Bringing Smart Encryption Management to Virtual Machines

March 14, 2018 / by Jeremy Sturm

Portability, versatility, efficiency, and cost effectiveness — these are just a few of the advantages of moving to virtualized environments. Virtualization allows enterprises to shift datacenters full of equipment down to a just a few servers. A smaller footprint means less power consumption, lowered cost of ownership, and less overhead. Too often, though, enterprises neglect security when it comes to implementing virtualization. Securing virtual environments has become an afterthought.

Read more

Fornetix Key Orchestration Achieves VMware Ready™ Status

March 14, 2018 / by Fornetix

Fornetix secures position as trusted VMware security partner for providing customers with easy-to-implement encryption solutions.

March 2018 — Fornetix® today announced that its enterprise key management system, Key Orchestration™, has achieved VMware Ready™ status. This designation indicates that after a detailed validation process, Key Orchestration has been awarded VMware’s highest level of endorsement and is supported on VMware vSphere 6.5 and vSAN 6.6 for production environments.

“We are pleased that Fornetix Key Orchestration qualifies for the VMware Ready™ logo, signifying to customers that it has met specific VMware interoperability standards and works effectively with VMware cloud infrastructure. This signifies to customers that Key Orchestration can be deployed in production environments with confidence and can speed time to value within customer environments.” said Kristen Edwards, Director, Technology Alliance Partner Program, VMware.

“By using Key Orchestration with vSphere 6.5 and vSAN 6.6, organizations can easily implement and manage the entire lifecycle of encryption keys required to secure their virtual infrastructure.”

“With the combined Fornetix and VMware integration, encrypting our virtual machines has been seamless,” said Lee Adams, Managing Director of Cantarus and an active user of this joint solution. “It empowers our organization to protect our clients’ data via a transparent security layer that can be deployed with minimal disruption and, critically, requires near-zero maintenance allowing us to deliver exceptional reliability and scale on-demand.” 

The VMware Ready program is a co-branding benefit of the Technology Alliance Partner (TAP) program that makes it easy for customers to identify partner products certified to work with VMware cloud infrastructure. Customers can use these products and solutions to lower project risks and realize cost savings over custom built solutions. With thousands of members worldwide, the VMware TAP program includes best-of-breed technology partners with the shared commitment to bring the best expertise and business solution for each unique customer need.

Fornetix Key Orchestration can be found within the online VMware Solution Exchange (VSX) at The VMware Solution Exchange is an online marketplace where VMware partners and developers can publish rich marketing content and downloadable software for our customers.

About Fornetix Key Orchestration

Fornetix Key Orchestration is a groundbreaking cybersecurity solution designed to unleash encryption’s full potential by simplifying key management. Perimeter defenses alone have proven insufficient at protecting data during a breach. Fornetix empowers organizations to build a data security strategy with encryption as the strong foundation. Safeguard sensitive information with a system backed by granular policy tools, user access controls, and powerful automation. Key Orchestration is a scalable and flexible solution that can manage hundreds of millions of encryption keys while integrating seamlessly with existing technology investments. Please click here to request a demo.

VMware, vSphere, vSAN, and VMware Ready are registered trademarks or trademarks of VMware, Inc. in the United States and other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.

Media Contact

Megan Horner
Director of Marketing, Fornetix

Read more

Fornetix Announces Josh Larsen as New Chief Revenue Officer

February 28, 2018 / by Fornetix

Fornetix, LLC, a company founded on the idea of making encryption easier, today announced that Josh Larsen has been appointed the company’s Chief Revenue Officer. Effective immediately, Larsen will oversee all aspects of Fornetix's product management, marketing, and sales operations. In this critical role, he will be responsible for creating and executing go-to-market strategy while driving new business and revenue growth across the company.

“We are all excited to have Josh bring his knowledge and experience in building sales processes and teams,” said Steve Philson, Chief Operating Officer of Fornetix. “He will help drive Fornetix forward and allow us to continue to grow in the cybersecurity market.”

Larsen brings to Fornetix a highly-successful track record with nearly 20 years of experience in building products and businesses across various disciplines of the cybersecurity industry. Most recently, he served as founder and CEO of Blackfin Security Group where he drove the design, development, and launch strategies of unique security solutions. Larsen led Blackfin Security Group to a successful acquisition by Symantec Corporation in 2015. He holds a Bachelors of Finance from Virginia Tech.

Larsen said the following on his move to Fornetix, “This team is uniquely positioned to change the face of enterprise data encryption. Fornetix continues to innovate by enabling organizations to deploy data encryption strategies across numerous technology stacks. I’m excited to be a part of a company that’s empowering customers to improve their overall security posture by adopting strong encryption solutions across many historically challenging areas.”

