SmartKey Delivers Secure, Scalable Encryption Key Management

The hybrid multicloud is the architecture of the future because it fits where business is going, and so does Equinix SmartKey™, a new as-a-service security offering we’re launching today. SmartKey delivers multicloud-ready encryption key management, which we know is a critical part of doing business in an increasingly digital world.

New Year, New Privacy Regulations. Are You Ready?

Private storage and hybrid cloud platforms enable direct and secure interconnection to public clouds, while ensuring the local security and auditability of PIP data. This allows for adherence to in-country privacy legislation, as well as consistent and reliable throughput performance and user QoE at scale.

5 Cloud Security Revelations From 2017

Cloud security has always been a hot-button topic among enterprises, and with over 90% of companies using some form of public cloud computing, it continues to be debated among security professionals. Private and public cloud security is an evolving technology, and we’d like to cover some of the major revelations that we’ve seen from the industry in 2017.

Equinix SmartKey™ Beta Program Tests the Industry’s First SGX based Hardware Security Module-as-a-Service Powered by Fortanix

Today, we are announcing the launch of the Equinix SmartKey™ public beta program for the industry’s first HSM-as-a-Service, powered by Fortanix, based on Intel® Software Guard Extensions (SGX), a technology for application developers who are seeking to protect application code and data from disclosure or modification.

Manage Growing Security Complexity with Edge-Based Analytics

Enterprise security has become infinitely more difficult to achieve. Cybercrime is growing at the same pace and sophistication as evolving technologies within digital business, including those undisclosed computer-software (“Zero-day”) vulnerabilities in systems, applications, data and networks that hackers love to exploit.

A Deafening Cybersecurity Wake-Up Call: What Will It Take to Answer?

In today’s mobile, digital world, the reality is: the larger the attack surface, the more sophisticated and brazen the attackers and the greater the vulnerability. Whether you’re a government, multinational company, or a small local business, a hacker’s goal for your company is the same: find your points of weakness and exploit them.

How to Enforce Security at the Digital Edge

Complexity has exploded across today’s enterprise IT infrastructures, with businesses increasingly dependent on less understood and evolving technologies. To mitigate the risks that more sophisticated technologies and hacking capabilities present, new security guard rails are needed to protect people and companies from internal mistakes or unsanctioned behavior from bad actors.

How to Create a Security Inspection Zone at the Digital Edge

There was a time when an application was typically a single piece of software running on a data center server or user PC, but today’s applications are more likely to be distributed combinations of interconnected, automated, often mobile components from multiple sources or vendors.

How Virtual Machine Tech Keeps Pace With Security Threats

When thinking about virtualization’s impact on security, it is important to consider both the downside (“What new threats does it expose me to?”) and the upside (“How can I use it to my advantage?”). The answer depends on your implementation. And don’t forget interconnection.

How to Cure Security Alert Fatigue, and Still Protect your Cloud Infrastructure

Security analytics (on-premises or cloud) should be interconnected to the data they are analyzing at a more fundamental level, so that staff members no longer need to examine each alert or informational message, evaluate all details behind the events leading up to the alert, and then determine what to do.