Company Logo

10 Best Big Data Companies 2017

Proven Protection for Your Sensitive Regulated and Business Information: Zettaset

Proven Protection for Your Sensitive Regulated and Business Information: Zettaset

Zettaset, the leader in Big Data security, is an ISV that provides proven enterprise-class encryption solutions which are compatible with Hadoop, NoSQL, and Relational database environments. Zettaset advanced data encryption, access-control, and integrity solutions are uniquely designed and optimized for scale and performance in today’s complex and demanding distributed-computing environments. Customers rely on Zettaset to deliver advanced Big Data security solutions that are simple to deploy and easy to fit into existing IT security and policy frameworks.


The distributed computing architectures which are the foundation for today’s massive datacenter and cloud deployments have been adopted for practical reasons. By using a cluster of multiple commodity servers, desired levels of performance can be achieved much more cost-effectively vs. using a single, large, high-end computer. Distributed systems also reduce single-points-of-failure, and are ideal for elastic cloud environments that support massive volumes of structured and unstructured content.

However, distributed computing architectures also create unique data security challenges which can only be addressed by solutions that are specifically optimized for distributed systems. Legacy data security solutions were not designed for these dynamic architectures, expose individual nodes/servers to attack, and can negatively impact application performance in high-volume environments.

In today’s competitive economy, data is the primary asset enterprises and individuals possess. In cloud computing, the foremost user concerns revolve around data integrity, confidentiality and privacy. The only way to secure databases on virtual machines or in cloud environments, without sacrificing the huge benefits of these new architectures, is to use software-based solutions that share the elasticity of virtual machines and cloud computing.

Zettaset provides advanced, software-based data encryption solutions that are optimized for petabyte-scale data center and cloud deployments. Zettaset’s encryption solutions are compatible with Object, Relational/SQL, NoSQL, and Hadoop data stores.

  • Zettaset’s XCrypt line of encryption products that protect and assure the integrity of an organization’s most sensitive information, on-premises and in the cloud
  • Enterprise customers can rely on Zettaset to deliver advanced data encryption solutions that deliver performance and scalability, while easily fitting into existing enterprise IT security and policy frameworks

Look no further than Zettaset

XCrypt Cloud Encryption Platform: Zettaset XCrypt Cloud Encryption Platform is an advanced data protection platform for Big Data in the cloud that addresses the growing concern over cloud service providers’ dual role of storing encrypted data and having access to encryption keys, and the exposure it creates for unauthorized decryption of sensitive data.

Ideal for organizations with strict data privacy mandates and regulated compliance requirements, the XCrypt Cloud Encryption Platform from Zettaset ensures that cloud service providers know nothing about the content of encrypted customer data or customer keys.

XCrypt™ provides enterprise customers with full client-side encryption control of all data hosted in cloud storage environments as well as data transferring between the enterprise and cloud.

The initial release of the XCrypt Cloud Encryption Platform supports users of Amazon Simple Storage Service (S3), an object-based data store. The Zettaset XCrypt solution is extensible, with support for other cloud services and data stores available in 2017.

XCrypt Cloud Encryption Platform Highlights

  • Provides enterprise customers with complete client-side control of all encryption processes and services between the enterprise and the cloud, including key management and data protection
  • Eliminates the need to surrender ownership and control of data and keys to cloud service providers or any other third parties
  • Provides a single point of control for integrated Zettaset Big Data Encryption Suite, including encryption software, virtual key manager and virtual hardware security module
  • Protects data in-motion and data at-rest
  • Integrates with existing standards-based security infrastructure, including KMIP-compliant key managers and PKCS#11-compliant hardware security modules
  • User-defined policy determines what data is encrypted and level of key granularity
  • All-software solution simplifies deployment, easily scales, and delivers exceptional price/performance

Cloud adoption is transforming business, providing organizations with greater agility and unprecedented economies of scale. According to a recent IDG Enterprise cloud computing survey, 70% of respondents have already moved at least one application or a portion of their infrastructure to the cloud. However, the security of cloud computing solutions remains a top concern.

With the XCrypt Cloud Encryption Platform, Zettaset extends advanced big data encryption capabilities into the cloud, providing organizations with complete control over cloud encryption services, including key management.

Enterprises no longer need to share encryption keys with cloud service providers or any other outside entity, and can securely transition their most sensitive data into the cloud with greater confidence.

Zettaset Big Data Encryption Suite

The increased frequency and sophistication of high-profile data breaches and malicious hacking is putting organizations at continued risk of data theft and significant business disruption. Complicating this scenario is the unbounded growth of Big Data and petabyte-scale data storage, new open source database and distribution schemes like Hadoop and NoSQL, and the continued adoption of cloud services by enterprises. This momentum is breaking down the traditional perimeter, forcing organizations to look at security differently, with the focus shifting from the perimeter to the data that needs to be protected. The Zettaset Big Data Encryption Suite has been designed for optimal performance and scalability in distributed Big Data systems like Hadoop and other NoSQL databases.

