GhangorCloud Debuts Information Security, Compliance Enforcer

The Information Security Enforcer Version 1.5 provides protection of data throughout the enterprise through its ability to mitigate data compliance risks.

GhangorCloud and it security

GhangorCloud announced its official company and product launch with the Information Security Enforcer (ISE) family of turnkey appliances.

The company was founded and is led by Silicon Valley security specialist Tarique Mustafa, and is backed by a team, board and advisors that include representatives from Symantec, McAfee, Trend Micro, Cisco, Juniper, Alteon and Array Networks.

The Information Security Enforcer Version 1.5 provides enterprise data protection, mitigating data compliance and leakage risks, including malicious theft and the misuse of mission critical information.

The product provides complete enforcement of various industry regulations, including HIPAA, GLBA, SOX, PCI, and PII. The platform is designed to be flexible and adapt to new compliance requirements in the future, the company said.

"Information security and compliance is becoming increasingly more important for businesses and government organizations as the incidents of malicious insider attacks against confidential mission critical information is on the rise day in and day out," Mustafa told week. "Horror stories about theft of large quantities of confidential, mission critical and compliance- regulated data and information have become a routine occurrence, causing severe damages to the businesses and brand names."

Mustafa noted that major incidents of theft and leakage of highly sensitive information from major governmental organizations, such as the WikiLeaks and Snowden incidents, have caused irreparable damages to governments and national security agencies.

The ISE solution provides the ability to automatically identify, categorize and classify the relevant content, data and information that needs to be protected in real-time, he said.

Automated identification and classification of confidential and sensitive data is performed, even for newly- created “virgin” data, he said.

In addition, the company’s patent-pending automated policy synthesis technology automatically creates relevant, granular and easily understandable policies for the organization.

Information security technology is bound to evolve in two major areas in the near future, Mustafa said.

These first is the emergence of new and improved technology for centralized control of data and information identification and classification in real-time. The second is in the area of better and more holistic methodologies for compliance enforcement in automated fashion with minimal human intervention.

"With the advent of Advanced Persistent Threats (APTs) and targeted attacks against data and information repositories, the industry will have to devise more effective technologies to detect and prevent data exfiltration in real-time," he said.