— Vormetric Transparent Encryption™ and HP ArcSight SIEM platform fill- in security analytics blind spot for faster and more accurate APT, Malware and insider threat identification —
SAN JOSE, Calif. – September 18, 2013 – Vormetric, the leader in enterprise data security for physical, virtual and cloud environments is working with HP ArcSight to help customers identify insider threat attacks from malicious users, advanced persistent threats (APT) and malware quickly and more accurately. According to the Ponemon Institute HP sponsored, “ 2012 Cost of Cyber Crime Study ”, information theft and business disruption continue to represent the highest external costs.
Some of the key results of the study include:
Click to Tweet : #Vormetric and @HPSecurity together demo data- centric #SecurityIntelligence at #HPProtect. Come see us at Booth 221.
“Attackers are frequently using outside-in techniques to access valuable data on the network,” said Derek Tumulak, Vice President of Product Management, Vormetric. “They originate their attack by compromising a legitimate corporate user, or growingly, an outsourced partner. They then use their access to do reconnaissance across servers looking for privileged user credentials. Once they can imitate a privileged user, such as a Virtual Infrastructure or storage administrator, they can have direct access to the infrastructure or fake being other authorized users through privilege escalation. Now they have access to all the sensitive data and can edit system logs to cover their tracks.”
“Cyberattacks are becoming more sophisticated and harder to detect, costing many organizations valuable time and resources,” said Frank Mong,Vice President and General Manager, Solutions, Enterprise Security Products, HP. “Providing a rich set of contextual information and state - of- the - art correlation technology, HP ArcSight can help customers detect security threats more efficiently and with partners such as Vormetric, can provide additional visibility to sensitive data access and privileged user activities to further enable data protection against malicious insiders.”
As a Gold Sponsor of HP’s annual enterprise security event, HP Protect, being held in Washington D.C., September 16-19, Vormetric will be demonstrating the interoperability of Vormetric Security Intelligence logs with the HP ArcSight platform in booth #221.
“Attendees of HP Protect who visit the Vormetric booth will see first-hand how the HP ArcSight platform can quickly detect and identify a root user who is disguising himself as an authorized database user,“ said Charles Goldberg, Vormetric Sr. Director Product Marketing. “HP ArcSight makes it fast and easy to detect the violation and identify the perpetrator with the help of Vormetric Transparent Encryption security intelligence logs - ensuring sensitive data is always safe because it is encrypted. Typically, NetFlow and firewall logs do not detect this type of root user attack until massive amounts of data leave the server and pass through the network and firewall on its way to the hacker.”
Stop by booth #221 and see Vormetric solutions for HP ArcSight at HP Protect, September 16 – 18, during expo hours in Washington D.C.
Vormetric (@Vormetric) is the industry leader in data security solutions that span physical, virtual and cloud environments. Vormetric helps over 1200 customers, including 17 of the Fortune 25 and many of the world’s most security conscious government organizations, to meet compliance requirements and protect what matters —their sensitive data —from both internal and external threats. The company’s scalable solution protects any file, any database and any application —anywhere it resides — with a high performance, market-leading Vormetric Transparent Encryption™ that incorporates application transparent encryption, privileged user access controls, automation and security intelligence.
+1(408) 884 - 5162
Jonathan Mathias / Kasia Murphy
+44 (0)20 7401 7968
|Vormetric South Korea
+82 2 566 - 8898
Vormetric is a trademark of Vormetric, Inc
Five data heroes united by one powerful platform: transparent encryption, application encryption, integrated key management, tokenization with data masking...More Videos >>