Zettaset Big Data Encryption Key Management

Zettaset delivers a software based encryption solution that can readily match the elasticity of virtual machines and cloud computing. As virtual machines running the database are provisioned (and de-provisioned) to balance capacity needs, no manual intervention is required at the management console. Deploying software-based key managers and HSMs is more cost-effective and less disruptive than traditional hardware approaches in highly elastic cloud environments, offering power users greater operational efficiencies.

The Zettaset Big Data Encryption Suite includes a virtual key manager, HSM, and encryption software that can be easily added to a virtual machine or cloud when and where needed.

  • Zettaset V-EKM™ (Virtual Enterprise Key Manager) is a software-based key manager that automates the management and control of policies that protect and control access to business-critical encryption keys.
  • Zettaset V-HSM™ (Virtual Hardware Security Module) is a software-based HSM that securely stores the master key and master hash key used to encrypt and hash the contents of the key manager database.

Zettaset encryption systems software includes BDEncrypt™ for high-performance disk encryption, and BDEncrypt Plus™ for file-level encryption plus data integrity protection against unauthorized data manipulation.

Efficiently and Securely Manage and Store Cryptographic Keys: Zettaset enables organizations to efficiently and securely manage and store cryptographic keys and policies throughout the key management lifecycle in the enterprise. Zettaset can deliver layered encryption for file, zone, directory and partition levels, depending on the granularity requirements of the data environment. Key management and encryption can be applied to Hadoop, NoSQL and Relational databases, as well as multiple file and object storage systems.

Full Compatibility with Enterprise Encryption Standards: Every component of the Zettaset Big Data Encryption Suite is fully-compatible with existing Key Management Interoperability Protocol (KMIP) key managers and Public Key Cryptography Standard (PKCS) #11 hardware security module (HSMs), and therefore can fit into any customer environment where these products already exist. The Zettaset V-EKM key manager keeps a database of encryption keys which are encrypted and protected using master keys in HSMs. The master keys are accessed through a PKCS#11-standard interface.

Reliable solutions offered

Healthcare – HIPAA & HITECH Compliance

Healthcare compliance affects every type of healthcare provider and healthcare organization from the solo practitioner to the largest global healthcare conglomerate. Healthcare compliance covers numerous areas including patient care, billing, reimbursement, managed care contracting, and the privacy and security of health records and data.

Two key pieces of US Federal legislation define security compliance requirements for healthcare providers to protect data-at-rest.

  • HIPAA – The US Health Insurance Portability and Accountability act (HIPAA) of 1996
  • HITECH – Health Information Technology for Economic and Clinical Health (HITECH) act, enacted as a part of the American Recovery and Reinvestment Act (ARRA) of 2009

HIPAA sets the standard for protecting sensitive patient data. Any company that deals with protected health information (PHI) must ensure that all the required physical, network, and process security measures are in place and followed. This includes covered entities (CE), anyone who provides treatment, payment and operations in healthcare, and business associates (BA), anyone with access to patient information and provides support in treatment, payment or operations.

The HITECH Act requires HIPAA covered entities to report data breaches affecting 500 or more individuals to HHS and the media, in addition to notifying the affected individuals. This imposes new notification requirements on covered entities, business associates, vendors of personal health records (PHR) and related entities if a breach of unsecured protected health information (PHI) occurs. Zettaset’s advanced data encryption solutions can help healthcare organizations to protect PHR, secure PHI, and meet HIPAA Security Rule and HITECH compliance requirements transparently – without changes to operational processes and the daily work of healthcare professionals.

E-Commerce & Retail – PCI DSS Compliance

Data within big data cloud and data center environments is fluid, as data is replicated in many places and moves as needed. Security must be consistently applied and enforced across a distributed computing environment. Zettaset Big Data Encryption solutions have been designed from the ground up to address the unique big data security challenges presented by these complex, expansive, distributed computing environments.

Payment Card Industry Data Security Standards (PCI DSS) compliance mandates that all organizations that accept, acquire, transmit, process, or store cardholder data must take appropriate steps to continuously safeguard all sensitive customer information.ciobulletin Zettaset Cover 2017

PCI DSS security compliance solutions address encryption, access control, encryption key management and granular logging requirements across multiple use cases within the PCI DSS v3.2 compliance requirements — protecting unstructured files, structured databases as well as specific fields or columns within databases and files across traditional data centers, virtual environments, cloud implementations and big data environments.

