Secure Islands

Last updated

Secure Islands Technologies Ltd.
Company type Subsidiary of Microsoft
Industry Computer software
technology company
Information privacy
Founded2006;18 years ago (2006)
5 Menachem Begin Ave., Beit Dagan, Israel
FoundersAki Eldar, Yuval Eldar
Headquarters
5 Menachem Begin Ave., Beit Dagan
,
Israel
Area served
Worldwide
Key people
Aki Eldar, CEO
Yuval Eldar, President
Parent Microsoft

Secure Islands Technologies Ltd. was an Israeli privately held technology company headquartered in Beit Dagan which was subsequently acquired by Microsoft. [1] The company develops and markets Information Protection and Control (IPC) solutions. [2]

Contents

Secure Islands Technologies Ltd. was founded by two brothers, Aki and Yuval Eldar, in late 2006, to develop and sell advanced data security solutions. The then Jerusalem-based start-up company suggested a new solution for data protection: embedding security directly in data. [3] Secure Islands builds software designed to classify sensitive information automatically based on policies outlined by an enterprise, and then to wrap it in the appropriate level of Digital rights management (DRM). [4]

About Secure Islands Technologies Ltd.

Microsoft acquired Israeli cyber-sec startup Secure Islands in 2015. [5] [6]

Technology

Secure Islands Technologies Ltd. software is based on its active data immunization concept. [7] Secure Islands’ Data Immunization technology uniquely embeds protection within information itself at the moment of creation or initial organizational access. This process is automatic and accompanies sensitive information throughout its lifecycle from creation, through usage and collaboration to storage and archival. [8] [9]

The company's IQProtector product, [10] which is cloud-based, classifies unstructured data [11] [12] and automates IRM by classification at endpoints. [13] [14]

See also

Related Research Articles

Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning that is distinct from the field of confidential computing. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by computer hardware and software. Enforcing this behavior is achieved by loading the hardware with a unique encryption key that is inaccessible to the rest of the system and the owner.

<span class="mw-page-title-main">McAfee</span> American global computer security software company

McAfee Corp., formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company headquartered in San Jose, California.

<span class="mw-page-title-main">Trend Micro</span> Japanese multinational cyber security company

Trend Micro Inc. is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.

<span class="mw-page-title-main">ESET</span> Slovak internet security company

ESET, s.r.o., is a software company specializing in cybersecurity. ESET's security products are made in Europe and provide security software in over 200 countries and territories worldwide. Its software is localized into more than 30 languages.

<span class="mw-page-title-main">HP Autonomy</span> British software company

HP Autonomy, previously Autonomy Corporation PLC, was an enterprise software company which was merged with Micro Focus in 2017 and OpenText in 2023. It was founded in Cambridge, United Kingdom in 1996.

End-to-end encryption (E2EE) is a private communication system in which only communicating users can participate. As such, no one, including the communication system provider, telecom providers, Internet providers or malicious actors, can access the cryptographic keys needed to converse.

<span class="mw-page-title-main">Check Point</span> Israeli security company

Check Point Software Technologies Ltd. is an American-Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management.

Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet.

Active Directory Rights Management Services is a server software for information rights management shipped with Windows Server. It uses encryption and a form of selective functionality denial for limiting access to documents such as corporate e-mails, Microsoft Word documents, and web pages, and the operations authorized users can perform on them. Companies can use this technology to encrypt information stored in such document formats, and through policies embedded in the documents, prevent the protected content from being decrypted except by specified people or groups, in certain environments, under certain conditions, and for certain periods of time. Specific operations like printing, copying, editing, forwarding, and deleting can be allowed or disallowed by content authors for individual pieces of content, and RMS administrators can deploy RMS templates that group these rights together into predefined rights that can be applied en masse.

Altium Limited is an American- Australian multinational software company that provides electronic design automation software to engineers who design printed circuit boards. Founded as Protel Systems Pty Ltd in Australia in 1985, the company has regional headquarters in the United States, Australia, China, Europe, and Japan. Its products are designed for use in a Microsoft Windows environment and used in industries such as automotive, aerospace, defence and telecommunications. Its flagship product, Altium Designer, is a software for unified electronics design.

Information rights management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or Enterprise Digital Rights Management. This can cause confusion, because digital rights management (DRM) technologies are typically associated with business-to-consumer systems designed to protect rich media such as music and video. IRM is a technology which allows for information to be ‘remote controlled’.

The Opal Storage Specification is a set of specifications for features of data storage devices that enhance their security. For example, it defines a way of encrypting the stored data so that an unauthorized person who gains possession of the device cannot see the data. That is, it is a specification for self-encrypting drives (SED).

<span class="mw-page-title-main">Linoma Software</span>

Linoma Software was a developer of secure managed file transfer and IBM i software solutions. The company was acquired by HelpSystems in June 2016. Mid-sized companies, large enterprises and government entities use Linoma's software products to protect sensitive data and comply with data security regulations such as PCI DSS, HIPAA/HITECH, SOX, GLBA and state privacy laws. Linoma's software runs on a variety of platforms including Windows, Linux, UNIX, IBM i, AIX, Solaris, HP-UX and Mac OS X.

<span class="mw-page-title-main">Mimecast</span> Jersey-domiciled information technology company

Mimecast Limited is an American–British, Jersey-domiciled company specializing in cloud-based email management for Microsoft Exchange and Microsoft Office 365, including security, archiving, and continuity services to protect business mail.

PKWARE, Inc. is an enterprise data protection software company that provides discovery, classification, masking and encryption software, along with data compression software. It is used by organizations in a range of industries including financial services, manufacturing, military, healthcare and government. The company's products are intended to assist other companies in complying with various data protection regulations such as GDPR and CCPA. The company is headquartered in Milwaukee, Wisconsin with additional offices in the US, UK, and India.

<span class="mw-page-title-main">G Data CyberDefense</span> German software company

G Data CyberDefense AG is a German software company that focuses on computer security. The company was founded in 1985 and is headquartered in Bochum. They are known for being the creators of the world's first antivirus software. G Data uses multiple scanning engines; one is developed in-house and the other is the Bitdefender engine. G Data provides several security products that are targeted at home and business markets. The company has a North American subsidiary located in Newark, Delaware.

<span class="mw-page-title-main">Tuxera</span> Finnish software company

Tuxera Inc. is a Finnish company that develops and sells file systems, flash management and networking software. The company was founded in 2008 and is headquartered in Espoo, Finland. Tuxera's other offices are located in the US, South Korea, Japan, Hungary, Germany, Taiwan and China.

<span class="mw-page-title-main">Netwrix</span>

Netwrix is a Frisco, Texas-based private IT security software company that develops software to help companies identify and secure sensitive data and assist with compliance auditing. After eight acquisitions the company's team geographically expanded to Latin America, UK, Germany, France, Asia, USA as well as other countries. The company's flagship products are Netwrix Auditor and StealthAUDIT that help information security and governance professionals manage sensitive, regulated and business-critical data.

Absolute Software Corporation is an American-Canadian company that provides products and services in the fields of endpoint security and zero trust security. It was publicly traded company on the Toronto Stock Exchange (TSX) and Nasdaq until it was acquired by Crosspoint Capital Partners in July 2023.

Vera is an enterprise data security and information rights management platform that provides encryption and tracks and controls digital information shared across users, devices, applications, and platforms. Vera gives developers access to its IRM-as-a-service (IRMaaS) platform via a REST API and downloadable software development kit.

References

  1. "Microsoft Acquired Secure Islands". PCMan.com. November 16, 2015. Archived from the original on October 31, 2018. Retrieved October 30, 2018. One of Microsoft's plans ... is .. acquiring Secure Islands Technologies Ltd.
  2. "Secure Islands' Technology". Archived from the original on October 31, 2015. Retrieved November 5, 2015.
  3. "Secure Islands protects files with embedded classification, encryption". NetworkWorld.com. February 9, 2015. Yuval Eldar of Secure Islands Technologies can relate to his customers' needs. Before starting up Secure Islands, Eldar was an R&D manager ...
  4. "Forbes How To Protect A Company's Data". Archived from the original on November 17, 2015. Retrieved November 5, 2015.
  5. "Secure Islands Technologies Ltd.: Private Company Information". Bloomberg.com.
  6. "Microsoft is set to acquire Israeli cyber-sec startup Secure Islands for $100-150 million". Archived from the original on October 26, 2015. Retrieved November 5, 2015.
  7. "RSA Conference 2015". Slidex.tips. April 20, 2015. at the moment of creation
  8. "About Secure Islands Technologies Ltd". Archived from the original on October 31, 2015. Retrieved November 5, 2015.
  9. "Secure Islands: 'Immunizing' corporate data as soon as it is created". ZDNet . Retrieved November 5, 2015.
  10. "IQProtector - Document Security". NetworkTestingLabs.com.
  11. "Secure Islands IQProtector Suite - Enterprise Encryption Software". July 16, 2015. Persistent Data Classification ... IQProtector
  12. "Classification". Archived from the original on November 13, 2015. Retrieved November 5, 2015.
  13. "IQProtector enterprise" (PDF). IQProtector Enterprise's endpoint agent ... all information created on or leaving ...
  14. "Information Rights Management (IRM)". Archived from the original on November 8, 2015. Retrieved November 5, 2015.