You learn a lot from your customers, especially how they use your products and what they find useful. At least that is what we experienced during our Equinix SmartKey public beta trial with dozens of enterprise and service provider participants.
Equinix SmartKey™ Beta Program Tests the Industry’s First SGX based Hardware Security Module-as-a-Service Powered by Fortanix
Today, we are announcing the launch of the Equinix SmartKey™ public beta program for the industry’s first HSM-as-a-Service, powered by Fortanix, based on Intel® Software Guard Extensions (SGX), a technology for application developers who are seeking to protect application code and data from disclosure or modification.
Enterprise security has become infinitely more difficult to achieve. Cybercrime is growing at the same pace and sophistication as evolving technologies within digital business, including those undisclosed computer-software (“Zero-day”) vulnerabilities in systems, applications, data and networks that hackers love to exploit.
In today’s mobile, digital world, the reality is: the larger the attack surface, the more sophisticated and brazen the attackers and the greater the vulnerability. Whether you’re a government, multinational company, or a small local business, a hacker’s goal for your company is the same: find your points of weakness and exploit them.
There was a time when an application was typically a single piece of software running on a data center server or user PC, but today’s applications are more likely to be distributed combinations of interconnected, automated, often mobile components from multiple sources or vendors.
When thinking about virtualization’s impact on security, it is important to consider both the downside (“What new threats does it expose me to?”) and the upside (“How can I use it to my advantage?”). The answer depends on your implementation. And don’t forget interconnection.
While security and privacy concerns are similar across cloud and traditional non-cloud services, cloud security concerns are amplified because transitioning to the public cloud requires shifting some control over organizational assets to the cloud provider, and those assets could be mismanaged.
Security analytics (on-premises or cloud) should be interconnected to the data they are analyzing at a more fundamental level, so that staff members no longer need to examine each alert or informational message, evaluate all details behind the events leading up to the alert, and then determine what to do.
Change in information technology (IT) is good. It paves the way to innovation and invention. And the massive digital transformation that the world is now undergoing is changing the way we do business and how we will power the digital economy into the future.
We can’t predict the future of the entire IT industry, but we sit at an unusually good vantage point at Equinix to make an educated, data-driven forecast about what we see coming. That’s because we have the capability to look at what’s trending with more than 8,000 customers across 21 markets within ecosystems that sit at the center of cloud, IoT and analytics growth. And the patterns we are seeing show a massive digital transformation under way.