Micro Focus Launches SecureData Sentry
April 23, 2018

Micro Focus announced the introduction and availability of SecureData Sentry, an expansion of its Voltage SecureData portfolio.

SecureData Sentry accelerates time to value for Hybrid IT data security and provides transparent deployment to protect data in applications across the enterprise. Privacy compliance can now be seamlessly enabled end-to-end for commercial or proprietary applications that are mission-critical to the business, including the migration to cloud workloads.

As organizations embrace the need for a digital transformation and deploy more capabilities, the demand for efficiently handling data across traditional IT, hybrid IT and cloud solutions becomes critical. The explosion of application deployment results in critical data being distributed across multiple environments, including on-premises and cloud – making it difficult to secure. The significant rise of data-centric workloads in the cloud demands a secure, efficient, non-disruptive approach to compliance.

“The rapid adoption of cloud applications creates new risks, as data is constantly flowing to and from on-premises systems and cloud services,” said John Delk, GM of the Security Products Group at Micro Focus. “Strict privacy regulations such as GDPR, PCI DSS, and HIPAA, along with limited trust in hosted environments, could expose valuable data, anywhere it may exist. SecureData Sentry simplifies and accelerates Voltage data-centric security deployment in cloud, commercial, and in-house applications, without critical application changes or integration required – helping reduce the risk of deploying hybrid IT solutions.”

Sentry simplifies data protection for a wide range of applications without modification or integration required. In addition, Format-Preserving Hash, the newest innovation in Voltage data protection methods, provides non-reversible de-identification, supporting use cases which call for data anonymization.

Voltage SecureData Sentry:

- Promotes a non-disruptive, transparent approach to privacy compliance and the secure use of data, that maintains centralized enterprise control over encryption keys and data in cloud services.

- Brokers data privacy to enable new value creation and policy compliance on protected data. It transparently protects data fields and files flowing to or from the cloud, and in and out of applications and databases.

- Enables interoperability of encrypted data between multiple SaaS applications, secure outsourcing, and similar use cases, independent of company size or geography.

- Maintains consistent data protection with on-premises applications, as cloud workloads are increasingly deployed into untrusted environments.

Micro Focus Data Security solutions enable advanced format-preserving encryption, secure stateless tokenization, stateless key management — and now, format-preserving hash (FPH) — to protect sensitive data across enterprise applications. Voltage FPH offers one-way transformation with the strength and use case versatility of Voltage Format-Preserving Encryption (FPE), working with existing database schemas and applications without change and without disabling the use of analytics. These technologies offer deployment flexibility across hybrid IT or cloud, payment ecosystems, mission-critical systems, storage, Big Data/IoT platforms, and a similar wide range of use cases.

The Latest

August 15, 2018

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 13, 2018

Agile is expanding within the enterprise. Agile adoption is growing within organizations, both more broadly and deeply, according to the 12th annual State of Agile report from CollabNet VersionOne. A higher percentage of respondents this year report that "all or almost all" of their teams are agile, and that agile principles and practices are being adopted at higher levels in the organization ...

August 09, 2018

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study. The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study ...

August 08, 2018

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage, according to the 2018 Cost of a Data Breach Study, sponsored by IBM Security and conducted by Ponemon Institute. The study found that the average cost of a data breach globally is $3.86 million ...

August 06, 2018

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

August 02, 2018

Results from new Forrester Consulting research reveal the 20 most important Agile and DevOps quality metrics that separate DevOps/Agile experts from their less advanced peers ...

July 31, 2018

Even organizations that understand the importance of cybersecurity in theory often stumble when it comes to marrying security initiatives with their development and operations processes. Most businesses agree that everyone should be responsible for security, but this principle is not being upheld on a day-to-day basis in many organizations. That’s bad news for everyone. Here are some best practices for implementing SecOps ...

July 30, 2018

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point in the transformation of cloud IT infrastructure. SecOps is a methodology that seeks to address this by operationalizing and hardening security throughout the software lifecycle ...

July 26, 2018

Organizations are shifting away from traditional, monolithic architectures, with three-quarters of survey respondents delivering at least some of their applications and more than one-third delivering most of their applications as microservices, according to the State of DevOps Observability Report from Scalyr ...

July 24, 2018

What top considerations must companies make to ensure – or at least help improve – Agile at scale? The following are key techniques and practices to help accelerate Agile delivery rollouts and scale Agile and DevOps in the Enterprise ...

Share this