You are currently viewing Zettaset: Choice of Organizations That Desire Excellence

Zettaset: Choice of Organizations That Desire Excellence

In today’s competitive economy, data is the primary asset enterprises and individuals possess. In cloud computing, the foremost user concerns revolve around data integrity, confidentiality and privacy. The only way to secure databases on virtual machines or in cloud environments, without sacrificing the huge benefits of these new architectures, is to use software-based solutions that share the elasticity of virtual machines and cloud computing.
The solution that is keeping all the security concerns of the clients at bay is Zettaset. The leader in Big Data security Zettaset is an ISV that provides proven enterprise-class data security and integrity software solutions that are optimized for petabyte-scale data center and cloud deployments. Zettaset’s Security solutions are compatible with Relational, NoSQL, Object, and Hadoop data stores. Its enterprise customers and systems vendor partners rely on Zettaset to deliver advanced Big Data security and integrity solutions that deliver performance and scalability, while easily fitting into existing enterprise IT security and policy frameworks.
Jim Vogt, President and CEO, Business and Technology Expert
With 30 years of leadership experience in both start-up and public corporations, Jim brings a wealth of business and technology expertise to his role as president and CEO of Zettaset. Jim holds a BS in Electrical Engineering from the University of Nevada, and an MBA from Santa Clara University.
Most recently, Jim served as Senior Vice President and General Manager of the Cloud Services business unit at Blue Coat Systems. Prior to Blue Coat, he served as a president and CEO at Trapeze Networks (acquired in August, 2008 by Belden, Inc.). He was also president and CEO at data encryption start-up Ingrian Networks (acquired in April, 2008 by SafeNet). Prior to this, Jim spent 11 years with SynOptics, Bay Networks and Nortel where he held several product line and general management roles, including president of Nortel’s $1.4BN Small Business Solutions group.
Jim says, “Success to us means providing our customers with a positive user experience, from evaluation to purchase to deployment and support. Our entire team is focused on this singular goal.”
Characteristics That Define Zettaset’s Customer Value
Unlike legacy approaches, Zettaset’s data encryption and integrity protection solutions are designed and optimized for today’s complex and demanding distributed-computing architectures. This predominant architecture, especially favored in the cloud, creates unique data security challenges which can only be addressed by solutions that are specifically optimized for distributed systems. Legacy data security solutions were not designed for these dynamic architectures, expose individual nodes/servers to attack, and are unable to deliver the scalable performance that users require in Big Data environments.
At Zettaset the goal is to ensure a positive, consistent, and successful customer experience with each one of their advanced big data software security solutions. Jim elaborates, “We are privileged to have a world-class software development team with deep domain experience around encryption, key management, access control, authentication, cloud security, multiple database environments, and compliance requirements.” All these characteristics combine to make Zettaset the choice of organizations that capture, use and store sensitive data.
Hurdles Overcome
Every organization faces challenges. Zettaset focuses on the tremendous opportunity that the proliferation of “big data” provides to a new category of vendors like Zettaset. Analysts are forecasting a 10-fold rise in worldwide data over the next decade.
In today’s competitive economy, data is the primary asset enterprises and individuals possess. In cloud computing, the foremost user concerns revolve around data integrity, confidentiality and privacy. The only way to secure databases on virtual machines or in cloud environments, without sacrificing the huge benefits of these new architectures, is to use software-based solutions that share the elasticity of virtual machines and cloud computing. Zettaset’s advanced approach to data-centric security addresses these challenges.
Embracing New Market Opportunities
Zettaset has recently released the XCrypt Cloud Encryption Gateway. XCrypt is revolutionary data protection platform for Big Data in the cloud that addresses the growing concern over cloud service providers’ dual role of storing encrypted data and having access to encryption keys, and the exposure it creates for unauthorized decryption of sensitive data. XCrypt is ideal for organizations with strict data privacy mandates and regulated compliance requirements. It provides enterprise customers with exclusive client-side encryption control of all data hosted in cloud storage environments as well as data transferring between the enterprise and cloud.
XCrypt ensures that cloud service providers know nothing about the content of encrypted customer data or customer keys. Zettaset’s initial deployments of the XCrypt Cloud Encryption Gateway will be in the Amazon Web Services (AWS) Simple Storage Service (S3) cloud. It will enable Amazon S3 users to have exclusive client side encryption control without having to share the encryption keys with Amazon personnel or any other third-party. This addresses a major issue for organizations in regulated verticals such as financial services, healthcare, retail and government who must comply with strict data protection mandates.
The Future Looks Bright
While talking about the future of Zettaset, Jim elaborates, “We are a start-up company and relatively small. We practice a supportive team culture that relies on strong interdependency. Sales, marketing, support, development, and executive personnel work side by side in an open office environment.”

Source :- The 50 Most Valuable Tech Companies