Advertisement

Protegrity Launches Protegrity 7 Data Security Platform

By on

by Angela Guess

According to a recent press release, “Protegrity announces the worldwide availability of Protegrity 7, a data-centric security platform designed to help data-driven organizations realize the full potential value of their data while protecting it throughout the enterprise and cloud. ‘Data is becoming ever more diverse and fragmented, whether it’s on-premise or in the cloud, structured or unstructured, or used in-house or by third-parties,’ said Protegrity CEO Suni Munshani. ‘At the same time, this data has become ever-more critical to how organizations operate and engage with their customers, partners, and employees. The challenge of protecting it despite its growing volume, variety and velocity has become ever-more challenging and urgent.’ …With Protegrity 7, data security leaders can define, implement, and monitor data security policies with unprecedented scale, agility and flexibility to enable all data users to leverage their valuable data assets safely and securely.”

The release continues, “New and enhanced capabilities found in Protegrity 7 include: (1) Internet Scale: Expanded portfolio of data protectors and SDKs support a greater diversity of data sources, both on-premises and in the cloud. Clustering and micro-services deployment options enable rapid scale-up and scale-out of data protection as data volumes and workloads expand. Comprehensive and scalable key management, including support for NIST 800-57 standard, key state management, and key-encryption key (KEK) handling and rotation. (2) Agility at the Speed of the Business: Full policy lifecycle management and policy feedback tools and dashboard to enable defining, monitoring and subsequently changing data security policies without disrupting business, modifying application code, or changing the underlying application environment. Expanded use of Protegrity Gateway technology more rapidly applies optimal data protection for any sensitive data everywhere it resides, transparently and non-invasively from the perspective of application end-users.”

Read more at Business Wire.

Photo credit: Protegrity

Leave a Reply