The latest best practices in enterprise data security include utilizing KMIP AND an encryption key management solution. While most security conscious companies are mindful of the latest advancements in storage encryption, there is a lack of attention to the requirements necessary to managing the thousands of keys generated from multiple data centers, storage devices, and software — specifically, enterprise level encryption key management systems have been overlooked, leaving companies vulnerable.Read more
When looking at technology adoption, I am frequently reminded of Pandora’s Box from Greek mythology. This metaphor rings true when considering the Internet of Things (IoT). Whereas Pandora released a host of evils into the world, with IoT we have released new concerns associated with multiple technologies, multiple standards, scale, and security (or as I like to say, resiliency). When considering the information that flows from the edge, through the cloud, and ultimately to the data center, the lowest common denominator for protecting information is trust created by cryptography (as noted by nCipher’s Juan Asenjo in the other half of this blog series). In this blog, we are going to start by acknowledging the pitfalls of our particular Pandora and then discuss how we find hope in the solution provided by nCipher and Fornetix.Read more
Olympic high diving requires concentration and self-control. Before divers jump off a 10-meter platform, they pause at the edge and concentrate on their goal: elegantly perform the acrobatic maneuver and gracefully pierce the water causing minimum surface disturbance. This same disciplined approach is required when adopting new and revolutionary technologies, such as those now available through the Internet of Things (IoT). Decision makers must assess the risks and benefits, consider potential difficulties, and then take the jump.Read more
Implementing an encryption strategy comes with hefty baggage, but don't worry; we've got you covered. In this post, we'll cover the top four challenges of managing encryption and solutions to overcome them.
Encryption key management is increasingly more important the more connected we become. With millions of devices and millions of users, there becomes an increasing need for effective cybersecurity tools that safeguard sensitive assets for individuals and organizations.Read more
The demand for connected devices is growing exponentially, but the technology to secure these devices is lagging creating cyber security vulnerabilities at a massive scale.
The Current State of Cyber Security
Every day we hear about breaches, hacks, and cyber-attacks affecting banks, hospitals, transportation, and even entire cities. In some instances, the impact can mean life or death. Our most trusted institutions – like the US election process – are not the pillars of security they once were. And yet the demand for “connected everything” continues to grow in all sectors and across the globe.Read more
Key managers have very clear differences from Hardware Security Modules (HSMs.) The main differences reside in how the encryption keys can be used by a Key Manager or HSM. There are other more important differentiators, however, let’s start with how key managers leverage open standards, like the Key Management Interoperability Protocol (KMIP), and what exactly an HSM is.Read more
FULTON, Maryland, July 25, 2017 — Today, RackTop Systems announced the immediate availability of its advanced secure encryption service with support for external cryptographic key management powered by Fornetix® Key Orchestration™. The enhancement enables organizations to meet strict data-at-rest encryption requirements while providing effortless, unified management of encryption keys. RackTop's advanced encryption service maintains the highest level of protection by eliminating any human interaction or knowledge of keys, pins, or passwords.Read more