Pivoting From Cyber Security to Cyber Defense — Part 2

July 19, 2018 / by Chuck White

It’s been a little over a year since exclaiming that Cyber Security is dead. In that year, we have seen broader acceptance of terms like Defense and Resiliency. We have even seen attempts to pass laws that are the cyber equivalent of the “castle doctrine” for home defense. All that aside, one term that is starting to show up in this space is Orchestration. In practice, tools that support AI, machine learning, or analytics are turning to the term Orchestration to address what happens next. Applying the OODA loop (Observe, Orient, Decide, Act) is an easy way to look at this — if SIEM, AI, machine learning, big data, etc. are about Observe and Orient, then Orchestration is about Decide and Act.

Read more

Announcing BYOK Support for AWS and Azure

July 13, 2018 / by Megan Horner

Fornetix is proud to announce the availability of Bring Your Own Key (BYOK) support for both AWS and Azure Cloud Services.  This is made available through the Fornetix BYOK Orchestrator via APIs that allow the Fornetix Key Orchestration appliance to speak to cloud service providers in their preferred protocol for enhanced security of encryption keys 

Read more

Your Data Is in the Cloud and It's at Risk

June 26, 2018 / by Kevin Mooney

Companies and individuals are using cloud services more and more. Putting so much of our data into the cloud introduces a growing problem. The lines between public cloud, private cloud, and software-as-a-service (Saas) have rapidly blurred as new technology develops, redefining what “cloud” actually means. Some businesses put significant portions of their infrastructure into the cloud and choose to keep only a very small footprint in a traditional data center or office. More commonly, businesses will leverage SaaS to handle common IT requirements such as email, storage, CRM, and backups.

Read more

What Is the 'EFAIL' Vulnerability and What Can I Do About It?

May 18, 2018 / by Jon Mentzell

What is efail? 

Efail is the name given by German Researchers to a potential attack against PGP or S/MIME encoded emails to take the encrypted contents and send them to a third-party actor.

How does efail work?

Efail requires an HTML encoded email to be manipulated by prepending an html image tag to the beginning of the email. This in turn forces the email client to send a request to a malicious domain looking for an image file that is the body of the encrypted email.

Read more

Differentiating Key Managers & HSMs - Who Let the Keys Out?

May 15, 2018 / by Ken Czajkowski

Along with the rest of the industry, we recently attended the RSA Conference in San Francisco. While there, many conversations about Fornetix Key Orchestration (KO) started with “You’re an HSM?” or “I already have an HSM… why do I need a key manager?”  Key managers have very clear differences from Hardware Security Modules (HSMs.)  The main differences reside in how the encryption keys can be used by a Key Manager or HSM.  There are other more important differentiators, however, let’s start with how key managers leverage open standards, like the Key Management Interoperability Protocol (KMIP), and what exactly an HSM is.

Read more

Supporting BYOK Within AWS With Fornetix Key Orchestration

May 09, 2018 / by Megan Horner

Amazon Web Services (AWS) is a secure cloud services provider that delivers compute, network, and data storage services. There are numerous benefits to migrating data storage and management to the cloud, but there are security considerations that must be addressed prior to doing so.

Read more

Fornetix Announces Formation of Board of Directors

April 11, 2018 / by Fornetix

ASHBURN, Va., April 2018 — Fornetix, an industry leader for encryption key management, is pleased to announce the formation of a Board of Directors. The appointees are six proven executives with successful track records in the business and cybersecurity arenas.

Read more

What Fornetix Has Planned for the 2018 RSA Conference

April 10, 2018 / by Megan Horner

Is RSA really less than a week away? It feels like just a few short months ago that the team at Fornetix was lamenting the fact that we'd have to wait until mid-April for the one event we all look forward to year-after-year.

Read more

Bringing Smart Encryption Management to Virtual Machines

March 14, 2018 / by Jeremy Sturm

Securing Virtual Environments Shouldn't be an Afterthought

Portability, versatility, efficiency, and cost effectiveness — these are just a few of the advantages of moving to virtualized environments. Virtualization allows enterprises to shift datacenters full of equipment down to a just a few servers. A smaller footprint means less power consumption, lowered cost of ownership, and less overhead. Too often, though, enterprises neglect security when it comes to implementing virtualization. Securing virtual environments has become an afterthought.

Read more

Fornetix Key Orchestration Achieves VMware Ready™ Status

March 14, 2018 / by Fornetix

Fornetix secures position as trusted VMware security partner for providing customers with easy-to-implement encryption solutions.

March 2018 — Fornetix® today announced that its enterprise key management system, Key Orchestration™, has achieved VMware Ready™ status. This designation indicates that after a detailed validation process, Key Orchestration has been awarded VMware’s highest level of endorsement and is supported on VMware vSphere 6.5 and vSAN 6.6 for production environments.

Read more
1 2 3 4
Page 1 of 4

Subscribe to Email Updates

Recent Posts