Maneuvering the Data Privacy Maze

Encryption has been the primary mechanism to protect data since public key encryption was invented in 1976. Encryption does not allow data to be “seen,” and generally applies to three data states: “in transit” data moving between different places, “at rest” data on disk and “in memory” data currently being processed on a system.

The Art of Tokenization for Secure Digital Payments

To remedy this embarrassment and bring a greater degree of security, the payment card industry as well as real-time payment platforms are  moving to tokenization—a process by which a surrogate value in the form of a series of randomly-generated numbers, known as a “token,” replaces the primary account number.

Securing the Unsecurable in Interconnected Digital Technology: Part I – Interconnection Oriented Architecture

Advances in the use of digital technology have improved customer experiences in most industries. Look around—there isn’t a day that we’re not benefitting, as individuals and as a society, from recent advances in digital technology, whether by using an innovative application or by discovering a disruptive digital service capable of transforming some aspect of our daily routine.

Keeping Data Secure in the Digital Revolution

Today, developers take advantage of thousands of productivity-enhancing tools and resources and collaborate in real-time with colleagues worldwide to deliver and support software applications and solutions that improve individual lives as well as corporate performance.

Equinix and F5 Networks Deliver Automated HSM as a Service

Together, Equinix and F5 Networks have delivered flexible, programmable technologies that create new hybrid IT environments without compromising on security or control. At the F5 Agility 2018 event in Boston, Equinix and F5 are promoting a new collaboration to deliver encryption key management as a service for hybrid/multicloud environments via the F5 BIG-IP as a Cloud Gateway and Equinix SmartKey™ key management solution by the end of this year.

Diminishing the Pain of Encryption Key Management

Based on our experience in working with thousands of customers who’ve moved data and applications to the cloud, we’ve identified three critical pain points that impede an enterprise’s ability to effectively and efficiently manage encryption keys in the cloud.

Join Equinix at F5 Agility – August 15th & 16th

Organizations are increasingly migrating applications and workloads to public clouds to achieve greater exibility and improved economic efficiency. As they do so, they need to ensure that they are still able to deliver required levels of performance, availability, security and compliance. Together Equinix and F5 enable you to move your apps to the cloud with con dence in the most secure manner possible.

Improve Cloud Security Management with a Cloud-Based HSM

When we talk to companies around the world, a common topic of discussion is the transformational nature of cloud technologies. In a very short time, the cloud has disrupted every aspect of how IT infrastructure, resources and software are deployed and managed. While there’s near-universal agreement on the economic benefits of this, it’s not all good news: In these discussions, the conversation invariably turns toward the growing challenges of cloud security management - in particular, the management of the encryption keys that are fundamental to cloud security.

Simplifying Data Sovereignty with Cloud-Based Key Management

Recent technological advances, such as the advent of the cloud and improvements in the areas of global communications, commodity storage and processing speed, give organizations the ability to store data anywhere in the world and manage it remotely. While these advances have undeniable benefits, they’ve also created drawbacks for global organizations, which must contend with an ever-widening set of data regulations. These regulations govern the acquisition, storage and processing of any personally identifiable information associated with customers and employees, as well as the critical operational data associated with utilities, urban infrastructure and transportation. For data security experts, this means increased demands and a heightened workload.

How Secure is Amazon’s Key Management Service (AWS KMS)?

AWS CloudHSM is designed for organizations that formerly used HSMs to manage encryption keys in their own data centers and would like to continue in the same vein by using HSMs provided and maintained by AWS. With CloudHSM, HSMs purchased, provisioned and managed by an organization within their own data centers are replaced by HSMs purchased, provisioned and managed by Amazon.