Private storage and hybrid cloud platforms enable direct and secure interconnection to public clouds, while ensuring the local security and auditability of PIP data. This allows for adherence to in-country privacy legislation, as well as consistent and reliable throughput performance and user QoE at scale.
Cloud security has always been a hot-button topic among enterprises, and with over 90% of companies using some form of public cloud computing, it continues to be debated among security professionals. Private and public cloud security is an evolving technology, and we’d like to cover some of the major revelations that we’ve seen from the industry in 2017.
Equinix SmartKey™ Beta Program Tests the Industry’s First SGX based Hardware Security Module-as-a-Service Powered by Fortanix
Today, we are announcing the launch of the Equinix SmartKey™ public beta program for the industry’s first HSM-as-a-Service, powered by Fortanix, based on Intel® Software Guard Extensions (SGX), a technology for application developers who are seeking to protect application code and data from disclosure or modification.
Enterprise security has become infinitely more difficult to achieve. Cybercrime is growing at the same pace and sophistication as evolving technologies within digital business, including those undisclosed computer-software (“Zero-day”) vulnerabilities in systems, applications, data and networks that hackers love to exploit.
In today’s mobile, digital world, the reality is: the larger the attack surface, the more sophisticated and brazen the attackers and the greater the vulnerability. Whether you’re a government, multinational company, or a small local business, a hacker’s goal for your company is the same: find your points of weakness and exploit them.
Complexity has exploded across today’s enterprise IT infrastructures, with businesses increasingly dependent on less understood and evolving technologies. To mitigate the risks that more sophisticated technologies and hacking capabilities present, new security guard rails are needed to protect people and companies from internal mistakes or unsanctioned behavior from bad actors.
There was a time when an application was typically a single piece of software running on a data center server or user PC, but today’s applications are more likely to be distributed combinations of interconnected, automated, often mobile components from multiple sources or vendors.
When thinking about virtualization’s impact on security, it is important to consider both the downside (“What new threats does it expose me to?”) and the upside (“How can I use it to my advantage?”). The answer depends on your implementation. And don’t forget interconnection.
Security analytics (on-premises or cloud) should be interconnected to the data they are analyzing at a more fundamental level, so that staff members no longer need to examine each alert or informational message, evaluate all details behind the events leading up to the alert, and then determine what to do.
Change in information technology (IT) is good. It paves the way to innovation and invention. And the massive digital transformation that the world is now undergoing is changing the way we do business and how we will power the digital economy into the future.