The Information Economy Currency: Data

Residing on disks, in computer memory or transferred by wire or wireless, data increasingly drives global economies. Try going a day without internet access. How isolated do you feel when you’re out of cell-tower range? Your day is driven by data, and the value of data is defined by its context and usage.

The Art of Tokenization for Secure Digital Payments

To remedy this embarrassment and bring a greater degree of security, the payment card industry as well as real-time payment platforms are  moving to tokenization—a process by which a surrogate value in the form of a series of randomly-generated numbers, known as a “token,” replaces the primary account number.

Improve Cloud Security Management with a Cloud-Based HSM

When we talk to companies around the world, a common topic of discussion is the transformational nature of cloud technologies. In a very short time, the cloud has disrupted every aspect of how IT infrastructure, resources and software are deployed and managed. While there’s near-universal agreement on the economic benefits of this, it’s not all good news: In these discussions, the conversation invariably turns toward the growing challenges of cloud security management - in particular, the management of the encryption keys that are fundamental to cloud security.

Hardware Security Module (HSM) vs. Key Management Service (KMS)

The cloud strategy you adopt—private, hybrid, public or multicloud—is a key factor in the decision as to which encryption key management strategy will work best for your enterprise. For best results, your key strategy should fit your long-term cloud strategy and should be applied consistently across your enterprise.

Microsoft Teams up with Equinix for Greater Cloud Data Security

Enterprises should consider a vendor-neutral HSM-as-a-Service that provides the protection and a service level agreement (SLA) to effectively support the “shared-responsibility” model between cloud providers and their customers.

Increase PII Security in the Cloud through Secure Key Generation & Management

Stored and accessible PII, which is broadly defined as any information that could be used to identify an individual, facilitates these transactions for all consumers. However, near-weekly reports of significant data breaches have raised concerns about the ability of retailers and other organizations to keep consumer records secure.

Fulfill GDPR Personal Data Requirements with HSM as a Service

The best approach to delivering each of the aforementioned capabilities is an HSM as a Service (HSMaaS) solution. It leverages the established strengths of the cloud—wide availability, service on demand and scalability—to make encryption keys easy to implement and manage.

Should You Use a Key Management Service with Multicloud Environments?

As you transition from on-premise computing to cloud computing, securing your data in the cloud is paramount. Since encryption is a preferred way to secure data, encryption key management is a critical concern. Cloud providers have responded to this need with two options: a hardware security module (HSM) or a key management service (KMS). Each approach features benefits and drawbacks.

Can You Achieve HSM Security with Cloud Flexibility?

We’re immersed in the world of security this week at the RSA Conference 2018 in San Francisco. There’s no question that the recent flood of news regarding corporate data security breaches and the need for significantly better policies to protect personal information are just a couple of the reasons why this event could not be more timely and relevant.

5 Things We Learned From Our Customers About Multicloud Security

You learn a lot from your customers, especially how they use your products and what they find useful. At least that is what we experienced during our Equinix SmartKey public beta trial with dozens of enterprise and service provider participants.