Xactly Partners With Protegrity To Enhance Cloud Security Of Its SaaS Incentive Compensation Application

Protegrity today announced a partnership with incentive compensation vendor Xactly that allows Xactly customers to benefit from Protegrity’s suite of cloud security products and services. Protegrity’s Cloud Gateway uses tokenization or encryption to protect customer data before it traverses a SaaS, cloud-based infrastructure. The Protegrity solution bolsters the security of SaaS applications by delivering enhanced data protection based on encryption, tokenization and cloud monitoring functionality. The solution also features an enterprise-grade key management solution that provides a comprehensive and automated approach to storing encryption keys while ensuring that the key tokens reside outside the purview of the cloud within a safe but readily accessible location. Today’s announcement means that Protegrity adds Gartner leader in the 2015 Magic Quadrant for Sales Performance Management, Xactly, to a list of supported SaaS platforms that includes Box and Salesforce. Meanwhile, Xactly stands to benefit from giving its customers the assurance that its platform for delivering HR-based incentive compensation frameworks complies with rigorous and battle-tested standards for cloud security. The larger significance of the Protegrity Cloud Gateway consists in its ability to empower organizations with sensitive data to build SaaS applications that can achieve compliance with protocols such as HIPAA and HITECH, PCI and others. The partnership between Protegrity and Xactly illustrates the intensity of the desire for cloud security solutions on one hand, and the corresponding market response from vendors such as Protegrity to deliver turnkey cloud security products that deliver the requisite security needs in conjunction with the operational simplicity and scalability demanded by contemporary enterprise customers. Expect Protegrity to continue expanding its roster of SaaS partnerships as SaaS applications that utilize sensitive data proliferate and require correspondingly robust cloud security frameworks.


Vormetric Introduces Tokenization And Data Masking Solution To Its Data Security Platform

Today, data security solution provider Vormetric announces the release of Vormetric Tokenization with Dynamic Data Masking on the Vormetric Data Security Platform. Vormetric Tokenization enables the protection of sensitive data by creating a bridge between sensitive data and a randomly generated data point that substitutes for the original data. For example, Vormetric Tokenization allows customers that process credit cards to create a proxy data point with a 1-1 correspondence to each credit number received in transactional data processing. Customers can use the proxy data point to mask the original credit number and thereby reduce the risk of credit fraud. The keys to the castle that allow customers to decode the link between the tokenized, proxy data and the original data are kept in the Vormetric platform’s Token Vault that enjoys multiple layers of protection and data security. By centralizing access to the bridge between sensitive data and deidentified data via its Token Vault, Vormetric’s Tokenization and Data Masking solution reduces the scope of compliance-related audits. As a result, Vormetric’s Tokenization solution saves organizations the operational cost of ensuring the entire IT infrastructure responsible for processing sensitive data achieves compliance standards by shrinking the target area for the audit to the Token Vault. In all, Vormetric’s Tokenization with Dynamic Data Masking product complements its existing Vormetric Transparent Encryption solution for the protection of data at rest as well as its Application Encryption solution for implementing encryption at the level of an entire application or library of applications. As such, the tokenization solution strengthens Vormetric’s portfolio of offerings for ensuring the security of data at rest and consolidates Vormetric’s leadership in the data security space related to protecting the security of data at rest in on premise, cloud and Big Data environments.