Prime Factors Blog

Prime Factors names Jose Diaz as Vice-President, Products & Services.

Posted by Tamie Millis on Apr 4, 2019 12:51:45 PM

Prime Factors has named payment and data security expert, Jose Diaz as Vice-President, Products & Services.

Read More

Topics: key management, applieddataprotection, primefactors

Prime Factors names Justin Teitt as Chief Operating Officer

Posted by Tamie Millis on Mar 21, 2019 8:52:01 PM

Prime Factors has named Justin Teitt as the company's COO & Chief Marketing Officer. 

Justin Teitt is an entrepreneurial executive with broad management experience in companies ranging from Fortune 10 to start-ups, through incubation, growth, and exit.  He joins Prime Factors from ALSENTIS, an innovator in touch technologies for human-machine interfaces, where he served as Chief Executive Officer.

"I am excited to join this exceptional team at such an interesting time - when both the complexity of protecting information and the cost for failing do so has never been higher," said Mr. Teitt, who first crossed paths with Prime Factors nearly 20 years ago while marketing competitive software products at Sterling Commerce (now IBM).  "Prime Factors has a rich legacy of protecting the sensitive information of large multi-national companies, and I found the elegance of architecture and ease of implementation of their data protection products tremendously compelling.  For decades, we have been a trusted provider of security software and world-class technical services, and we look forward to continuing this legacy as we grow the company." 

"I have known Justin for many years," said Henry Cheli, President & CEO of Prime Factors, "and I am very pleased to have him join the Prime Factors team.  He is a skilled marketer, and his experience in running and growing companies will help Prime Factors continue to establish it's position as a leader in data protection.  It is a very exciting time at Prime Factors!"

Justin previously served as Managing Partner of Third Culture, a marketing and product development company, which sold to a Private Equity firm in California.  Justin has previously held leadership roles in Marketing & Global Channel Development with Sterling Commerce and National Retail Development with SBC Communications (now AT&T).  While at SBC, Justin also held roles in corporate marketing, global sales, and field operations line management.  Justin has served on the boards of several technology companies as well as non-profit organizations focused on community development. 

 

About Prime Factors

Prime Factors software products help business leaders implement and manage enterprise-wide data protection policies to secure sensitive information being used by or stored in virtually any application or system. Our middleware modules quickly deploy, on premise or in the cloud, to help solve a variety of use cases for managing sensitive data, including encryption, tokenization, payment credentials, global data protection regulatory compliance and cryptographic key management. For more than 35 years, Prime Factors has served more than 1,000 global customers, including 80% of the top financial institutions in North America.

 

Read More

Topics: EncryptRIGHT, applieddataprotection

Prime Factors names industry veteran Henry A. Cheli as President & CEO

Posted by Pete Flagella on Mar 6, 2019 1:27:01 PM

February 11, 2018 - Eugene, Oregon

Read More

Topics: EncryptRIGHT, applieddataprotection

Endpoint Protection – Reactive vs Proactive?

Posted by Pete Flagella on Oct 30, 2018 11:00:00 AM

endpoint-protects-1

The Second Line of Defense

There are so many existing solutions offering ‘data security’ protection today. It can be very difficult, let alone challenging, to wade through an understanding of what they actually do and how any one or several can help you achieve a ‘real sense of security’ for the data in your business. One of the first aspects of defining your data security strategy is when and where to be ‘Proactive’ versus ‘Reactive’

Read More

Topics: encryption, data breach, EncryptRIGHT, siem, iam, uebm

SIEM - IAM - UEBM - What About Encryption?

Posted by Pete Flagella on Oct 3, 2018 4:00:00 PM

Data-ManagementA data security professional tasked with providing secure access and data protection may find the solutions available are plentiful, complex and confusing. Do you use SIEM, IAM, some version of UEBM or a combination? 

Each of these are critical to providing Data Perimeter Security; enabling authorized access to critical systems so that business can be conducted both internally and externally. Data security professionals manage devices, people, various entities authorized to access applications and data at the core of the missions critical systems required to make business happy safely and securely.

Read More

Topics: Tokenization, encryption, PCI Compliance, EncryptRIGHT, key management, siem, iam, uebm

Encryption is Key in your Data Security Profile

Posted by Pete Flagella on Jul 25, 2018 11:00:00 AM

EncryptionWordCloudWhen you take a good look at your Data Security  Profile; you’ll either see a complex array of solutions and systems woven together in a layered protective architecture, or you’ll see a patchwork of minimal components that  may or may not provide the security and protection you really need or want.

