Hardware Security Module (HSM) vs. Key Management Service (KMS)

The cloud strategy you adopt—private, hybrid, public or multicloud—is a key factor in the decision as to which encryption key management strategy will work best for your enterprise. For best results, your key strategy should fit your long-term cloud strategy and should be applied consistently across your enterprise.

How Government Goes All-In on the Cloud  

On the state level, cloud adoption is lagging. A full one-third of state government IT systems are at least 16 years old, according to the Center for Digital Government. Meanwhile, federal agencies are running out of time to incorporate the public clouds into their IT strategy.

Microsoft Teams up with Equinix for Greater Cloud Data Security

Enterprises should consider a vendor-neutral HSM-as-a-Service that provides the protection and a service level agreement (SLA) to effectively support the “shared-responsibility” model between cloud providers and their customers.

The Internet of Things and Expecting the Unexpected

The most eye-catching capabilities of the Internet of Things (IoT) tend to grab the most attention, like technology that reads a driver’s brain waves to deliver a more responsive ride. But when it comes to the IoT, lack of flash doesn’t mean lack of impact. Consider “IoT-enabled maintenance.”

Streaming Toward the Biggest World Cup Audience Ever

The 280 million people who streamed the last World Cup represented less than 9% of the total audience of 3.2 billion. But there are good reasons to believe that percentage is going to grow and push up the broader numbers, and one is that overall access to the internet and mobile devices is up substantially since 2014.

When to Use a Direct Connect or a Virtual Connect…or Both

Interconnection enables the private and direct exchange of data traffic between counterparties and creates a platform for networking between organizational boundaries, and it is growing at a rapid rate. According to the Global Interconnection Index, a market study published by Equinix, by 2020 the global Interconnection Bandwidth capacity growth rate is expected to outpace traditional connectivity approaches by 2X (IP networks) and 10X (MPLS networks).

How to Develop and Document a Winning Cloud Strategy

As with any significant business and technology transformation, the plan, process, policies and procedures underlying any cloud evolution should dictate a well-documented, living strategy that is agreed to, socialized, adhered to and regularly updated in support of an enterprise’s cloud journey. Moving to the cloud and leveraging the digital edge without a clear direction and well-thought out strategy can result in significant issues down the road for an enterprise in terms of time, resources, costs and missed expectations and goals.

How to Converse in Cloud: Blockchain Cloud

The emergence of blockchain cloud technology is no surprise. Blockchain distributed ledger solutions for secure transactional processing, the Internet of Things (IoT) and a number of other applications are ripe for major cloud brokers to provide a variety of Blockchain-as-a-Service (BaaS) offerings. But what is a blockchain cloud in relation to other types of cloud platforms?

The Future of IT: A Look at Blockchain and Quantum Computing

Innovation and great ideas can be instantly shared worldwide in the digital era, but even the most seamless electronic collaborations can’t replace the value of eye contact, a handshake and the chance to trade opinions and insights with respected peers face-to-face. That kind of information exchange is often inspiring, and Equinix and The Economic Council were looking to enable it when we recently partnered to host a delegation of German IT executives and members of the German and EU parliament in Silicon Valley.

Increase PII Security in the Cloud through Secure Key Generation & Management

Stored and accessible PII, which is broadly defined as any information that could be used to identify an individual, facilitates these transactions for all consumers. However, near-weekly reports of significant data breaches have raised concerns about the ability of retailers and other organizations to keep consumer records secure.