• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Wednesday, April 15, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » HP Adds Encryption Capabilities for On-Premise and Cloud Data

HP Adds Encryption Capabilities for On-Premise and Cloud Data

June 10, 2014
in All
A A

HP announced new encryption capabilities for data at rest, in motion or in use—across cloud, on-premises and mobile environments. The new HP Atalla solutions deliver advanced protection for data stored on-premises and in the cloud, as well as unstructured data such as confidential emails, payment information and electronic health records. Some highlights of the announcement:

  • HP Secure Encryption with HP Enterprise Secure Key Manager (ESKM) 4.0 unifies and automates encryption controls across a distributed infrastructure.  It secures and manages encryption keys without slowing server performance and also fully supports the OASIS Key Management Interoperability Protocol (KMIP), bringing open standards to encryption key management.
  • HP Atalla Cloud Encryption reduces the complexity of encryption and key management in public, private and hybrid cloud environments with split-key encryption, a method for combining and splitting keys during the encryption process. In addition, customers can leverage integration with HP Enterprise Secure Key Manager to automatically manage and protect master keys on-premises in FIPS 140-2 Level 2 validated security appliances.
  • HP Atalla Information Protection and Control (IPC) software protects sensitive enterprise data at every stage of the data life cycle—from creation to collaboration to storage. The software uses an information-centric encryption approach that applies persistent protection to follow the data throughout its life cycle, no matter where it resides. The encryption technology is easily incorporated into business processes without adding complexity or time consuming and costly integration.

http://www.hp.com

Tags: Blueprint columnsCyber SecurityHP
ShareTweetShare
Previous Post

Docker 1.0 Positioned as Standardized Container for Movable Apps

Next Post

Ixia Debuts 400GbE Test Platform

Staff

Staff

Related Posts

Blueprint: Brazil looks to municipal Wi-Fi 6E
Blueprints

Blueprint: Brazil looks to municipal Wi-Fi 6E

February 21, 2023
Blueprint: Building wholesale networks with OTN
All

Blueprint: Building wholesale networks with OTN

December 20, 2022
Oracle opens cloud region in Chicago
All

Oracle opens cloud region in Chicago

December 20, 2022
BT trials C-RAN in Leeds
All

BT trials C-RAN in Leeds

December 19, 2022
T-Mobile builds cloud native 5G converged core with Cisco
All

T-Mobile builds cloud native 5G converged core with Cisco

December 15, 2022
Meta halts data center expansion construction in Denmark
All

Meta halts data center expansion construction in Denmark

December 15, 2022
Next Post
Ixia Debuts 400GbE Test Platform

Ixia Debuts 400GbE Test Platform

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version