Viewing entries tagged
encryption

Cloud Security by the numbers

Cloud Security by the numbers

With over 3,000 IT professionals surveyed, the recent Ponemon study sponsored by Gemalto addressed issues concerning the "Global State of Cloud Data Security."  The webcast can be viewed here and the report can be downloaded here.  The participants represented a good cross section of company scale and geographic location around the world.  Over 70% of those surveyed believe that the "management of privacy and data protection regulations" are more complex in the cloud, due in part to the fact that a similar number believe that it is "more difficult to protect confidential or sensitive information in the cloud" (see graphic). 

Whereas enterprises look to save money, improve scalability and simplify their IT infrastructure through cloud services, they believe that security, privacy and compliance are much harder to achieve.  Perhaps it is no surprise then that only about a third of those surveyed use encryption to secure their cloud data; however, it is encouraging to note that half of those using cryptographic tools make data unreadable before sending it to the cloud provider, implying that they manage their own keys.  Responses are trending in the right direction but we still need to do more work to educate IT pros on how to exceed privacy and regulatory requirements through proper end-to-end encryption.

 

 

Open Camps Conference at UN

Open Camps Conference at UN

The world's largest mission-driven open source conference, Open Camps aims to "break down barriers to technology innovation through open source governance, communities and collaboration." The Inpher team presented the _ultra development platform for application-level security and privacy at the Search Camp session in New York on July 10th. The paradigm of trust in computing changes with new methods to share and query encrypted data with standard search and storage platforms such as Solr and Hadoop. Sensitive information can be computed in untrusted environments wherein the hosting provider has zero knowledge. The session highlighted how enterprises from insurance companies to healthcare providers are securing a path to scale in the public cloud for big data storage, sharing and analytics.

 

[Secure] Sharing is caring

[Secure] Sharing is caring

Many of our customers responded with the need to share sensitive data with approved collaborators.  We are excited to announce the release of  _ultra 1.2 to support sharing of encrypted data sets without decryption through single key exchange. This capability is particularly useful in big data collaboration because the compute overhead to share data is independent of its size. Key exchange is accomplished in constant time which means the shared encrypted data set is immediately available for computation. 

Keyword search is enabled on shared data by utilizing a key exchange system based on standard public and secret key cryptography. The _ultra encrypted key architecture allows applications to manage information in vulnerable cloud or on-premise environments while keeping sensitive data unreadable to the infrastructure provider and host.