The latest best practices in enterprise data security includes utilizing KMIP AND an encryption key management solution. While most security conscious companies are mindful of the latest advancements in storage encryption, there is a lack of attention to the requirements necessary to managing the thousands of keys generated from multiple data centers, storage devices, and software — specifically, enterprise level encryption key management systems have been overlooked, leaving companies vulnerable.Read more
Innovative breakthrough in encryption key management strengthens VaultCore™ as leading security solution for enterprisesRead more
Partnership delivers impenetrable security foundation throughout the enterprise and out to the edge
FREDERICK, MARYLAND – Fornetix, LLC today announced its technology partnership with Vengar Technologies, creating a powerful, innovative joint data protection solution that leverages Fornetix’s innovative encryption key management system, VaultCore™,and Vengar’s zero-trust object level data protection.Read more
Improved features help VaultCore amplify its data protection capabilities
FREDERICK, MARYLAND – Fornetix LLC, an industry pioneer and leader in enterprise encryption management technology, announced today that they have changed their flagship key management solution’s name from Key Orchestration to VaultCore.
FREDERICK, MARYLAND – Fornetix, Inc., an industry pioneer in enterprise encryption management technology, announces the appointment of Richard C. Schaeffer, Jr. to the company’s Board of Directors. Mr. Schaeffer is a former Senior Executive with the National Security Agency (NSA) and brings over 40 years of experience from roles throughout the defense and intelligence communities. His career includes extensive leadership, management, and technical expertise in the areas of information security and assurance, helping to safeguard many of the nation’s most critical and sensitive assets.Read more
When considering the intersection of Roots of Trust and the accessibility of services provided by cloud architecture, reliable options quickly become scarce. That is why we at Fornetix are excited to see nCipher launch their "nShield as a Service" (nSaaS) offering. With the combination of Internet of Things (IoT) based technologies and the embracing of "as a Service" cloud capabilities, there is a growing need for HSM services that can be provisioned and integrated with cloud principles while not belonging to a specific cloud vendor. At Fornetix, we built our technology to play to the middle, enabling public, private, and hybrid cloud solutions. We are excited to see nCipher’s nSaaS solution parallel our own. We believe the joint approach will help customers embrace effective use of cryptography no matter how they use technology, whether it be cloud first/cloud native, hybrid cloud, or private cloud.Read more
FREDERICK, MARYLAND – Fornetix, an industry pioneer in enterprise encryption management technology, is pleased to publicly announce Mark P. Gilroy as the company’s new Chief Executive Officer. Mr. Gilroy joined the Fornetix team last October in an interim role, during which time he brought considerable experience, passion, and momentum to the unique encryption solutions being delivered by Fornetix.Read more
'Ariel Mahlmann is the Channel Specialist for Fornetix. Ariel focuses on developing partner relationships and conducting cybersecurity market research to highlight Fornetix' industry leading products and strategic partnerships.
There are two popular types of malicious attacks: A data breach and a ransomware attack. You may have heard these two terms used interchangeably, however they're not quite the same. A data breach occurs when a hacker gains access to information and steals the unencrypted data from the system. This is often used to steal financial, medical, and other personal information. A ransomware attack occurs when hackers gain access to a system and hold the data hostage in exchange for a ransom, regardless of whether the data is encrypted or unencrypted. A hacker may keep the data inside the enterprise's system but encrypt it so the right people can’t gain access to it. They may also remove the data from the system and return it in exchange for ransom. Both types of attacks have been around for a while, but recently, ransomware attacks have become more prevalent.Read more
In a digital world, everything is a 1 or a 0. Those 1’s and 0’s can range from the lifeblood of an organization down to a simple message from one person to another. In most cases, those 1’s and 0’s can be jostled around: enter encryption. Tight encryption standards can make even the most significant, sensitive data appear to be indecipherable to the naked eye. Multiple firewalls, strong antivirus software, enterprise-wide encryption… these are all techniques utilized to strengthen our security posture to prevent bad actors from accessing sensitive data. Bolstering a strong perimeter security defense, coupled with constantly rotating encryption keys inside and outside of the perimeter, and always having the latest antivirus definitions will lead to a stronger aggregate security posture.Read more
Thank you to Cyphre for contributing this guest post to our blog as we focus on GDPR compliance!
Now that European Union’s General Data Protection Regulation (GDPR) is set to become law, companies must establish policies and technology controls to securely store and transfer personal data of any person residing in the EU. Data that can be used to identify a person, such as physical address, IP address, and more, as well as genetic data, information about religious and political views, sexual orientation, and more must be encrypted or made anonymous. Individuals have the right to erase their personal data by withdrawing consent or when it is no longer being used for its original purpose.Read more