“It stores the keys separately from the data items and encrypts the links between them,” says Oggy Vasic, senior vice president of software development for Eruces. The authentication and authorization part of the key process is aimed at protecting data from outside attacks as well as for preventing insider attacks, such as a malicious employee snooping into the database or siphoning information off of a storage device, he says.
Jon Oltsik, senior analyst for information security at the Enterprise Strategy Group, says the Tricryption technology approach could provide a more cohesive way to manage encrypted data replication. “The value I see is the potential for a single encryption service for multiple applications like encrypting storage, file systems, databases, and applications,” Oltsik says.
Technology alone won’t win this battle, it will take security standards, partnerships, and enterprise sales, and marketing,” he says.
Encryption expert Nate Lawson, principal with Root Labs, says Eruces’s approach in part is based on its central key server handling all keys. “They’re saying [they] only hand out a few keys at a time, so therefore it’s hard to get access to [their] keys,” he says.
Eruces, meanwhile, plans to expand its OEM strategy — Crossroads Systems, for example, OEMs Tricryption for its TapeSentry and SecureVTS storage products.
http://www.darkreading.com/document.asp?doc_id=154039&WT.svl=news2_1