Welcome!

Apache Authors: Elizabeth White, Pat Romanski, John Mertic, Liz McMillan, Janakiram MSV

News Feed Item

Verdasys Announces Worldwide Delivery of Cloud-Based Managed Security Service for Data Loss Protection

Verdasys, provider of Enterprise Information Protection (EIP) solutions for Global 2000 and mid-sized companies, has announced worldwide delivery of the Verdasys Managed Service for Information Protection (MSIP), the first cloud-based managed service for protecting sensitive data, while enabling secure collaboration in today's mobile business environments.

Targeted at organizations with 1,000 or more employees, MSIP is deployed, configured and administered by Verdasys data security experts through the MSIP Secure Cloud, eliminating the need for substantial investments in infrastructure and specialized staff in order to put into action the type of data security and intellectual property protection previously accessible only by the world's largest companies. With successful service deployments in North America and Europe -- and with showcase customers ranging from an aerospace contractor to a financial services company and an auto industry supplier -- increasing deployments of MSIP among mid-sized businesses indicates a growing need for affordable secure data sharing across a wide variety of industries. Such enterprises, many of them in the mid-market with limited IT resources, have previously been restricted to implementing simplistic, less effective data loss prevention technology or purchasing a managed service that offers only a partial solution for data protection, such as managed firewall, intrusion detection, email filtering and virtual private network.

The new cloud based information protection service is built on Verdasys’ industry leading Digital Guardian platform, leveraging more than a decade of expertise in an all-inclusive data protection and risk management solution, now available as an annual subscription. Verdasys is unique in offering the broadest set of data protection capabilities, including IP and trade secret protection, insider threat management, advanced data risk analysis and policy enforcement, PII/PCI & PHI compliance, advanced cyber defense and management of export control restrictions. The only platform to support Linux, Mac OS Citrix and Windows, Digital Guardian is the global data protection standard for 100,000-seat plus deployments.

According to Scott Glass, Vice President and General Manager, Aerospace & Industrial Equipment, for CDI Corporation in Tempe, AZ, "We needed to quickly and successfully deploy Data Loss Prevention (DLP) to meet critical data sharing requirements for a major aerospace equipment provider. The Verdasys cloud-based MSIP provided a dedicated team of experts to build and manage our entire data protection program from risk analysis through our own custom rule creation and control to successful rollout. We also eliminated months of DLP implementation time and with a managed service we lowered our costs by avoiding investments in our own hardware, software and headcount."

Analysts continue to predict strong growth in the market for managed security services, especially for those aimed at mid-sized businesses where increased compliance requirements and budget constraints are driving the need for more cost effective delivery models, such as cloud-based services. Yet, few cloud services for data security are offered and none that combine IP protection with cyber threat defense and compliance in a single solution. According to Christopher Morales, Senior Analyst, Security at the 451 Group, "Verdasys has identified the real opportunity in cloud security services -- the fully managed software-as-a-service that can protect an organization's IP, guard against cyber attack and meet compliance requirements without the very heavy lifting and high cost traditionally required."

Securing Modern Use Cases via the Cloud

Implementation of Verdasys MSIP begins with a risk assessment, available as a separate service and upgradable to a complete policy management and enforcement solution as part of the Verdasys MSIP. Secure Verdasys Digital Guardian agents are deployed across the enterprise to continuously upload encrypted risk intelligence to Verdasys’ secure hosting facilities, where it is analyzed and fed into a live reporting dashboard. Verdasys experts work with customers to create and deploy solution-specific rules enforced by the agents to control how sensitive data is accessed, stored and used based on unique security and compliance requirements.

"With our managed service approach, customers are seeing up-to-the-minute data risk intelligence, with detail on exactly how data is being used down to the application, file or device type. We can show granular data events such as who moved what files to DropBox or even which users printed what to where and how often," said Verdasys Director of Operations for Managed Services Michael Parrella. "It's the job of the Verdasys MSIP team to show these risks to our customers, work with them to define appropriate data protection policies and then we build and deploy these policies as controls that mitigate the risk of data loss. Controls can include educational prompts, automated encryption or applications and file usage blocking, and this can all be done without purchasing hardware or adding staff."

No sensitive content is transmitted or stored as part of the Verdasys MSIP service. Event details are captured as metadata that can recreate any event with forensic accuracy. Metadata is encrypted, hashed, and digitally signed before being securely transferred to Verdasys’ hosting facilities via Digital Guardian’s FIPS 140-2 certified messaging protocol.

Customers that will benefit from the Verdasys MSIP include:

  • Any organization with sensitive customer, corporate or government information, particularly data "in use and in motion" via email, USBs, the Web via DropBox, etc.
  • Enterprises that need the same risk and compliance management as the world's most secure organizations
  • Companies and agencies where mobile and highly privileged users are essential to business processes and collaboration, particularly those in a secure supply chain or outsourcing environments

Supporting Resources:

For an independent review of Verdasys MSIP, "Verdasys MSIP Hosted Service Brings Data-Loss Prevention to the Cloud," please visit: http://www.eweek.com/security/verdasys-msip-hosted-service-brings-data-loss-prevention-to-the-cloud/

See the Verdasys Managed Service for Information Protection slideshow.

Read the Verdasys blog.

Verdasys MSIP is available in North America, Europe and Japan/APAC regions.

For more information about MSIP, please contact Verdasys at [email protected]

About Verdasys

Verdasys (http://verdasys.com) provides Enterprise Information Protection solutions and managed services to secure sensitive data and assure the integrity of business processes, enabling midsize and global businesses to successfully compete in collaborative and mobile environments. Digital Guardian, a Leader in Gartner’s 2012 Magic Quadrant for Content-Aware Data Loss Prevention, is a proven technology platform that provides complete, policy-based data lifecycle monitoring, classification, control and forensics on endpoints and servers, virtual machines and enterprise applications, networks, mobile devices and cloud environments. Digital Guardian protects IP and regulated data from compromise by insiders, contractors, partners and targeted cyber attacks. Since 2003, millions of Digital Guardian agents have been deployed to protect critical data for global leaders in financial services, insurance, technology, manufacturing and healthcare industries.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for ...
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...