The Balance Between Data Security and Digital Transformation

What was physical is rapidly becoming digital, as every industry undergoes a digital transformation. Digital wallets, with details about your identity and your credit card information encrypted somewhere in the cloud, are replacing credit and debit cards, which have largely replaced printed currency and checks. Newspapers, magazines, music and movies are consumed digitally. Robotics eliminate manual assembly processes and deliver consistent quality at lower cost. The notion of driving a car may soon become as outdated as dialing a phone.

Data Privacy Day: 3 Trends to Watch

Today is Data Privacy Day, an international awareness day held annually on January 28 to promote the importance of respecting privacy, safeguarding data and enabling trust. It was initially celebrated in Europe in 2007 to commemorate the Jan 28, 1981 signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection. Today, it is celebrated worldwide, with many events, resources and even a live stream sponsored by the National Cyber Security Alliance.

Encryption Key Management Best Practices

Data encryption is the bedrock of cybersecurity. Encrypted data remains worthless ciphertext without access to encryption keys; hardware security modules (HSM) are well-established means for securing those keys in on-premises data centers. Data security teams are well-versed in the process of purchasing, provisioning and managing those HSMs.

Data Breaches and Penalties

Every organization strives to keep data secure. However, in light of the frequency of successful cyberattacks and the often less-than-forthright acknowledgment of such attacks by major organizations, governments have stepped in to implement data processing and privacy regulations which impose severe penalties for violations

5 IT Predictions for Digital Business in 2019

And as business and technology leaders move closer to another year of high stakes digital transformations and the big IT decisions that power them, we’re taking a closer look at the technologies that will make the biggest digital business impact in 2019.

Equinix and F5 Networks Deliver Automated HSM as a Service

Together, Equinix and F5 Networks have delivered flexible, programmable technologies that create new hybrid IT environments without compromising on security or control. At the F5 Agility 2018 event in Boston, Equinix and F5 are promoting a new collaboration to deliver encryption key management as a service for hybrid/multicloud environments via the F5 BIG-IP as a Cloud Gateway and Equinix SmartKey™ key management solution by the end of this year.

Diminishing the Pain of Encryption Key Management

Based on our experience in working with thousands of customers who’ve moved data and applications to the cloud, we’ve identified three critical pain points that impede an enterprise’s ability to effectively and efficiently manage encryption keys in the cloud.

Improve Cloud Security Management with a Cloud-Based HSM

When we talk to companies around the world, a common topic of discussion is the transformational nature of cloud technologies. In a very short time, the cloud has disrupted every aspect of how IT infrastructure, resources and software are deployed and managed. While there’s near-universal agreement on the economic benefits of this, it’s not all good news: In these discussions, the conversation invariably turns toward the growing challenges of cloud security management - in particular, the management of the encryption keys that are fundamental to cloud security.

Simplifying Data Sovereignty with Cloud-Based Key Management

Recent technological advances, such as the advent of the cloud and improvements in the areas of global communications, commodity storage and processing speed, give organizations the ability to store data anywhere in the world and manage it remotely. While these advances have undeniable benefits, they’ve also created drawbacks for global organizations, which must contend with an ever-widening set of data regulations. These regulations govern the acquisition, storage and processing of any personally identifiable information associated with customers and employees, as well as the critical operational data associated with utilities, urban infrastructure and transportation. For data security experts, this means increased demands and a heightened workload.

Fulfill GDPR Personal Data Requirements with HSM as a Service

The best approach to delivering each of the aforementioned capabilities is an HSM as a Service (HSMaaS) solution. It leverages the established strengths of the cloud—wide availability, service on demand and scalability—to make encryption keys easy to implement and manage.