Gemalto Announces Expansion of Data Protection Ecosystem
FREMONT, CA: Gemalto, a provider of digital security, announces the expansion of its data protection ecosystem of integrated technology partners. The proliferation will include more than 750 IT applications, products, and cloud- based services from 250 companies, including MongoDB, Nutanix, and Pivotal Software.
Empowering IT organizations to rapidly implement centralized data encryption and identity protection across various technology environments, Gemalto integrates its SafeNet authentication, data encryption, and key management solutions with the most widely deployed cloud computing, networking, payment, security, and storage technologies.
The Gemalto SafeNet Cipher Technology Partner program helps enterprises solve the challenge of managing security in silos through pre-packed integrations of its data and identity protection products with widely deployed IT services and technologies from leading companies. The program supports Big Data through Apache, IBM, and MongoDB, Cloud & Virtualization through Amazon Web Services, Box, Google, Microsoft, Salesforce.com, and VMWare. It supports communications & networking through partners including Cisco, F5 Networks, and Juniper Networks. For the Financial Services & Payments sector, ACI Worldwide, Ingenico, MasterCard, Miura Systems, Symbiont, and VISA are partners. Security gets a boost through contributions from Blue Coat Systems, Palo Alto Networks, Skyhigh Networks, and Symantec. Software developments are supported by partners including Citrix, IBM, Microsoft, and Oracle. Storage & Backup technology is being evolved with the help of Commvault, Dell, NetApp, HP, Hitachi Data Systems, IBM, and Nutanix.
The SafeNet data and identity protection solutions enable enterprises to protect sensitive data and identities through strong identity protection and multi-factor authentication solutions that are delivered via cloud or on-premises, therefore securing user access to corporate networks, applications and services. Encryption solutions protect data across a broad range of use cases, including applications, databases, cloud and virtualized environments, IoT, payment ecosystems, and across enterprise networks.
The Centralized enterprise key management helps organizations to unify the control of the cryptographic keys for their encrypted data across even the most diverse range of encryption deployments; and end-to-end crypto management combines key management and hardware security module offerings to provide the foundation of trust to protect identities, payments, transactions, and applications by securing cryptographic keys and managing the provisioning of encryption, decryption, authentication, and digital signing services.
“Our broad data protection ecosystem means that companies can continue to benefit from the flexibility of the cloud and best of breed technologies while still maintaining centralized control over their data wherever it resides while securing user access regardless of the application,” says David Etue, VP, Business Development, Gemalto.
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....