|By PR Newswire||
|February 26, 2013 11:28 AM EST||
SAN FRANCISCO, Feb. 26, 2013 /PRNewswire/ -- ShareVault, the leader in secure document sharing for enterprise applications, and NetAuthority, Inc., the leader in strong authentication solutions for trusted Internet-connected devices and transactions, announced today a customer and partner agreement for ShareVault to offer NetAuthority's advanced access control and identify verification capabilities to ShareVault's enterprise customers and partners.
ShareVault enables corporations to maintain control of and protect critical information shared among internal users and third parties outside the corporate domain. Used to securely share documents and track their access, ShareVault reduces information leakage risk while enabling collaboration among internal and external groups with support for Windows, Macintosh and iPad devices. ShareVault is used for applications in the financial services, bioPharma life sciences, legal services, energy/natural resources and other industries for mergers and acquisitions, fund raising, distressed asset sales, litigation support, corporate compliance, partnering applications.
In addition, with its ShareVault for SharePoint offering, corporations can also create a separate environment to securely share selected information from multiple SharePoint sites with external parties. ShareVault integration with SharePoint requires no software modifications to SharePoint while allowing an independent layer of user permissions and real time tracking and audit trail reporting.
NetAuthority's capabilities will enhance ShareVault's advanced and proprietary security architecture and features for document sharing by adding powerful, patented device identification and authentication capabilities that irrefutably prove the identify of a device connecting to a ShareVault secure document sharing service. With NetAuthority's solution in place, devices, in addition to the users themselves, must prove their identity before accessing critical corporate data stored, managed, and shared from within ShareVault. With the end-to-end integrated solution, the device will be required to authenticate itself using a device key generated by NetAuthority that cannot be spoofed and can irrefutably identify and authenticate the device based on key characteristics, all of which is invisible to the user and does not require any manual interaction. The system prevents security breaches as well as provides zero-day protection against automated man-in-the-middle and man-in-the-browser attacks through irrefutable transaction verification.
Richard Andersen, ShareVault CEO, said:
"With NetAuthority's patented irrefutable device identification and authentication solution, we are building on our security model to mitigate another critical risk related to Internet-connected devices in the workplace: to ensure that only authorized users and verified devices can access, store and share critical company data and assets. All this, without impacting the user-experience in working with ShareVault."
Chris Brennan, NetAuthority CEO and founder, said:
"We're excited to be working with ShareVault as both a customer and partner. More and more companies are storing and managing critical and sensitive corporate data and assets in the cloud. When this trend is coupled with the explosive growth in Internet-connected devices and escalating number of impersonation attacks to gain unauthorized access, it's increasingly clear that there is a significant need for device-centric strong authentication to mitigate these threats. In implementing NetAuthority's solution, ShareVault, as a leader in secure document sharing and collaboration, will now be able to offer irrefutable device identification and authentication to protect its enterprise customers from today's rapidly-changing threat environment."
NetAuthority is the leader in strong authentication solutions for trusted Internet-connected devices and transactions. Our solution secures information and financial assets, assures user confidence that drives business, and protects assets and brand equity. NetAuthority's patented device-centric methods provide irrefutable accuracy with best in class security, ease of use and value. For more information, visit www.NetAuthority.com.
ShareVault is a leader in secure document sharing cloud services for enterprise applications requiring centralized control and tracking of user access. Our solution reduces information leakage risk and supports collaboration across departments and external parties. Customers have successfully used ShareVault for M & A, fund raising, corporate repository & compliance, distressed asset sales, IPO, litigation support and partnering applications. ShareVault is used in a variety of industries including financial services, bioPharma and life science, energy and natural resources, and legal services. For more information visit www.sharevault.com
Nadel Phelan, Inc.
SOURCE NetAuthority, Inc.
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
Jul. 25, 2016 08:00 PM EDT Reads: 1,955
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, gave users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion with b...
