Last weeks story featured the likes of Okta, SecureAuth and Symplified. In other words, it was heavy on identity management and access controls two of the most critical components of secure cloud computing.
This week, we look at virtualization security, security for e-commerce transactions, cloud-based data loss protection and more. Here are 7 more cloud security up-and-comers:
When users are disconnected from the corporate network, when they access their own personal web-based email accounts or when they are using an array of mobile devices, traditional DLP doesnt keep up.
In other words, Awareness Tech argues that traditional DLP (traditional may be a stretch since this is still a fairly new space) is not up to snuff when it comes to cloud computing and mobility.
What they Do: Awareness Tech focuses on insider security risks through its InterGuard suite of products that offer DLP, web filtering, employee monitoring, mobile monitoring and mobile device recovery, remote data retrieval and wiping, and remote tracking (for both recovery and forensic purposes).
Why theyre an up-and-comer? InterGuard is a cloud-based solution designed to bolster security in a world increasingly moving to the cloud and to mobile devices, such as smartphones and tablets. The company is backed by $6 million in VC and private funding and is both revenue and cash-flow positive.
One of key features of the InterGuard suite is that when a device is lost or stolen, InterGuard will track whats happening on the device. In industries rife with corporate espionage and IP theft, if a thief logs into an email account, youll have a record of it. If the person signs into Facebook or some other social networking site, youll know who they are. And, of course, with built-in geolocation, youll be able to alert the authorities to track them down and recover the device.
Customers include NASA, the Department of Justice, Allstate, IBM and Wells Fargo.
Moreover, a majority of breaches are caused by simple misconfigurations or inappropriate user privileges. In a virtual environment, a single misconfiguration, if exploited, could lead to a major incident.
What they Do: Instead of focusing only on the security requirements of VM operating systems, HyTrust addresses security, multi-tenancy and compliance for both cloud and virtual environments. The HyTrust virtual appliance provides access control, policy enforcement, and audit-quality logging for vSphere, Nexus and UCS.
Why theyre an up-and-comer? HyTrust addresses a key vulnerability in an increasingly large market. Without policy enforcement and access control, virtual and cloud environments pose serious risks. The company is backed by $16 million in funding from Cisco Systems, Granite Ventures, Trident Capital and Epic Ventures. Customers include Pepsi, AMD, GEICO, State of Michigan, US Navy, Netflix, and Hudson News.