Search company, investor...

Predict your next investment

Corporation
RISK & SECURITY
protegrity.com

Partners & Customers

10

About Protegrity

Protegrity delivers enterprise-wide data security management solutions for end-to-end protection for applications and sensitive data, enabling companies to deploy security policies with centralized management and auditing. Protegrity is committed to protecting sensitive data wherever it resides in today's highly distributed and heterogeneous computing environments.

Headquarters Location

201 Broad Street

Stamford, Connecticut, 06901,

United States

203-326-7200

Are you an investor?
Submit your portfolio details now to be considered in our investor rankings.

Expert Collections containing Protegrity

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Find Protegrity in 2 Expert Collections, including Cybersecurity.

C

Cybersecurity

8,651 items

These companies protect organizations from digital threats.

C

Conference Exhibitors

5,302 items

Latest Protegrity News

Quantum Computing: The Data Security Conundrum

Feb 8, 2024

Quantum Computing: The Data Security Conundrum This article by Clyde Williamson, Chief Security Architect, and Nathan Vega, Vice President, Product Marketing and Strategy at Protegrity , looks at data handling, security and some of the issues insurers will need to think about in future. One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven successful, advancements in quantum computing – which utilises quantum mechanics to solve complex problems faster than conventional computers – could potentially turn data security on its head. IBM, Microsoft and Google have already turned their attention to quantum computing and, as a result, commercially viable quantum computers are not too far from becoming a reality. In fact the global quantum computing market size in terms of revenue was estimated to be USD 866 Million in 2023 and is poised to reach USD 4,375 Million by 2028, growing at a CAGR of 38.3% from 2023 to 2028. This is raising concerns that these computers might pose a threat to current public-key cryptography algorithms and potentially expose sensitive data. As such, data security needs to be a step ahead, with more advanced cryptographic algorithms that minimise potential risks and ensure the safeguarding of data in a quantum computing world. A crack in our data security Quantum-resistant data security is a concern as current approaches to data protection use algorithms that traditional computing power would take several years to crack. The improved processing power of quantum computing would, however, reduce this time significantly and its ability to solve mathematical problems and speed up certain complex mathematical computations could result in the encryption algorithms that we use becoming obsolete. This would create risk detrimental to businesses, universities, governments and more. This is supported by a  Forrester  study that anticipates that quantum computers will be able to crack all current cryptosystems in the next five to 30 years, with a majority claiming there is an up to 70% chance of this occurring in the next 5 years. As such, it is no wonder that Gartner has stressed the importance of preparing for quantum’s impact by encouraging the promotion of privacy-enhancing technologies in anticipation of the quantum era. This is a valid suggestion as some classical cryptography algorithms will not be able to stand up against quantum computing’s processing abilities and will succumb to a brute-force assault. However, while quantum computing is widely considered a potential risk for data security, it could potentially also be a part of the solution, as quantum cybersecurity may provide a more robust and compelling opportunity to safeguard critical data. Quantum cyber security According to  IBM , quantum computing can aid in providing a more robust way to safeguard critical data than current offerings. In particular, quantum machine learning and quantum random number generation are believed to provide a viable solution to securing data while at the same time wielding the power to detect and deflect quantum-era cyberattacks before they can cause harm. As encryption is often a key component of data security, adopting quantum-resistant cryptography will be critical to protecting people and adhering to privacy regulations. However, as quantum computing is not widely used as yet, it is unlikely that we will be able to harness quantum computing power to develop a quantum-proof approach to data security for a few years. Thus, before quantum computing becomes widely adopted, most likely as Quantum-Computing-as-a-Service, it is critical to stay a step ahead of the potential threat and develop a quantum-proof solution now, rather than wait for quantum computers to break the current data encryption models. A quantum-proof approach to data security To prepare for the quantum revolution, companies need to assess their cyber security infrastructure and identify potential vulnerabilities to quantum computing. Some traditional forms of data security will be made obsolete with the mass rollout of quantum computing, however, it’s believed others are capable of withstanding the potential threats of this evolving technology. Tokenization, which uses randomization to substitute a real value for a token that conceals that value, is believed to be a viable data security option against quantum computing. This randomization is a powerful data security tool which, unlike key-based encryption that uses mathematical formulae or proofs to ensure the integrity of the algorithm, stores data with random but reversible tokens which cannot be decrypted with a mathematical solution. Furthermore, tokenization substitutes the real value with a token consistently across the enterprise which means that data can be joined in a protected state to power AI, ML, data analytics initiatives and other applications that require data from multiple siloes to drive business outcomes. Preparing for the quantum future The emergence of quantum computing is a double-edged sword. While it is expected to bring groundbreaking possibilities to data security, the risks it poses are equally concerning. As such, preparation for its arrival needs to be done today to keep data secure in the future. This is supported by IBM, which states that while quantum computers are not yet commercially available, there are significant advantages to initiating quantum-proof cybersecurity solutions now. This is particularly true as terrorist networks have access to the same technologies that businesses do. While businesses may use these tools to improve customer experiences and drive down costs, malicious actors will use them to gain access to data for other purposes. Already it is believed that threat actors are scraping data, which means they are stealing and holding onto data until quantum computers are more easily available to decrypt it. To overcome this challenge, companies need to be implementing quantum-proof solutions today to ensure data remains secure well into the future. Securing data today Although much is unknown about the impact quantum computing will have, we do know that we cannot wait for it to become commercially available before implementing more stringent security measures to withstand the threat of its computing power. As such, investing in data security today is critical to safeguarding data against emerging threats such as those presented by quantum computing. To mitigate future privacy threats, companies need to rethink how they keep data secure. While quantum computing and data scientists are working to develop solutions that could potentially be quantum-proof, companies stand to benefit from implementing solutions today that are considered secure against threat actors and quantum computing alike as a first step to implementing a multi-layered approach to future-proofing data security. This can only be achieved when companies prioritise data protection and move beyond only focusing on the perimeter. This is best achieved by partnering with a company, such as Protegrity, which has extensive experience in identifying and classifying sensitive data and safeguarding it with solutions that will stand up against quantum computing to keep data secure today and in the future. Share this:

Protegrity Acquisitions

1 Acquisition

Protegrity acquired 1 company. Their latest acquisition was KaVaDo on August 10, 2005.

Date

Investment Stage

Companies

Valuation
Valuations are submitted by companies, mined from state filings or news, provided by VentureSource, or based on a comparables valuation model.

Total Funding

Note

Sources

8/10/2005

Series C

$99M

$21.5M

Acquired

Date

8/10/2005

Investment Stage

Series C

Companies

Valuation

$99M

Total Funding

$21.5M

Note

Acquired

Sources

Protegrity Partners & Customers

10 Partners and customers

Protegrity has 10 strategic partners and customers. Protegrity recently partnered with Exasol on July 7, 2023.

Date

Type

Business Partner

Country

News Snippet

Sources

7/26/2023

Client

Germany

Protegrity and Exasol extend partnership, enabling customers to take advantage of today’s rapidly evolving API economy

Commenting on the partnership , Terri Snell , VP Global Alliances , Protegrity says : `` We are delighted to extend our partnership with Exasol , where we have enjoyed a mutually beneficial relationship for many years .

2

2/2/2022

Partner

United States

“Above the Trend Line” – Your Industry Rumor Central for 2/2/2022

Protegrity 's partnership with Google Cloud lays a strong foundation to deliver de-identified datasets across many Google Cloud services .

1

1/19/2022

Partner

Google Cloud Platform

United States

Protegrity Partners With Google Cloud to Support BigQuery Remote Functions

`` Through our partnership with Google Cloud , one of the foremost leaders in cloud computing and data analytics , we are enabling our mutual customers to accelerate data innovation without compromising privacy , '' said Jeffrey Breen , executive vice president of product and strategy at Protegrity .

