Welcome!

Java Authors: Hovhannes Avoyan, Carmen Gonzalez, Imran Akbar, Sharon Barkai, Adrian Bridgwater

Related Topics: Cloud Expo, Java, SOA & WOA, Linux, Security, Big Data Journal

Cloud Expo: Article

Rackspace Joins the Vormetric Cloud Partner Program

Cloud Expo Sponsor Vormetric's Transparent Encryption combines performance, flexibility, simplicity and scalability

Vormetric on Tuesday announced that Rackspace Hosting has joined the Cloud Partner program, and will be offering encryption and key management services to customers via Vormetric's Transparent Encryption solution. Vormetric's Transparent Encryption combines the performance, flexibility, simplicity and scalability needed to safeguard data-at-rest within Rackspace's managed cloud environments, enabling customers to address their compliance requirements, and to help protect sensitive information.

"Organizations have increasingly adopted Rackspace as their provider of choice for enterprise class cloud and hosting solutions," said John Engates, CTO at Rackspace. "With Vormetric, we've added new capabilities to extend data security practices to our customer implementations across our managed cloud platform."

Rackspace customers can use Vormetric's Transparent Encryption solution within Rackspace environments.

A top concern that organizations have with encryption is performance. Vormetric Transparent Encryption addresses this concern with high speed, hardware-based encryption using Intel AES-NI and Secure Key technologies. The result is strong protection and great performance within Rackspace environments.

"Given that security is the #1 concern of enterprises looking to embrace cloud and hosting solutions, Vormetric gives Rackspace's customers the ability to use Vormetric's Transparent Encryption solution within Rackspace environments," explained Vormetric's vice president of cloud, C.J. Radford. "By using Vormetric Transparent Encryption, Rackspace customers can seamlessly protect data with encryption and access controls, keep control of encryption keys within the enterprise, and gather the security intelligence that can identify when an attack is in progress."

More Stories By Elizabeth White

News Desk compiles and publishes breaking news stories, press releases and latest news articles as they happen.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.