Can You Achieve HSM Security with Cloud Flexibility?

We’re immersed in the world of security this week at the RSA Conference 2018 in San Francisco. There’s no question that the recent flood of news regarding corporate data security breaches and the need for significantly better policies to protect personal information are just a couple of the reasons why this event could not be more timely and relevant.

5 Things We Learned From Our Customers About Multicloud Security

You learn a lot from your customers, especially how they use your products and what they find useful. At least that is what we experienced during our Equinix SmartKey public beta trial with dozens of enterprise and service provider participants.

3 Ways to Ensure Your Data’s Safety

On this World Backup Day, we’re going to talk about some of the ways you can protect your data that go hand-in-hand with your data backup and recovery platform and ensure that you’ve covered all of your data protection bases. This includes geographically distributed locations, private interconnection and multicloud data encryption, key management and tokenization as a service.

SmartKey Delivers Secure, Scalable Encryption Key Management

The hybrid multicloud is the architecture of the future because it fits where business is going, and so does Equinix SmartKey™, a new as-a-service security offering we’re launching today. SmartKey delivers multicloud-ready encryption key management, which we know is a critical part of doing business in an increasingly digital world.

5 Cloud Security Revelations From 2017

Cloud security has always been a hot-button topic among enterprises, and with over 90% of companies using some form of public cloud computing, it continues to be debated among security professionals. Private and public cloud security is an evolving technology, and we’d like to cover some of the major revelations that we’ve seen from the industry in 2017.

How to Create a Security Inspection Zone at the Digital Edge

There was a time when an application was typically a single piece of software running on a data center server or user PC, but today’s applications are more likely to be distributed combinations of interconnected, automated, often mobile components from multiple sources or vendors.

How to Master Enterprise Cloud Security

While security and privacy concerns are similar across cloud and traditional non-cloud services, cloud security concerns are amplified because transitioning to the public cloud requires shifting some control over organizational assets to the cloud provider, and those assets could be mismanaged.

How to Cure Security Alert Fatigue, and Still Protect your Cloud Infrastructure

Security analytics (on-premises or cloud) should be interconnected to the data they are analyzing at a more fundamental level, so that staff members no longer need to examine each alert or informational message, evaluate all details behind the events leading up to the alert, and then determine what to do.

Supercharging Cloud Security, Reliability and Scalability via Interconnection

The cloud promises enterprises a lot. Greater cost savings, better performance, an enriched user experience and increased business agility are often cited as the main drivers for cloud adoption. At the same time, many enterprises expect much less from the cloud when it comes to ensuring data safety and compliance.

How to Overcome Common Hybrid Cloud Security Issues

Planning a secure hybrid cloud infrastructure can be challenging, mainly because many enterprises don't have available staff or expertise. Look for a partner that has broad cloud expertise and experience, as well as access to a dense ecosystem of cloud and cloud security service providers that offer solutions such as Infrastructure-Protection-as-a-Service or protection against DDoS attacks.