IONU Launches Data-Centric Security Platform

 
 
By Nathan Eddy  |  Posted 2015-07-30 Print this article Print
 
 
 
 
 
 
 
ionu and it security

The company’s data-centric platform protects sensitive data residing on or traveling to and from mobile devices within and outside of the firewall.

IONU announced the launch of its data-centric Security Platform, which is designed to protect data at all times while allowing it to flow freely and securely anywhere, without the need for plug-ins, proxies, gateways or changes in user behavior.

The company’s data isolation platform creates a separate and secure zone where data is insulated from the outside world.

A suite of secure applications allow users to communicate, share and store protected data, and the platform secures any third-party cloud applications such as Dropbox, Box, Google Drive and Microsoft OneDrive.

"With the explosion of BYOD devices and the large amounts of data being shared across different partner and supply chain networks, it became obvious that perimeter based security solutions were no longer adequate," Clay Johnson, CEO of IONU, told eWEEK. "In order to provide the combination of security and ease-of-use necessary for broad-based deployment we knew that a new security platform had to be developed from the ground up. We also saw that threat-based solutions were far too reactive."

Johnson said what was needed was a proactive approach to persistent security that didn’t determine where data can go but protected it no matter where it went.

The company’s data-centric platform protects sensitive data residing on or traveling to and from mobile devices within and outside of the firewall.

With IONU’s key management technology, no single entity carries sufficient information to access encrypted data.

A combination of proprietary technologies ensures only registered and authenticated users can securely access and edit files across the entire business ecosystem.

For example, superior authentication technologies such as hashing and salting, combined with user- and device-specific controls, safeguard against authentication attacks such as "brute force" and "man in the middle.”

"In the future it will become more and more essential that security travels with data versus being tied to a platform or store in which data resides," Johnson explained. "We’re just beginning to see the onslaught of viruses targeting mobile devices – once these become more prevalent, the threat landscape will increase dramatically and become more difficult to secure and protect. This makes it more essential that persistent security measures to travel with files are put in place versus measures that tried to prevent or detect existing threats."

According to a report released earlier this year by analyst and accounting firm PricewaterhouseCoopers (PwC), the number of reported information security incidents around the world rose 48 percent to 42.8 million in 2014--the equivalent of 117,339 attacks per day.

Detected security incidents have increased 66 percent year-over-year since 2009, the survey found.

 

 
 
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel