An editor has nominated this article for deletion. You are welcome to participate in the deletion discussion , which will decide whether or not to retain it. |
Company type | Subsidiary of Microsoft |
---|---|
Industry | Computer software technology company Information privacy |
Founded | 2006 5 Menachem Begin Ave., Beit Dagan, Israel |
Founders | Aki Eldar, Yuval Eldar |
Headquarters | 5 Menachem Begin Ave., Beit Dagan , Israel |
Area served | Worldwide |
Key people | Aki Eldar, CEO Yuval Eldar, President |
Parent | Microsoft |
Secure Islands Technologies Ltd. was an Israeli privately held technology company headquartered in Beit Dagan which was subsequently acquired by Microsoft. [1] The company develops and markets Information Protection and Control (IPC) solutions. [2]
Secure Islands Technologies Ltd. was founded by two brothers, Aki and Yuval Eldar, in late 2006, to develop and sell advanced data security solutions. The then Jerusalem-based start-up company suggested a new solution for data protection: embedding security directly in data. [3] Secure Islands builds software designed to classify sensitive information automatically based on policies outlined by an enterprise, and then to wrap it in the appropriate level of Digital rights management (DRM). [4]
Microsoft acquired Israeli cyber-sec startup Secure Islands in 2015. [5] [6]
Secure Islands Technologies Ltd. software is based on its active data immunization concept. [7] Secure Islands’ Data Immunization technology uniquely embeds protection within information itself at the moment of creation or initial organizational access. This process is automatic and accompanies sensitive information throughout its lifecycle from creation, through usage and collaboration to storage and archival. [8] [9]
The company's IQProtector product, [10] which is cloud-based, classifies unstructured data [11] [12] and automates IRM by classification at endpoints. [13] [14]
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning that is distinct from the field of confidential computing. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by computer hardware and software. Enforcing this behavior is achieved by loading the hardware with a unique encryption key that is inaccessible to the rest of the system and the owner.
McAfee Corp., formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company headquartered in San Jose, California.
Trend Micro Inc. is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.
ESET, s.r.o., is a software company specializing in cybersecurity. ESET's security products are made in Europe and provide security software in over 200 countries and territories worldwide. Its software is localized into more than 30 languages.
HP Autonomy, previously Autonomy Corporation PLC, was an enterprise software company which was merged with Micro Focus in 2017 and OpenText in 2023. It was founded in Cambridge, United Kingdom in 1996.
End-to-end encryption (E2EE) is a private communication system in which only communicating users can participate. As such, no one, including the communication system provider, telecom providers, Internet providers or malicious actors, can access the cryptographic keys needed to converse.
Check Point Software Technologies Ltd. is an American-Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management.
Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet.
Active Directory Rights Management Services is a server software for information rights management shipped with Windows Server. It uses encryption and a form of selective functionality denial for limiting access to documents such as corporate e-mails, Microsoft Word documents, and web pages, and the operations authorized users can perform on them. Companies can use this technology to encrypt information stored in such document formats, and through policies embedded in the documents, prevent the protected content from being decrypted except by specified people or groups, in certain environments, under certain conditions, and for certain periods of time. Specific operations like printing, copying, editing, forwarding, and deleting can be allowed or disallowed by content authors for individual pieces of content, and RMS administrators can deploy RMS templates that group these rights together into predefined rights that can be applied en masse.
Altium Limited is an American- Australian multinational software company that provides electronic design automation software to engineers who design printed circuit boards. Founded as Protel Systems Pty Ltd in Australia in 1985, the company has regional headquarters in the United States, Australia, China, Europe, and Japan. Its products are designed for use in a Microsoft Windows environment and used in industries such as automotive, aerospace, defence and telecommunications. Its flagship product, Altium Designer, is a software for unified electronics design.
Information rights management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or Enterprise Digital Rights Management. This can cause confusion, because digital rights management (DRM) technologies are typically associated with business-to-consumer systems designed to protect rich media such as music and video. IRM is a technology which allows for information to be ‘remote controlled’.
The Opal Storage Specification is a set of specifications for features of data storage devices that enhance their security. For example, it defines a way of encrypting the stored data so that an unauthorized person who gains possession of the device cannot see the data. That is, it is a specification for self-encrypting drives (SED).
Linoma Software was a developer of secure managed file transfer and IBM i software solutions. The company was acquired by HelpSystems in June 2016. Mid-sized companies, large enterprises and government entities use Linoma's software products to protect sensitive data and comply with data security regulations such as PCI DSS, HIPAA/HITECH, SOX, GLBA and state privacy laws. Linoma's software runs on a variety of platforms including Windows, Linux, UNIX, IBM i, AIX, Solaris, HP-UX and Mac OS X.
Mimecast Limited is an American–British, Jersey-domiciled company specializing in cloud-based email management for Microsoft Exchange and Microsoft Office 365, including security, archiving, and continuity services to protect business mail.
PKWARE, Inc. is an enterprise data protection software company that provides discovery, classification, masking and encryption software, along with data compression software. It is used by organizations in a range of industries including financial services, manufacturing, military, healthcare and government. The company's products are intended to assist other companies in complying with various data protection regulations such as GDPR and CCPA. The company is headquartered in Milwaukee, Wisconsin with additional offices in the US, UK, and India.
G Data CyberDefense AG is a German software company that focuses on computer security. The company was founded in 1985 and is headquartered in Bochum. They are known for being the creators of the world's first antivirus software. G Data uses multiple scanning engines; one is developed in-house and the other is the Bitdefender engine. G Data provides several security products that are targeted at home and business markets. The company has a North American subsidiary located in Newark, Delaware.
Tuxera Inc. is a Finnish company that develops and sells file systems, flash management and networking software. The company was founded in 2008 and is headquartered in Espoo, Finland. Tuxera's other offices are located in the US, South Korea, Japan, Hungary, Germany, Taiwan and China.
Netwrix is a Frisco, Texas-based private IT security software company that develops software to help companies identify and secure sensitive data and assist with compliance auditing. After eight acquisitions the company's team geographically expanded to Latin America, UK, Germany, France, Asia, USA as well as other countries. The company's flagship products are Netwrix Auditor and StealthAUDIT that help information security and governance professionals manage sensitive, regulated and business-critical data.
Absolute Software Corporation is an American-Canadian company that provides products and services in the fields of endpoint security and zero trust security. It was publicly traded company on the Toronto Stock Exchange (TSX) and Nasdaq until it was acquired by Crosspoint Capital Partners in July 2023.
Vera is an enterprise data security and information rights management platform that provides encryption and tracks and controls digital information shared across users, devices, applications, and platforms. Vera gives developers access to its IRM-as-a-service (IRMaaS) platform via a REST API and downloadable software development kit.
One of Microsoft's plans ... is .. acquiring Secure Islands Technologies Ltd.
Yuval Eldar of Secure Islands Technologies can relate to his customers' needs. Before starting up Secure Islands, Eldar was an R&D manager ...
at the moment of creation
Persistent Data Classification ... IQProtector
IQProtector Enterprise's endpoint agent ... all information created on or leaving ...