Read More

Topics: Tokenization, encryption, PCI Compliance, PGP, PGP Encryption, EncryptRIGHT, key management

Encryption - The Last Line of Defense In Data Security

Posted by Pete Flagella on Jun 21, 2018 4:23:30 PM

EncryptRIGHT can complement and enhance your data security needs today and tomorrow!

The data security landscape is evolving and expanding across all business sectors. Keeping up with and getting ahead of protecting your data from breaches as well as theft is crucial now more than ever.

Screen Shot 2018-05-22 at 9.34.35 AMThese consistent breaches have challenged current Data Perimeter Security systems that specialize in identity management and access control. They are essential to all data security initiatives and come in wide variety of ever changing and complex configurations and options while being essential to protecting systems, users and data.

The "last line of defense" in any data security initiative regardless of size or complexity is the encryption of data, whether at rest or in motion.

With Prime Factors EncryptRIGHT solution utilizing tokenization and key management, you can protect your data today and tomorrow regardless of the technology infrastructure in place across all platforms and databases.

1

Being critical to data security strategy, User and Entity Behavior Management offers Data Perimeter Security initiatives for both public and private organizations.

To learn more watch this 90 second video. 

While important components to a complete data security strategy, these solutions are complex requiring long implementation times and cost intensive budget and resources. Additionally, the threat attack surfaces, modes of breach, introduction of Artificial Intelligence, Machine Learning and IoT technologies have added to the mix of vulnerabilities. All of this amplifies to the changing dynamics of enterprise network, application and data.

Encryption with EncryptRIGHT can be accomplished within days or weeks. 
 
Sound to good to be true?
 
Let us show you how simple and complete our EncryptRIGHT solution is and begin to protect your data today and tomorrow!
Prime Factors understands that data security is a “prime factor” to any organization regardless of size or industry. Before you become the next headline,  contact one of our knowledgeable experts to schedule a free demo or consultation and learn how EncryptRIGHT can meet your needs today for tomorrow's challenges.
Read More

Topics: Tokenization, Crypto Key Management, encryption, data breach, encryption keys, healthcare security, EncryptRIGHT, key management

Data Security Architecture: Is Your Data Really Protected?

Posted by Pete Flagella on Apr 12, 2018 10:00:00 AM

The Problem 

Are you faced with gaps in your current data security architecture? If you could fill those gaps with a cost-effective, platform-independent encryption solution with key management and tokenization to protect your business data today, would you? Could you afford not to?

Read More

Topics: Tokenization, Crypto Key Management, encryption, data breach, encryption keys, healthcare security, EncryptRIGHT, key management

At Risk: The Human Factors in Data Security

Posted by Pete Flagella on Jan 4, 2018 10:01:00 AM

The Problem

The successful cyberattacks of 2017 demonstrated the following: cyber criminals are getting more sophisticated, the profile of those attacked is widespread and indiscriminate, ranging from the enterprise, to small and medium businesses, as well as individuals. With the emerging Internet of Things (IoT) used to access business and personal data, transactions, and Cloud-based services, the one common variable is ‘wetware’, the device between the keyboard/touchscreen and the seat – the Human Factor.

Read More

Topics: Tokenization, encryption, PCI Data Encryption, PCI Data Security Standards, PCI Compliance, PCI DSS, EncryptRIGHT, key management

Operating Inside the Healthcare Industry. Is Your Data at Risk?

Posted by Pete Flagella on Dec 20, 2017 10:00:00 AM

The Problem

When a cyberattack occurs inside the healthcare Industry, personal, medical, and even financial information are often stolen, making for a highly desired data set that can be used for identity theft, medical fraud, financial misdemeanors, tax fraud and insurance fraud. In many instances the data is auctioned off to the highest bidder resulting in even greater damage than typical financial data breaches and theft.

Healthcare IT systems are often more prone to breaches than any other industry IT systems due primarily to the underinvestment in maintaining up-to-date operating systems and devices. In spite of regulations like HIPPA, HITECH ACT, ARRA, ACA and the HIPAA OMNIBUS RULE, the healthcare industry continues to struggle with the balance between regulations, patient confidentiality, and adapting to new technologies. This resistance to change is especially challenging because there are constant changes to service provider networks, insurance companies, and medical device technologies. The use of mobile access, which now allows these technologies to work together, adds an additional layer of complexity to protecting sensitive data. Combined, all of these frequent changes within the technological landscape effect everyone and every aspect of doing business within the healthcare industry.

Read More

Topics: encryption, PCI Data Encryption, PCI Data Security Standards, PCI Compliance, health information security, PCI DSS, hippa, healthcare security