FREDERICK, MARYLAND - Fornetix, LLC today announced the selection of Dell Technologies Design Solutions to deliver its VaultCore™ encryption key management system on Dell Technologies storage and hyperconverged infrastructure platforms. VaultCore is a 1u or 2u appliance that slots into the management pod rack providing an integrated system for enterprise key policy and automation.Read more
FREDERICK, MARYLAND – Fornetix, LLC and D360 Technologies jointly announced today that they formed a partnership to bring Fornetix VaultCore™ to the Japan market. Fornetix VaultCore is an advanced encryption key management solution that automates the full key lifecycle across the entire enterprise from infrastructure to end-point, allowing organizations to easily manage encryption keys and secure critical data assets. This partnership will be focused on introducing the VaultCore solution to the medical, smart IoT, telecommunications, and automotive industry sectors.
The COVID-19 crisis has created a significant need for telework and the distributed networks to support it. This has enabled an increase in the attack surface area for bad actors uncovering major vulnerabilities throughout the enterprise. According to a recent Gartner report, only 18% of IT leaders believe their businesses are highly prepared for the impact of coronavirus. It is clear that this requires the immediate establishment of an encryption security solution that protects data seamlessly wherever it resides, and enforces consistent security policies throughout the data life cycle.
“We are excited to bring Fornetix VaultCore to the Japan market and help companies protect themselves from the increase of vulnerabilities due to the current pandemic. Implementing VaultCore is a smart decision for any IT administrator who is looking for a security solution to protect critical data, now and for the future.” – Mark Gilroy, CEO, Fornetix, Inc.
VaultCore provides simple scale encryption management for public, private, on-premise, virtual, and cloud environments. VaultCore's detailed policy tools, user access controls, and robust automation make it easy to manage the entire encryption key lifecycle across the enterprise. VaultCore is the only encryption management solution capable of providing, processing and supporting hundreds of millions of keys for large distributed environments with minimal performance impact. Easy integration with KMIP and non-KMIP using Fornetix’s Orchestration Gateway™ allows companies to leverage their existing technology investments. The Fornetix VaultCore appliance is a FIPS 140-2 Level 2 validated solution (with NIST Certification pending) that employs an HSM for a FIPS 140-2 Level 3 root of trust.
The latest best practices in enterprise data security include utilizing KMIP AND an encryption key management solution. While most security conscious companies are mindful of the latest advancements in storage encryption, there is a lack of attention to the requirements necessary to managing the thousands of keys generated from multiple data centers, storage devices, and software — specifically, enterprise level encryption key management systems have been overlooked, leaving companies vulnerable.Read more
Innovative breakthrough in encryption key management strengthens VaultCore™ as leading security solution for enterprisesRead more
Partnership delivers impenetrable security foundation throughout the enterprise and out to the edge
FREDERICK, MARYLAND – Fornetix, LLC today announced its technology partnership with Vengar Technologies, creating a powerful, innovative joint data protection solution that leverages Fornetix’s innovative encryption key management system, VaultCore™,and Vengar’s zero-trust object level data protection.Read more
Improved features help VaultCore amplify its data protection capabilities
FREDERICK, MARYLAND – Fornetix LLC, an industry pioneer and leader in enterprise encryption management technology, announced today that they have changed their flagship key management solution’s name from Key Orchestration to VaultCore.
FREDERICK, MARYLAND – Fornetix, Inc., an industry pioneer in enterprise encryption management technology, announces the appointment of Richard C. Schaeffer, Jr. to the company’s Board of Directors. Mr. Schaeffer is a former Senior Executive with the National Security Agency (NSA) and brings over 40 years of experience from roles throughout the defense and intelligence communities. His career includes extensive leadership, management, and technical expertise in the areas of information security and assurance, helping to safeguard many of the nation’s most critical and sensitive assets.Read more
There are two popular types of malicious attacks: A data breach and a ransomware attack. You may have heard these two terms used interchangeably, however they're not quite the same. A data breach occurs when a hacker gains access to information and steals the unencrypted data from the system. This is often used to steal financial, medical, and other personal information. A ransomware attack occurs when hackers gain access to a system and hold the data hostage in exchange for a ransom, regardless of whether the data is encrypted or unencrypted. A hacker may keep the data inside the enterprise's system but encrypt it so the right people can’t gain access to it. They may also remove the data from the system and return it in exchange for ransom. Both types of attacks have been around for a while, but recently, ransomware attacks have become more prevalent.Read more
When looking at technology adoption, I am frequently reminded of Pandora’s Box from Greek mythology. This metaphor rings true when considering the Internet of Things (IoT). Whereas Pandora released a host of evils into the world, with IoT we have released new concerns associated with multiple technologies, multiple standards, scale, and security (or as I like to say, resiliency). When considering the information that flows from the edge, through the cloud, and ultimately to the data center, the lowest common denominator for protecting information is trust created by cryptography (as noted by nCipher’s Juan Asenjo in the other half of this blog series). In this blog, we are going to start by acknowledging the pitfalls of our particular Pandora and then discuss how we find hope in the solution provided by nCipher and Fornetix.Read more
Implementing an encryption strategy comes with hefty baggage, but don't worry; we've got you covered. In this post, we'll cover the top four challenges of managing encryption issues and solutions to overcome them.
Encryption key management is increasingly more important the more connected we become. With millions of devices and millions of users, there becomes an increasing need for effective cybersecurity tools that safeguard sensitive assets for individuals and organizations.Read more