Bracket Computing advancements boost enterprise cloud security control

Computing Cell software encrypts data, protects the keys with policies.

Bracket Computing is expanding its cloud-storage data protection offerings and has received an additional $46.4 million in venture funding to further develop its products and roll them out worldwide.

Now in addition to Bracket’s Computing Cell service, customers can license an in-house version of the technology and control all aspects of the encryption/policy enforcement/data integrity platform.

+ More on Network World: Gartner: Risk, relentless data center demand, open source and other tech trends IT needs to know +

Computing Cell is software beneath the operating system that provides a single security and management layer that applies to data no matter where it resides, and that includes data stored in multiple public clouds, says Bracket CEO Tom Gillis.

All the data stored is 256 AES encrypted and customers maintain custody of the master keys in hardware security modules. Computing Cell policies enable deriving the necessary keys to decrypt data if the intended use meets policies, Gillis says.

The software also maintains a check-sum of encrypted data in order to verify it hasn’t been tampered with before it is decrypted. The same capability can verify the integrity of boot disks and master images stored in the cloud, he says.

The upside is that Computing Cell imposes security and management without requiring any changes to the applications being run on the machines, says Peter Christy, an analyst with 451 Research. The policy plane enables creation of security domains that span the various clouds where data might be stored, he says.

+More on Network World: Startup wants to make cloud attractive for security-sensitive businesses+

The whole security/management process is invisible to end users, he says, making it more appealing.

Pricing for the software license is based on number of cores it runs on. Pricing for the service is based on CPUs per hour and Gigabytes per month of storage.

The new round of funding comes from Fidelity Management and Research Company and Goldman Sachs as well as previous investors Allegis Capital, Andreessen Horowitz, ARTIS Ventures, Columbus Nova Technology Partners, Norwest Venture Partners, and Sutter Hill Ventures, plus strategic investors GE and Qualcomm. The total investment is now $131.4 million.

The company, based in Mountain View, Calif., was founded in October 2011 by Gillis and CTO Jason Lango. Gillis is the former vice president/general manager of Cisco's Security Technology Group, and Lango was in charge of network security and firewall product architecture as principal engineer also in Cisco's Security Technology Group. In addition Gillis, Lango and Brackett’s CFO, vice president of marketing, vice president of sales and vice president of customer service all worked for IronPort, which was sold to Cisco.

Join the CSO newsletter!

Error: Please check your email address.

Tags encryption

More about AllegisCiscoGartnerGEGoldmanIronPortMountain ViewNorwestQualcommTechnology

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Tim Greene

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place