About Fornetix

Fornetix® Key OrchestrationTM is a groundbreaking cybersecurity solution designed to unleash encryption’s full potential by simplifying key management. Perimeter defenses alone have proven insufficient at protecting data during a breach. Fornetix empowers organizations to build a data security strategy with encryption as the strong foundation. Safeguard sensitive information with a system backed by granular policy tools, user access controls, and powerful automation. Key Orchestration is a scalable and flexible solution that can manage hundreds of millions of encryption keys while integrating seamlessly with existing technology investments. Please click here to request a demo.

Read more

Fornetix Developer Takes Top Prize at Cybersecurity Conference

February 26, 2018 / by Fornetix

The Fornetix team wants to congratulate Kian Bradley, client developer, after he earned first place in the cryptocurrency capture the flag (C3TF) at this year’s BSidesNoVA hacking conference. The competition focused on real world challenges related to crypto currencies such as smart contract exploits, forensics, wallet exploits, and more issues unique to this growing industry.

Read more

Smart Meters — Securing Utilities, One Bit at a Time

February 21, 2018 / by Jeremy Sturm

“Smart” Doesn’t Mean “Secure”

Prior to 1975, there was no such thing as a smart home. Prior to 1985, all radio systems were analog. Prior to 1990, all phone systems were analog. Prior to 1974, all utility metering was analog. But all of that has changed; we now live in a digital world. 1’s and 0’s “run” our lives, and picking up an analog landline phone (POTS) is virtually a thing of the past. The new “hotness” is smart everything. Smart cars, smart phones, smart TVs, smart homes, and now smart grids.

Read more

Why Integrity Matters in Automotive Supply Chains (and What Cryptography Can Do About It)

January 27, 2018 / by Chuck White

When considering automotive IoT, it’s logical to focus on the supply chain that makes the car possible. In reviewing the application of key management to the automotive IoT landscape, it becomes apparent that the provenance of car components, from tires to telematics, is absolutely critical. Any poorly-built component can cause a systemic failure of the vehicle delivered to the consumer. When one typically thinks of applying encryption, it is focused on protecting the confidentiality of data at rest, in motion, or even while being processed. However, what about measuring whether the data should be trusted instead how whether it needs to be protected?

Read more

Spectre & Meltdown: Processor Design Flaw Leads to Executable Side-Channel Attack

January 17, 2018 / by Jon Mentzell

Starting in late December, the Linux kernel development lists started buzzing about some commits going into the kernel without the usual documentation that adjoins such code changes. When an AMD developer added some code on December 26th with the following comment, security researchers started zeroing in on the problem:

Read more

With Great Code Comes Great Vulnerability: How Auto Makers Are Working to Secure Connected Cars

December 21, 2017 / by Kevin Mooney

Last week, I attended the inaugural Auto-ISAC summit. "ISAC" stands for Information Sharing and Analysis Center. There are several long-standing ISACs for other industries including aviation, electricity, natural gas, and financial services. You can find the full list here if you are curious.

Read more

And Then There's Dave: Safeguarding Against Human Error in Cyber Security

November 15, 2017 / by Jeremy Sturm

In a digital world, everything is a 1 or a 0. Those 1’s and 0’s can range from the lifeblood of an organization down to a simple message from one person to another. In most cases, those 1’s and 0’s can be jostled around: enter encryption. Tight encryption standards can make even the most significant, sensitive data appear to be indecipherable to the naked eye. Multiple firewalls, strong antivirus software, enterprise-wide encryption… these are all techniques utilized to strengthen our security posture to prevent bad actors from accessing sensitive data. Bolstering a strong perimeter security defense, coupled with constantly rotating encryption keys inside and outside of the perimeter, and always having the latest antivirus definitions will lead to a stronger aggregate security posture.

Read more

GDPR Compliance and Beyond: Adopting a One-Two Encryption Punch (Guest Post)

October 24, 2017 / by Cyphre

Thank you to Cyphre for contributing this guest post to our blog as we focus on GDPR compliance!

Now that European Union’s General Data Protection Regulation (GDPR) is set to become law, companies must establish policies and technology controls to securely store and transfer personal data of any person residing in the EU. Data that can be used to identify a person, such as physical address, IP address, and more, as well as genetic data, information about religious and political views, sexual orientation, and more must be encrypted or made anonymous. Individuals have the right to erase their personal data by withdrawing consent or when it is no longer being used for its original purpose.

Read more
1 2 3
Page 1 of 3

Subscribe to Email Updates

Recent Posts