Encryption Key Management Best Practices

Data encryption is the bedrock of cybersecurity. Encrypted data remains worthless ciphertext without access to encryption keys; hardware security modules (HSM) are well-established means for securing those keys in on-premises data centers. Data security teams are well-versed in the process of purchasing, provisioning and managing those HSMs.

Can a KMS Minimize the Chance of a Data Protection Breach?

Guarding against data breaches becomes even more challenging as organizations move data and applications from the security of their on-premise IT infrastructure to the cloud, where the responsibility for protecting data is shared with the cloud provider. Because encryption keys play a vital role in this scenario by shielding data from potential breaches, the approach to encryption key management requires careful evaluation.

What Were the Top 5 Equinix Trends of 2016?

It’s time to welcome 2017, but before we pop the champagne, make our resolutions or let loose showers of confetti, we at Equinix want to give 2016 a little love before it’s past us, because it was quite a year.

Cloud-Enabled Identity Management at Equinix: Data Security

Considering cloud-enabled identity management for your company? Equinix's CIO, Brian Lillie, explains what steps Equinix took to better serve its employees and customers...

Cloud-Enabled Identity Management: Security Challenges

In a new age of increased mobility and bring-your-own-device (BYOD) to the office, Equinix CIO Brian Lillie explains why "Fortress Enterprise" is a thing of the past...

Cloud-Enabled Identity Management: Employees Are Consumers

In the age of increased mobility and bring-your-own-device (BYOD), many enterprises are struggling with how to maintain the high levels of data security they are accustomed to...