Microsoft Teams up with Equinix for Greater Cloud Data Security

Enterprises should consider a vendor-neutral HSM-as-a-Service that provides the protection and a service level agreement (SLA) to effectively support the “shared-responsibility” model between cloud providers and their customers.

Can a KMS Minimize the Chance of a Data Protection Breach?

Guarding against data breaches becomes even more challenging as organizations move data and applications from the security of their on-premise IT infrastructure to the cloud, where the responsibility for protecting data is shared with the cloud provider. Because encryption keys play a vital role in this scenario by shielding data from potential breaches, the approach to encryption key management requires careful evaluation.

Should You Use a Key Management Service with Multicloud Environments?

As you transition from on-premise computing to cloud computing, securing your data in the cloud is paramount. Since encryption is a preferred way to secure data, encryption key management is a critical concern. Cloud providers have responded to this need with two options: a hardware security module (HSM) or a key management service (KMS). Each approach features benefits and drawbacks.

Can You Achieve HSM Security with Cloud Flexibility?

We’re immersed in the world of security this week at the RSA Conference 2018 in San Francisco. There’s no question that the recent flood of news regarding corporate data security breaches and the need for significantly better policies to protect personal information are just a couple of the reasons why this event could not be more timely and relevant.

5 Things We Learned From Our Customers About Multicloud Security

You learn a lot from your customers, especially how they use your products and what they find useful. At least that is what we experienced during our Equinix SmartKey public beta trial with dozens of enterprise and service provider participants.

3 Ways to Ensure Your Data’s Safety

On this World Backup Day, we’re going to talk about some of the ways you can protect your data that go hand-in-hand with your data backup and recovery platform and ensure that you’ve covered all of your data protection bases. This includes geographically distributed locations, private interconnection and multicloud data encryption, key management and tokenization as a service.

SmartKey Delivers Secure, Scalable Encryption Key Management

The hybrid multicloud is the architecture of the future because it fits where business is going, and so does Equinix SmartKey™, a new as-a-service security offering we’re launching today. SmartKey delivers multicloud-ready encryption key management, which we know is a critical part of doing business in an increasingly digital world.

5 Cloud Security Revelations From 2017

Cloud security has always been a hot-button topic among enterprises, and with over 90% of companies using some form of public cloud computing, it continues to be debated among security professionals. Private and public cloud security is an evolving technology, and we’d like to cover some of the major revelations that we’ve seen from the industry in 2017.

How to Create a Security Inspection Zone at the Digital Edge

There was a time when an application was typically a single piece of software running on a data center server or user PC, but today’s applications are more likely to be distributed combinations of interconnected, automated, often mobile components from multiple sources or vendors.

How to Master Enterprise Cloud Security

While security and privacy concerns are similar across cloud and traditional non-cloud services, cloud security concerns are amplified because transitioning to the public cloud requires shifting some control over organizational assets to the cloud provider, and those assets could be mismanaged.