|By Marketwired .||
|May 12, 2014 04:00 AM EDT||
SAN JOSE, CA -- (Marketwired) -- 05/12/14 -- SPYRUS, Inc. today announced the PocketVault Encryptor Professional (PVE Pro) file encryption and file sharing application for the Microsoft (NASDAQ: MSFT) certified SPYRUS WorkSafe and WorkSafe Pro Windows To Go bootable USB 3.0 live drives. PVE Pro transparently and securely encrypts, shares and stores single files, groups of files and directories in public and private cloud environments. Documents, spreadsheets and even media files can be shared and synched among teams of authenticated users.
The SPYRUS PVE Pro application secures the user's AES 256 bit encryption keys on the FIPS 140-2 Level 3 Rosetta® hardware security module that is embedded within WorkSafe and WorkSafe Pro live drives. Every user file is encrypted with its own key and SPYRUS PVE Pro ensures all file encryption and decryption keys are always secured on the user's WorkSafe drive and never available to the cloud service provider. Very sensitive files can even be encrypted multiple times with different keys for defense-in-depth protection. Unlike commodity file encryption products, SPYRUS WorkSafe and WorkSafe Pro employs the strongest cryptographic algorithms in a hardware security module certified by NIST.
Key generation, key storage, and key management functions are also executed completely within the SPYRUS Rosetta hardware security module. Moreover, as in other SPYRUS encrypting products, passwords do not exist on the drive in any form and are reconstituted for each logon process to unlock the drive, making them unsusceptible to attacks. All this core functionality is implemented within the USB security device and is applied to all data on each Secured by SPYRUS Windows To Go drive.
"PocketVault Encryptor Professional was originally developed to meet the security needs of Government organizations to share and protect both data at rest and data in transit for collaboration among workgroups," said Tom Dickens, Chief Operating Officer, SPYRUS, Inc. The integration of the PVE Pro application with a FIPS 140-2 Level 3 Rosetta hardware security module provides the additional assurance that only authenticated users who have access to the hardware key and legitimate password can decrypt the sensitive files stored on SharePoint or public cloud storage systems such as DropBox and Google Drive."
Enterprise users can share encrypted files by creating and exchanging PVE Certificates with other PVE users, and add their certificates as PVE Contacts. When encrypting a file, you can select PVE Contacts to share decryption capabilities for that file. You can then safely transmit the encrypted file (for example, as an email attachment, on a USB storage drive, or stored in cloud storage systems), and only you and designated PVE Contacts can decrypt it. An initialization process creates, backs up, or restores private keys based on enterprise policy. The SPYRUS Enterprise Management System (SEMS) can centrally enforce corporate access rules and key management policies and selectively enable, disable and "kill" access to each PVE Pro enabled WorkSafe and WorkSafe Pro drives.
PVE Pro can be used to encrypt and decrypt files and folders from your booted Windows 8.1 environment on WorkSafe or WorkSafe Pro drives or as a USB token in Windows 7 and 8 desktop infrastructure environments. Source files can be removed after encryption/decryption and perform encrypt, decryption and safe erase functions on folders and subfolders wherever they are stored.
Please join us at TechEd North America 2014 at SPYRUS booth 1640
About SPYRUS, Inc.
SPYRUS delivers innovative encryption solutions that offer the strongest protection for data in motion, data at rest and data at work. For over 20 years, SPYRUS has delivered leading hardware-based encryption, authentication, and digital content security products to government, financial, and health care enterprises. To prevent the insertion of untrusted components, patented Secured by SPYRUS security technology is proudly designed, engineered, and manufactured in the USA to meet FIPS 140-2 Level 3 standards. SPYRUS has collaborated closely with Microsoft to deliver the first certified hardware encrypted portable platform for Windows 7, Windows 8 and Window 8.1. SPYRUS is headquartered in San Jose, California. See www.spyruswtg.com for more information.
SPYRUS, the SPYRUS logo, Secured by SPYRUS, and PocketVault are either registered trademarks or trademarks of SPYRUS, Inc., in the U.S. and/or other jurisdictions. All other company, organization, and product names are trademarks of their respective organizations.
