RSAC: Credant Announces Cloud Encryption Software Platform

RSS

Securing the cloud has been one of the dominant themes at RSA this week. Security vendors positioned to help enterprises secure their data in the cloud could reap the sizable benefits of being -- pardon the cliche -- in the right place at the right time.

Such could be the case with Credant Technologies, a vendor that specializes in products and services that provide data encryption, security and compliance for enterprises. I met with Geoff Webb and Darren Shimkus from Credant at RSA, and they told me how they believe their new Credant cloud security platform can help enterprises overcome some of the security concerns that admins may still have about cloud computing.

"There are two ways to secure data," Shimkus says. "You can secure endpoints and the environment around the data, or you can protect the data itself. Our new cloud security platform focuses on the data."

According to Shimkus and Webb, their new cloud encryption platform -- which just hit beta -- is designed to improve security for virtual desktop infrastructure (VDI) private cloud infrastructures. Credant's approach combines key management, granular encryption, and access control into one solution that is designed to protect data against internal security threats in the enterprise, or even in cloud providers. Webb explains that Credant's encryption technology is policy-based, can be centrally managed, and operates in real-time.

Credant plans to build on their cloud security platform -- accessible in beta form via the Credant website -- in the coming months and years.

Attending the RSA Conference in San Francisco this week? Share your thoughts by adding a comment to this blog post or continuing the discussion on Twitter.

Follow Jeff James on Twitter at @jeffjames3

Follow Windows IT Pro on Twitter at @windowsitpro

Related Content:

Please or Register to post comments.

What's Security Blog?

Security news, views, product reviews, and solutions for Microsoft Windows IT professionals.

Blog Archive

Sponsored Introduction Continue on to (or wait seconds) ×