Ionic Security Raises $40.1 Million for Enterprise Data Security
The company's biggest differentiator in the market is it has found a way to make encryption work without friction across devices and deployment models, according to Ghetti. "We have taken the concept of actually managing the cryptography out of the equation, and we have automated the orchestration across the environments that enterprises are already using," he explained. Data needs to be secure while in motion across a network as well as when it is at rest on a storage device or database. Ionic Security uses standard Transport Layer Security (TLS) for data in motion and whole disk encryption to protect data at rest. Looking beyond traditional in-motion and at-rest encryption, Ghetti said Ionic's data protection layer is independent, providing an additional layer of security. "So your data is actually encrypted and protected while you're creating it in whatever environment you are creating the data," Ghetti said. "You are independently protected while data is going through a TLS tunnel or sitting on a hard drive."Ionic Security is currently in stealth mode, with plans to emerge in the first half of 2015. "We're months away from coming out of stealth," Ghetti said. Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.
As such, if there is a man-in-the-middle (MiTM) attack against TLS or if the hard drive encryption key is stolen, it doesn't matter for Ionic Security users, since the actual data was encrypted before it ever entered the tunnel or was stored on the hard drive.