support for Transparent Data Encryption, as to better encrypt and manage the security keys of its business clients’ SQL servers. According to its official news release, Portico...
Porticor, a cloud security company delivering solutions for cloud data encryption and key management, now supports Microsoft SQL Server Transparent Data Encryption (TDE), securing Microsoft’s database in cloud hosting infrastructures with its Porticor Virtual Private Data (VPD) solutio...
Porticor Virtual Private Data System Leverages Software-Defined Key Management to Eliminate Complexities and Risks Found in Traditional Hardware Encryption Security Modules CAMPBELL, Calif. – Aug. 5, 2014 – Porticor®, a leading cloud data security company delivering the only cloud-base...
Add to the list of known certainties: death, taxes, and the need to lower the cost of healthcare. Neither HIPAA standards nor encryption were created with the purpose of lowering the cost of healthcare, but neither was penicillin originally purposed as an antibiotic. Both welcome side ...
When designing your cloud architecture you may notice several differences between the cloud-computing environment and the “old world” of physical infrastructure. Two of the main differences are elasticity and dynamism, which are part of the cloud’s DNA. The fact that security-related c...
By now, we all know that if we store sensitive data in the cloud or operate any business-critical apps or workloads there, we must use cloud encryption to protect ourselves, our information, and our customers. It helps to break down the cloud encryption best practices by business type,...
In a post Snowden world it is clear that for cloud data security, we need strong encryption. When properly implemented, encryption in the cloud reduces risk to levels acceptable for sensitive data. There is no doubt data protection in the cloud computing era is never going to be a ‘...
  The cloud’s call is a tempting one. Migrating (at least) some of your databases has overt draws. And besides, it seems like everyone is doing it. But, still, something in your training and experience is nagging at you: migrating means losing control.   And, you are not wron...
Hurricane season is upon us and like all natural disasters, hurricanes have the capacity to demolish homes, destroy businesses, and devastate communities. To protect itself, your business can set up a Business Continuity and Disaster Recovery solution. The most cost effective BCDR solu...