Cyber Security Edge Analytics

For most, “analytics” represents a broad term, and rightfully so. As the prevailing winds of digital transformation continue to push interconnection to the digital edge, a plethora of real-time analytics requirements (and capabilities) have irreversibly raised the ante for immediately available insights on topics as far ranging as petroleum futures and retail purchasing trends to the depths of cyber security counter-intelligence.

The Balance Between Data Security and Digital Transformation

What was physical is rapidly becoming digital, as every industry undergoes a digital transformation. Digital wallets, with details about your identity and your credit card information encrypted somewhere in the cloud, are replacing credit and debit cards, which have largely replaced printed currency and checks. Newspapers, magazines, music and movies are consumed digitally. Robotics eliminate manual assembly processes and deliver consistent quality at lower cost. The notion of driving a car may soon become as outdated as dialing a phone.

Encryption Key Management Best Practices

Data encryption is the bedrock of cybersecurity. Encrypted data remains worthless ciphertext without access to encryption keys; hardware security modules (HSM) are well-established means for securing those keys in on-premises data centers. Data security teams are well-versed in the process of purchasing, provisioning and managing those HSMs.

Can a KMS Minimize the Chance of a Data Protection Breach?

Guarding against data breaches becomes even more challenging as organizations move data and applications from the security of their on-premise IT infrastructure to the cloud, where the responsibility for protecting data is shared with the cloud provider. Because encryption keys play a vital role in this scenario by shielding data from potential breaches, the approach to encryption key management requires careful evaluation.

What Were the Top 5 Equinix Trends of 2016?

It’s time to welcome 2017, but before we pop the champagne, make our resolutions or let loose showers of confetti, we at Equinix want to give 2016 a little love before it’s past us, because it was quite a year.

Cloud-Enabled Identity Management at Equinix: Data Security

Considering cloud-enabled identity management for your company? Equinix's CIO, Brian Lillie, explains what steps Equinix took to better serve its employees and customers...

Cloud-Enabled Identity Management: Security Challenges

In a new age of increased mobility and bring-your-own-device (BYOD) to the office, Equinix CIO Brian Lillie explains why "Fortress Enterprise" is a thing of the past...

Cloud-Enabled Identity Management: Employees Are Consumers

In the age of increased mobility and bring-your-own-device (BYOD), many enterprises are struggling with how to maintain the high levels of data security they are accustomed to...