Micro Focus Launches SecureData Sentry
April 23, 2018

Micro Focus announced the introduction and availability of SecureData Sentry, an expansion of its Voltage SecureData portfolio.

SecureData Sentry accelerates time to value for Hybrid IT data security and provides transparent deployment to protect data in applications across the enterprise. Privacy compliance can now be seamlessly enabled end-to-end for commercial or proprietary applications that are mission-critical to the business, including the migration to cloud workloads.

As organizations embrace the need for a digital transformation and deploy more capabilities, the demand for efficiently handling data across traditional IT, hybrid IT and cloud solutions becomes critical. The explosion of application deployment results in critical data being distributed across multiple environments, including on-premises and cloud – making it difficult to secure. The significant rise of data-centric workloads in the cloud demands a secure, efficient, non-disruptive approach to compliance.

“The rapid adoption of cloud applications creates new risks, as data is constantly flowing to and from on-premises systems and cloud services,” said John Delk, GM of the Security Products Group at Micro Focus. “Strict privacy regulations such as GDPR, PCI DSS, and HIPAA, along with limited trust in hosted environments, could expose valuable data, anywhere it may exist. SecureData Sentry simplifies and accelerates Voltage data-centric security deployment in cloud, commercial, and in-house applications, without critical application changes or integration required – helping reduce the risk of deploying hybrid IT solutions.”

Sentry simplifies data protection for a wide range of applications without modification or integration required. In addition, Format-Preserving Hash, the newest innovation in Voltage data protection methods, provides non-reversible de-identification, supporting use cases which call for data anonymization.

Voltage SecureData Sentry:

- Promotes a non-disruptive, transparent approach to privacy compliance and the secure use of data, that maintains centralized enterprise control over encryption keys and data in cloud services.

- Brokers data privacy to enable new value creation and policy compliance on protected data. It transparently protects data fields and files flowing to or from the cloud, and in and out of applications and databases.

- Enables interoperability of encrypted data between multiple SaaS applications, secure outsourcing, and similar use cases, independent of company size or geography.

- Maintains consistent data protection with on-premises applications, as cloud workloads are increasingly deployed into untrusted environments.

Micro Focus Data Security solutions enable advanced format-preserving encryption, secure stateless tokenization, stateless key management — and now, format-preserving hash (FPH) — to protect sensitive data across enterprise applications. Voltage FPH offers one-way transformation with the strength and use case versatility of Voltage Format-Preserving Encryption (FPE), working with existing database schemas and applications without change and without disabling the use of analytics. These technologies offer deployment flexibility across hybrid IT or cloud, payment ecosystems, mission-critical systems, storage, Big Data/IoT platforms, and a similar wide range of use cases.

The Latest

May 24, 2018

DEVOPSdigest asked experts from across the IT industry for their opinions on the top tools to support DevSecOps. Part 3 covers security and monitoring ...

May 22, 2018

DEVOPSdigest asked experts from across the IT industry for their opinions on the top tools to support DevSecOps. Part 2 covers DevOps and development ...

May 21, 2018

While DevSecOps, much like DevOps itself, is more about changing IT culture than employing certain types of technology, some tools can be an important support. To find out what the right tools are, DEVOPSdigest asked experts from across the IT industry for their opinions on the top tools to support DevSecOps. Part 1 covers the testing phase ...

May 17, 2018

The top two business priorities for CIOs of midsize enterprises (MSEs) in 2018 are growth and digital transformation. However, 57 per cent of MSEs are not yet delivering digital initiatives, according to findings from Gartner Inc.'s 2018 CIO Agenda Survey ...

May 15, 2018

Almost every company is facing the challenge of digital transformation today. This means rethinking and retooling your company to compete and succeed in an increasingly digital world. While digital transformation is not only about technology, the right tools can help. To find out what these right tools are, APMdigest asked experts from across the IT industry for their opinions on the essential tools to support digital transformation ...

May 08, 2018

With data breaches consistently being in the news over the last several years, it is no wonder why data privacy has become such a hot topic and why the European Union (EU) has put in place General Data Protection Regulation (GDPR) which will become enforceable on May 25, 2018, which is less than a month away ...

May 03, 2018

The prospect of increased workloads, combined with shrinking mainframe skillsets, has huge implications for mainframe DevOps. The only way for organizations to solve this skills gap crisis is by optimizing developer productivity. Drilling down a level further, what does this all mean for mainframe DevOps? ...

May 02, 2018

When it comes to operations and development, DevOps has changed the traditional compartmentalized style of development by eliminating silos. But what about the security team? Security is largely still siloed from operations and development. No doubt, many DevOps teams have some security controls baked into their automation processes, but a recent survey shows there are still alarming gaps ...

April 30, 2018

According to the 2018 Global Security Trends in the Cloud report, 93 percent of respondents faced challenges when deploying their current on-premises security tools in the cloud, and 97 percent lacked the tools, cross-functional collaboration and resources to gain proper insight into security across the organization. These numbers indicate a big problem in DevSecOps that needs to be addressed ...

April 26, 2018

Moving more workloads to the cloud is a top IT priority, so eventually it will be time to consider how to make those critical legacy applications cloud ready. In Part 1 of this blog, I outlined the first four of eight steps to chart your cloud journey. In addition, consider the next four steps below ...

Share this