The Zettaset Big Data Encryption Suite provides PCI DSS security compliance solutions that secure and control enterprise data at rest, addressing critical portions of the PCI DSS v3.2 compliance control set for PCI DSS compliance requirements 3, 4, 7, 8 and 10 while also supporting additional components of the PCI DSS compliance requirements. Zettaset’s advanced data encryption solutions can help e-commerce and online as well as brick-and-mortar retail organizations to meet PCI DSS v3.2 compliance requirements with a transparent, easy-to-deploy, centrally-managed solution set – without changes to operational processes.

Man behind the success

Jim Vogt President and CEO: With 30 years of leadership experience in both start-up and public corporations, Jim Vogt brings a wealth of business and technology expertise to his role as president and CEO of Zettaset. Most recently, Jim served as senior vice president and general manager of the Cloud Services business unit at Blue Coat Systems. Prior to Blue Coat, he served as president and CEO at Trapeze Networks (acquired in August, 2008 by Belden, Inc.). He was also president and CEO at data encryption start-up Ingrian Networks (acquired in April, 2008 by SafeNet). Prior to this, Jim spent 11 years with SynOptics, Bay Networks and Nortel where he held several product line and general management roles, including president of Nortel’s $1.4BN Small Business Solutions group. Jim holds a BS in Electrical Engineering from the University of Nevada, and an MBA from Santa Clara University.

"All Zettaset products are thoroughly tested and certified for interoperability with our strategic security, systems and industry partners."

"Zettaset specializes in Big data security, Enterprise software, Advanced data encryption, High performance and many more"

"Our XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores."

Business News

Recommended News

Most Featured Companies

ciobulletin-aatrix software.jpg ciobulletin-abbey research.jpg ciobulletin-anchin.jpg ciobulletin-croow.jpg ciobulletin-keystone employment group.jpg ciobulletin-opticwise.jpg ciobulletin-outstaffer.jpg ciobulletin-spotzer digital.jpg ciobulletin-virgin incentives.jpg ciobulletin-wool & water.jpg ciobulletin-archergrey.jpg ciobulletin-canon business process services.jpg ciobulletin-cellwine.jpg ciobulletin-digital commerce bank.jpg ciobulletin-epic golf club.jpg ciobulletin-frannexus.jpg ciobulletin-growth institute.jpg ciobulletin-implantica.jpg ciobulletin-kraftpal technologies.jpg ciobulletin-national retail solutions.jpg ciobulletin-pura.jpg ciobulletin-segra.jpg ciobulletin-the keith corporation.jpg ciobulletin-vivolor therapeutics inc.jpg ciobulletin-cox.jpg ciobulletin-lanner.jpg ciobulletin-neuro42.jpg ciobulletin-Susan Semmelmann Interiors.jpg ciobulletin-alpine distilling.jpg ciobulletin-association of black tax professionals.jpg ciobulletin-c2ro.jpg ciobulletin-envirotech vehicles inc.jpg ciobulletin-leafhouse financial.jpg ciobulletin-stormforge.jpg ciobulletin-tedco.jpg ciobulletin-transigma.jpg ciobulletin-retrain ai.jpg
ciobulletin-abacus semiconductor corporation.jpg ciobulletin-agape treatment center.jpg ciobulletin-cloud4wi.jpg ciobulletin-exponential ai.jpg ciobulletin-lexrock ai.jpg ciobulletin-otava.jpg ciobulletin-resecurity.jpg ciobulletin-suisse bank.jpg ciobulletin-wise digital partners.jpg ciobulletin-appranix.jpg ciobulletin-autoreimbursement.jpg ciobulletin-castle connolly.jpg ciobulletin-cgs.jpg ciobulletin-dth expeditors.jpg ciobulletin-form.jpg ciobulletin-geniova.jpg ciobulletin-hot spring it.jpg ciobulletin-kirkman.jpg ciobulletin-matrix applications.jpg ciobulletin-power hero.jpg ciobulletin-rittenhouse.jpg ciobulletin-stt logistics group.jpg ciobulletin-upstream works.jpg ciobulletin-x2engine.jpg ciobulletin-kastle.jpg ciobulletin-logix.jpg ciobulletin-preclinical safety (PCS) consultants ltd.jpg ciobulletin-xcastlabs.jpg ciobulletin-american battery solutions inc.jpg ciobulletin-book4time.jpg ciobulletin-d&l education solutions.jpg ciobulletin-good good natural sweeteners llc.jpg ciobulletin-sigmetrix.jpg ciobulletin-syncari.jpg ciobulletin-tier44 technologies.jpg ciobulletin-xaana.jpg

Latest Magazines

© 2024 CIO Bulletin Inc. All rights reserved.