Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • Database
    • Development
    • Innovation
    • Servers

    How Newcomer Anjuna Is Closing an Old Data Security Gap

    By
    Chris Preimesberger
    -
    June 30, 2020
    Share
    Facebook
    Twitter
    Linkedin
      Anjuna.SecureEnclaves

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      When one thinks about all the connections a digital document, log, image or other set of data must traverse in moving from a server to another server and eventually to a storage location, we don’t know the half of it. Most times the number of virtual handshakes and handoffs are many more than we ever realize. 

      In fact, if you file your tax return online (remember, July 15 is the deadline!) to a service such as TaxAct, TurboTax or HR Block, that document will be dispersed to about 35 different servers for processing. And that’s only at the end point.

      Unless you are a networking admin or an IT manager, you generally don’t even think about all those interactions. We just know that when we push a button on our connected device, something we want to accomplish is going to happen.

      There are some other people, however, who are interested in all these connections, and they aren’t your friends. They are nefarious information-stealers who look for leaks in these transactions and attempt to intercept important personal information along trade routes.

      Closing a nagging gap in data security

      These gaps in networking communications is what a new startup, Anjuna Security, is all about. Anjuna aims to halt the loss of important data if it slips through the fingers of a network, and the manner in which it does this is an interesting story indeed.

      Anjuna, which is launching both its product and itself June 30, has come up with a way to embed high-end security into server processors so that the data is protected all through the process, from start to finish. The current convention—which has been the case throughout IT history—is that data is vulnerable at various times when it is in motion, as described in the lead of this article. 

      Palo Alto, Calif.-based Anjuna has focused its security expertise on something called secure enclaves—designated sections within a processor that provide CPU hardware-level isolation and memory encryption on every server while the data is being used. They do this by isolating application code and data from anyone with privileges and encrypting its memory. 

      With additional software, secure enclaves enable the encryption of both storage and network data for full-stack security. Secure enclave hardware support is built into all new CPUs from Intel and AMD, Anjuna CEO and co-founder Ayal Yogev told eWEEK, which announced the launch exclusively June 29.

      Thus Anjuna claims to be the closer of that long-embedded critical gap in data security, using full hardware-grade protection to enable new and existing applications to run without having to be rewritten. Anjuna’s Enterprise Enclaves enable hardware runtime data protection to data-at-rest and data-in-motion, while at the same time solving one of the longest-running flaws in enterprise data security; that data cannot be used and secured simultaneously—a flaw at the heart of virtually every enterprise data breach. 

      No way to protect unencrypted data in an in-memory database

      Most people don’t know that there is no way to secure data inside in-memory databases such as SAP HANA, Redis, Couchbase, VoltDB, Oracle In-MemoryDB, MemSQL and others. The data inside must already be encrypted in order to secure it, and that presents another set of problems for administrators that requires another article to explain.

      “Software-based security is inherently flawed, because data-in-use is fundamentally not secured in memory or the CPU. As a result, security teams play a never-ending game of cat-and-mouse with bad actors—building software barriers they know will eventually be breached,” Yogev said. “This means CISOs live in a rather uncomfortable perpetual state of data insecurity.”

      That might be the understatement of the year. One won’t find many CISOs who sleep completely soundly every night. But what Anjuna has developed might well enable CISOs to put away their sleeping meds.

      “What we’re doing is building a software on top of those secure enclaves to make it ready for the enterprise,” Yogev told eWEEK. “I don’t think that Intel realized how amazing what they’ve built is. Like when Intel built the CPU, they knew they built something amazing, but I don’t think they could’ve foreseen the birth of the iPhone, or AR/VR, or the things that were built atop those CPUs 20 or 30 years later. 

      “I think this is the biggest shift in security since public infrastructure. When public key infrastructure (PKI) was created, nobody realized that Amazon and e-commerce was going to build on top of it. This is the same kind of shift that’s going to allow some pretty amazing technologies.”

      The common current problem

      While software security solutions offer some protection, they are invariably hit by attackers who gain full control of servers or encryption keys exposed in memory during runtime. Encryption keys are central to most data protection schemes. When exposed, security tools can no longer protect data or applications from malicious insiders, unauthorized third parties and other bad actors, such as rogue nation-states. 

      In recent years, such CPU vendors Intel and AMD  and others added proprietary security features into their high-performance CPUs. These enhanced instruction sets enable chip programmers to create these secure enclaves—fully protected and encrypted regions of computer memory effectively invisible outside the enclave. To utilize these functions, however, requires rewriting software code—sometimes extensive rewriting.

      “These new silicon-level technologies solve the data security flaw—a great first step to opening up applications we can’t even imagine today,” Yogev said. “They finally solve the data insecurity challenges that have plagued companies, for decades: building extremely complex layered security software defenses that never totally  eliminate the ever-present threat of incursions.”

      Broad industry support through consortium

      CPUs with secure enclave capabilities are already being used in the newest servers for data centers, and public cloud vendors are also adopting the technology. Anjuna is a member of the Confidential Computing Consortium, a group formed by the largest industry players to bring this technology to commercial use. Led by Microsoft, Intel and AMD, the consortium is driving deployment of new data secure cloud services based on these secure hardware platforms, such as Azure confidential computing, Baidu and more.

      Even with secure hardware within reach, enclaving an application is still not a simple process for enterprises. Proprietary software developer kits do not generate applications that can run on multiple hardware platforms. This makes implementing enclaves a time consuming and expensive process that most enterprises aren’t willing to undertake on their own.

      “We knew enterprises couldn’t afford to rewrite applications for each hardware platform, “ Yogev said. “That’s why we created a way for them to deploy fully managed enterprise-class enclaves that span memory, storage, networks and clouds instantly—simply, as is, and without any recoding.”

      A ‘state of absolute data security for all data’

      Yogev said he sees a future in which enterprises achieve “a state of absolute data security for all data and applications anywhere they are used.” This security running 24/7 in the background on servers will enable new ways to deploy data and applications more effectively, he said.

      Michael Johnson, former CISO of Capital One  and former CIO of the U.S. Department of Energy, said in a media advisory that “Anjuna delivers on the the promise of a new level of data security by addressing the problem CIOs and CISOs have chased for decades: how to seamlessly run trusted workloads in uncontrolled and/or hostile environments and prevent data leaks—all while maintaining productivity. Now CISOs can feel comfortable saying yes to the cloud—knowing their information is secure, no matter where it is run or stored.”

      Yes, and now perhaps they can get some uninterrupted sleep at night.

      Availability: Anjuna Enterprise Enclaves software is available now directly from Anjuna and through the Microsoft Azure confidential computing marketplace.

      Chris Preimesberger
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Linkedin Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      10 Best Artificial Intelligence (AI) 3D Generators

      Aminu Abdullahi - November 17, 2023 0
      AI 3D Generators are powerful tools for creating 3D models and animations. Discover the 10 best AI 3D Generators for 2023 and explore their features.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×