T-Mobile has been transforming the wireless industry with its “Uncarrier” initiatives. Today as T-Mobile’s IT organization works to transform itself in a like manner, technical foundations built over the last couple of years are now key to their drive for more Agile delivery practices. In his session at DevOps Summit, Martin Krienke, Sr Development Manager at T-Mobile, will discuss where they started their Continuous Delivery journey, where they are today, and where they are going in an effort ...
May. 25, 2015 12:00 PM EDT Reads: 1,115
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects. Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
May. 25, 2015 12:00 PM EDT Reads: 1,248
Container frameworks, such as Docker, provide a variety of benefits, including density of deployment across infrastructure, convenience for application developers to push updates with low operational hand-holding, and a fairly well-defined deployment workflow that can be orchestrated. Container frameworks also enable a DevOps approach to application development by cleanly separating concerns between operations and development teams. But running multi-container, multi-server apps with containers ...
May. 25, 2015 12:00 PM EDT Reads: 1,776
Software Development Solution category in The 2015 American Business Awards, and will ultimately be a Gold, Silver, or Bronze Stevie® Award winner in the program. More than 3,300 nominations from organizations of all sizes and in virtually every industry were submitted this year for consideration. "We are honored to be recognized as a leader in the software development industry by the Stevie Awards judges," said Steve Brodie, CEO of Electric Cloud. "We introduced ElectricFlow and our Deploy app...
May. 25, 2015 12:00 PM EDT Reads: 1,574
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
May. 25, 2015 12:00 PM EDT Reads: 4,041
SYS-CON Events announced today that DragonGlass, an enterprise search platform, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. After eleven years of designing and building custom applications, OpenCrowd has launched DragonGlass, a cloud-based platform that enables the development of search-based applications. These are a new breed of applications that utilize a search index as their backbone for data...
May. 25, 2015 12:00 PM EDT Reads: 1,716
Mobile commerce traffic is surpassing desktop, yet less than 20% of sales in the U.S. are mobile commerce sales. In his session at 15th Cloud Expo, Dan Franklin, Segment Manager, Commerce, at Verizon Digital Media Services, defined mobile devices and discussed how next generation means simplification. It means taking your digital content and turning it into instantly gratifying experiences.
May. 25, 2015 11:30 AM EDT Reads: 3,443
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists will address the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affec...
May. 25, 2015 11:00 AM EDT Reads: 1,249
SYS-CON Events announced today that EnterpriseDB (EDB), the leading worldwide provider of enterprise-class Postgres products and database compatibility solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. EDB is the largest provider of Postgres software and services that provides enterprise-class performance and scalability and the open source freedom to divert budget from more costly traditiona...
May. 25, 2015 11:00 AM EDT Reads: 1,448
Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net...
May. 25, 2015 11:00 AM EDT Reads: 4,731
Gartner predicts that the bulk of new IT spending by 2016 will be for cloud platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017. The benefits of the cloud may be clear for applications that can tolerate brief periods of downtime, but for critical applications like SQL Server, Oracle and SAP, companies need a strategy for HA and DR protection. While traditional SAN-based clusters are not possible in these environments, SANless cluste...
May. 25, 2015 11:00 AM EDT Reads: 1,417
Software Defined Storage provides many benefits for customers including agility, flexibility, faster adoption of new technology and cost effectiveness. However, for IT organizations it can be challenging and complex to build your Enterprise Grade Storage from software. In his session at Cloud Expo, Paul Turner, CMO at Cloudian, looked at the new Original Design Manufacturer (ODM) market and how it is changing the storage world. Now Software Defined Storage companies can build Enterprise grade ...
May. 25, 2015 11:00 AM EDT Reads: 4,445
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud en...
May. 25, 2015 10:00 AM EDT Reads: 1,713
To manage complex web services with lots of calls to the cloud, many businesses have invested in Application Performance Management (APM) and Network Performance Management (NPM) tools. Together APM and NPM tools are essential aids in improving a business's infrastructure required to support an effective web experience... but they are missing a critical component - Internet visibility. Internet connectivity has always played a role in customer access to web presence, but in the past few years u...
May. 25, 2015 10:00 AM EDT Reads: 5,505
There's Big Data, then there's really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at Big Data Expo®, Hannah Smalltree, Director at Treasure Data, discussed how IoT, Big D...
May. 25, 2015 10:00 AM EDT Reads: 3,969