NewswireToday - /newswire/ -
London, United Kingdom, 2009/10/27 - Cachet Software Solutions today announces the formal launch of the GED-i family of Storage Encryption solutions in the UK. GED-i is the most robust storage encryption system available and is used by a number of leading international clients.
Cachet Software Solutions ("Cachet") today announces the formal launch of the GED-I storage encryption solution in the UK. An Israeli-developed product, GED-I is a family of appliances that is unique in providing AES 256 encryption alongside patent-pending additional capabilities for scrambling information to avoid it being re-constituted without the permission of authorized key-holders. Customers include leading defense and military organizations, universities, pharmaceuticals, oil and gas and other companies with sensitive data.
Stuart Kenley, MD of Cachet says "we expect GED-I to be a big winner in the UK – as we have not seen another product that achieves all the same benefits in a single appliance with management software too. Most accounts trying to achieve this level of encryption are faced with building home-grown solutions that are less robust than GED-I and much more costly to implement too.”
The GED-I family will ensure compliance with recent privacy standards such as CA 1386, PCI DSS, DOD 5015.2 and several others. It combines 3 layers of encryption security that pretty much guarantee that no theft or loss of storage data can any longer be a security or privacy risk.
Kenley adds "It seems that this year there has been a big focus on encryption-based security and we think the time is right to bring GED-I to market to satisfy growing customer needs in this space. The recent data losses by the RAF, Department of Work and Pensions, and others, highlight the need to protect data storage in the event that it is lost or stolen, by encrypting all the data so that none of it can be read without remote keys which remain with the authorized users only.”
The GED-i patent-pending storage encryption solution provides three layers of security: Industry Standard Cryptography, proprietary geometric scrambling and proprietary interference. GED-i's solutions are unique in their ability to thwart even the most sophisticated attempts to illegitimately retrieve protected data via a Multi-layer combination of innovative and conventional methods.
Kenley concludes, “GED-i's encryption solution is the core layer for data security and it will enable our customers to encrypt and protect any type of data with a single and central solution.” He adds, “GED-I should eliminate the legal liability related to data breach disclosure, significantly decrease the time and cost required to implement and maintain data security and eliminate the direct and indirect financial cost due to disclosure of a data breach.”
About Cachet Software Solutions Ltd
Cachet's focus is to bring leading international software into the UK. These point solutions are "best of breed" and offer compelling Return on Investment (ROI). Cachet's portfolio works with industry standards such as ITIL and compliments the technology of Business Systems Management providers including HP, BMC, NetIQ and Computer Associates. Cachet software powers IT savings by:
• Improving IT Service Levels with reduced headcount;
• Reducing the IT Operational cost of 'keeping the lights on'
• Reducing problem identification time;
• Reducing repair time (MTTR) freeing funds for business impacting projects.
In addition Cachet focuses on IT cost-saving solutions for the Service-Oriented Architecture (SOA) area, again trying to help IT organisations to more effectively deliver on the promise of SOA by reducing development time and associated costs for n-tier SOA applications, and also to optimise their production resource usage, again leading to a compelling ROI and lowering IT costs.
Most recently, Cachet (cachet-software.com) has started to offer solutions to reduce security risk and to help achieve security and privacy compliance through products that offer innovative and unique security measures that would otherwise be very costly to implement by hand.