Equinix SmartKey™ Beta Program Tests the Industry’s First SGX based Hardware Security Module-as-a-Service Powered by Fortanix

Today, we are announcing the launch of the Equinix SmartKey™ public beta program for the industry’s first HSM-as-a-Service, powered by Fortanix, based on Intel® Software Guard Extensions (SGX), a technology for application developers who are seeking to protect application code and data from disclosure or modification.

Manage Growing Security Complexity with Edge-Based Analytics

Enterprise security has become infinitely more difficult to achieve. Cybercrime is growing at the same pace and sophistication as evolving technologies within digital business, including those undisclosed computer-software (“Zero-day”) vulnerabilities in systems, applications, data and networks that hackers love to exploit.

A Deafening Cybersecurity Wake-Up Call: What Will It Take to Answer?

In today’s mobile, digital world, the reality is: the larger the attack surface, the more sophisticated and brazen the attackers and the greater the vulnerability. Whether you’re a government, multinational company, or a small local business, a hacker’s goal for your company is the same: find your points of weakness and exploit them.

How to Create a Security Inspection Zone at the Digital Edge

There was a time when an application was typically a single piece of software running on a data center server or user PC, but today’s applications are more likely to be distributed combinations of interconnected, automated, often mobile components from multiple sources or vendors.

How Virtual Machine Tech Keeps Pace With Security Threats

When thinking about virtualization’s impact on security, it is important to consider both the downside (“What new threats does it expose me to?”) and the upside (“How can I use it to my advantage?”). The answer depends on your implementation. And don’t forget interconnection.

How to Master Enterprise Cloud Security

While security and privacy concerns are similar across cloud and traditional non-cloud services, cloud security concerns are amplified because transitioning to the public cloud requires shifting some control over organizational assets to the cloud provider, and those assets could be mismanaged.

How to Cure Security Alert Fatigue, and Still Protect your Cloud Infrastructure

Security analytics (on-premises or cloud) should be interconnected to the data they are analyzing at a more fundamental level, so that staff members no longer need to examine each alert or informational message, evaluate all details behind the events leading up to the alert, and then determine what to do.

3 Reasons to Put Digital IT at the Edge

Change in information technology (IT) is good. It paves the way to innovation and invention. And the massive digital transformation that the world is now undergoing is changing the way we do business and how we will power the digital economy into the future.

7 Bold Predictions for the Connected Enterprise

We can’t predict the future of the entire IT industry, but we sit at an unusually good vantage point at Equinix to make an educated, data-driven forecast about what we see coming. That’s because we have the capability to look at what’s trending with more than 8,000 customers across 21 markets within ecosystems that sit at the center of cloud, IoT and analytics growth. And the patterns we are seeing show a massive digital transformation under way.

Supercharging Cloud Security, Reliability and Scalability via Interconnection

The cloud promises enterprises a lot. Greater cost savings, better performance, an enriched user experience and increased business agility are often cited as the main drivers for cloud adoption. At the same time, many enterprises expect much less from the cloud when it comes to ensuring data safety and compliance.