Improve Cloud Security Management with a Cloud-Based HSM

When we talk to companies around the world, a common topic of discussion is the transformational nature of cloud technologies. In a very short time, the cloud has disrupted every aspect of how IT infrastructure, resources and software are deployed and managed. While there’s near-universal agreement on the economic benefits of this, it’s not all good news: In these discussions, the conversation invariably turns toward the growing challenges of cloud security management - in particular, the management of the encryption keys that are fundamental to cloud security.

Simplifying Data Sovereignty with Cloud-Based Key Management

Recent technological advances, such as the advent of the cloud and improvements in the areas of global communications, commodity storage and processing speed, give organizations the ability to store data anywhere in the world and manage it remotely. While these advances have undeniable benefits, they’ve also created drawbacks for global organizations, which must contend with an ever-widening set of data regulations. These regulations govern the acquisition, storage and processing of any personally identifiable information associated with customers and employees, as well as the critical operational data associated with utilities, urban infrastructure and transportation. For data security experts, this means increased demands and a heightened workload.

Microsoft Teams up with Equinix for Greater Cloud Data Security

Enterprises should consider a vendor-neutral HSM-as-a-Service that provides the protection and a service level agreement (SLA) to effectively support the “shared-responsibility” model between cloud providers and their customers.

Can a KMS Minimize the Chance of a Data Protection Breach?

Guarding against data breaches becomes even more challenging as organizations move data and applications from the security of their on-premise IT infrastructure to the cloud, where the responsibility for protecting data is shared with the cloud provider. Because encryption keys play a vital role in this scenario by shielding data from potential breaches, the approach to encryption key management requires careful evaluation.

Should You Use a Key Management Service with Multicloud Environments?

As you transition from on-premise computing to cloud computing, securing your data in the cloud is paramount. Since encryption is a preferred way to secure data, encryption key management is a critical concern. Cloud providers have responded to this need with two options: a hardware security module (HSM) or a key management service (KMS). Each approach features benefits and drawbacks.

Can You Achieve HSM Security with Cloud Flexibility?

We’re immersed in the world of security this week at the RSA Conference 2018 in San Francisco. There’s no question that the recent flood of news regarding corporate data security breaches and the need for significantly better policies to protect personal information are just a couple of the reasons why this event could not be more timely and relevant.

5 Things We Learned From Our Customers About Multicloud Security

You learn a lot from your customers, especially how they use your products and what they find useful. At least that is what we experienced during our Equinix SmartKey public beta trial with dozens of enterprise and service provider participants.

3 Ways to Ensure Your Data’s Safety

On this World Backup Day, we’re going to talk about some of the ways you can protect your data that go hand-in-hand with your data backup and recovery platform and ensure that you’ve covered all of your data protection bases. This includes geographically distributed locations, private interconnection and multicloud data encryption, key management and tokenization as a service.

SmartKey Delivers Secure, Scalable Encryption Key Management

The hybrid multicloud is the architecture of the future because it fits where business is going, and so does Equinix SmartKey™, a new as-a-service security offering we’re launching today. SmartKey delivers multicloud-ready encryption key management, which we know is a critical part of doing business in an increasingly digital world.

5 Cloud Security Revelations From 2017

Cloud security has always been a hot-button topic among enterprises, and with over 90% of companies using some form of public cloud computing, it continues to be debated among security professionals. Private and public cloud security is an evolving technology, and we’d like to cover some of the major revelations that we’ve seen from the industry in 2017.