4

6/22/2021

Partner

Germany

Subscribe to see more

Subscribe to see more

10

6/16/2021

Partner

United States

Subscribe to see more

Subscribe to see more

10

Date

7/26/2023

2/2/2022

1/19/2022

6/22/2021

6/16/2021

Type

Client

Partner

Partner

Partner

Partner

Business Partner

Google Cloud Platform

Country

Germany

United States

United States

Germany

United States

News Snippet

Protegrity and Exasol extend partnership, enabling customers to take advantage of today’s rapidly evolving API economy

Commenting on the partnership , Terri Snell , VP Global Alliances , Protegrity says : `` We are delighted to extend our partnership with Exasol , where we have enjoyed a mutually beneficial relationship for many years .

“Above the Trend Line” – Your Industry Rumor Central for 2/2/2022

Protegrity 's partnership with Google Cloud lays a strong foundation to deliver de-identified datasets across many Google Cloud services .

Protegrity Partners With Google Cloud to Support BigQuery Remote Functions

`` Through our partnership with Google Cloud , one of the foremost leaders in cloud computing and data analytics , we are enabling our mutual customers to accelerate data innovation without compromising privacy , '' said Jeffrey Breen , executive vice president of product and strategy at Protegrity .

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Sources

2

1

4

10

10

Protegrity Team

6 Team Members

Protegrity has 6 team members, including current Chief Executive Officer, President, Rick Farnell.

Name

Work History

Title

Status

Rick Farnell

Chief Executive Officer, President

Current

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Name

Rick Farnell

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Work History

Title

Chief Executive Officer, President

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Status

Current

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Compare Protegrity to Competitors

Skyflow Logo
Skyflow

Skyflow specializes in data privacy solutions. The company offers a data privacy vault, which allows businesses to isolate, protect, and govern sensitive data, easing compliance with data privacy and residency requirements. It primarily serves sectors that handle sensitive personal data, such as the financial and healthcare industries. Skyflow was formerly known as Prekari Labs. It was founded in 2019 and is based in Palo Alto, California.

OwnBackup Logo
OwnBackup

OwnBackup specializes in data protection and recovery in cloud computing. The company offers services such as automated data backup, rapid recovery, data security, and data archiving, all aimed at preventing data loss and corruption. It primarily serves sectors such as customer relationship management (CRM) platform owners, compliance leaders, and technology leaders. It was founded in 2015 and is based in Englewood Cliffs, New Jersey.

Very Good Security Logo
Very Good Security

Very Good Security (VGS) operates as a data security platform. It offers protection services to secure payments, medical records, communication, and secure forms by keeping the data safe without making any changes in the system. The company was founded in 2015 and is based in San Francisco, California.

DuoKey Logo
DuoKey

DuoKey is a cybersecurity company that specializes in the domain of encryption and key management solutions. The company offers advanced key management services and double key encryption systems designed to provide unparalleled data protection across cloud and hosted applications. DuoKey primarily serves sectors that require high levels of data security, such as the financial services, healthcare, and government sectors. It was founded in 2020 and is based in Yverdon-Les-Bains, Switzerland.

Fortanix Logo
Fortanix

Fortanix offers a unified data security platform. The company allows users to run applications securely in public clouds with complete privacy from the cloud provider. It serves healthcare, technology, university, and payment companies. The company was founded in 2016 and is based in Mountain View, California.

ShardSecure Logo
ShardSecure

ShardSecure focuses on cloud data security to deliver comprehensive protection for sensitive data in the cloud. Its technology allows clients to secure their confidential data in the cloud. It caters to financial firms, healthcare and pharmaceutical organizations, global technology businesses, and companies in other regulated industries. The company was founded in 2019 and is based in New York, New York.

Loading...

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.