Jul. 25, 2016 08:00 PM EDT Reads: 1,891
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
Jul. 25, 2016 07:30 PM EDT Reads: 1,878
We all know the latest numbers: Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from last year, and will reach 20.8 billion by 2020. We're rapidly approaching a data production of 40 zettabytes a day – more than we can every physically store, and exabytes and yottabytes are just around the corner. For many that’s a good sign, as data has been proven to equal money – IF it’s ingested, integrated, and analyzed fast enough. Without real-ti...
Jul. 25, 2016 07:15 PM EDT Reads: 986
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., and Logan Best, Infrastructure & Network Engineer at Webair, focused on real world deployments of DDoS mitigation strategies in every layer of the network. He gave an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He also outlined what we have found in our experience managing and running thousands of Linux and Unix ...
Jul. 25, 2016 07:15 PM EDT Reads: 1,742
In his session at @DevOpsSummit at 19th Cloud Expo, Yoseph Reuveni, Director of Software Engineering at Jet.com, will discuss Jet.com's journey into containerizing Microsoft-based technologies like C# and F# into Docker. He will talk about lessons learned and challenges faced, the Mono framework tryout and how they deployed everything into Azure cloud. Yoseph Reuveni is a technology leader with unique experience developing and running high throughput (over 1M tps) distributed systems with extre...
Jul. 25, 2016 07:15 PM EDT Reads: 2,080
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 25, 2016 07:15 PM EDT Reads: 1,791
"Operations is sort of the maturation of cloud utilization and the move to the cloud," explained Steve Anderson, Product Manager for BMC’s Cloud Lifecycle Management, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 25, 2016 07:00 PM EDT Reads: 1,878
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
Jul. 25, 2016 06:15 PM EDT Reads: 431
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Jul. 25, 2016 06:15 PM EDT Reads: 1,742
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Jul. 25, 2016 06:00 PM EDT Reads: 2,075
"Software-defined storage is a big problem in this industry because so many people have different definitions as they see fit to use it," stated Peter McCallum, VP of Datacenter Solutions at FalconStor Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 25, 2016 06:00 PM EDT Reads: 1,421
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Jul. 25, 2016 06:00 PM EDT Reads: 2,412
Actian Corporation has announced the latest version of the Actian Vector in Hadoop (VectorH) database, generally available at the end of July. VectorH is based on the same query engine that powers Actian Vector, which recently doubled the TPC-H benchmark record for non-clustered systems at the 3000GB scale factor (see tpc.org/3323). The ability to easily ingest information from different data sources and rapidly develop queries to make better business decisions is becoming increasingly importan...
Jul. 25, 2016 05:30 PM EDT Reads: 762
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Jul. 25, 2016 04:00 PM EDT Reads: 1,002
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Jul. 25, 2016 03:45 PM EDT Reads: 952
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Jul. 25, 2016 03:30 PM EDT Reads: 1,691
Ixia (Nasdaq: XXIA) has announced that NoviFlow Inc.has deployed IxNetwork® to validate the company’s designs and accelerate the delivery of its proven, reliable products. Based in Montréal, NoviFlow Inc. supports network carriers, hyperscale data center operators, and enterprises seeking greater network control and flexibility, network scalability, and the capacity to handle extremely large numbers of flows, while maintaining maximum network performance. To meet these requirements, NoviFlow in...
Jul. 25, 2016 03:15 PM EDT Reads: 438
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 25, 2016 03:00 PM EDT Reads: 1,971
The competitive landscape of the global cloud computing market in the healthcare industry is crowded due to the presence of a large number of players. The large number of participants has led to the fragmented nature of the market. Some of the major players operating in the global cloud computing market in the healthcare industry are Cisco Systems Inc., Carestream Health Inc., Carecloud Corp., AGFA Healthcare, IBM Corp., Cleardata Networks, Merge Healthcare Inc., Microsoft Corp., Intel Corp., an...
Jul. 25, 2016 02:30 PM EDT Reads: 877