Data Breakthrough Awards

The 2021 Data Breakthrough Awards Names StorMagic Witness as-a-Service as the “Overall Data Storage Solution of the Year”

StorMagic’s Witness as-a-Service (WaaS) product was recognized as the “Overall Data Storage Solution of the Year” in the 2021 Data Breakthrough Awards. We are so thrilled to be celebrating this achievement, and to be acknowledged as a leader in the data storage space! The Data Breakthrough Awards recognize the best companies, products and services in […]

Rommelsbacher

Rommelsbacher Eliminates Single Point of Failure and Ensures Maximum Uptime with StorMagic SvSAN

For more than 90 years, Rommelsbacher has been designing and producing electric appliances, and delivering them to countries around the world. Based in Germany, the company is family-owned and is dedicated to manufacturing first class kitchen products that provide “Pure Cooking Pleasure,” and are both functional and aesthetically pleasing.  Rommelsbacher was looking to upgrade its […]

Cybersecurity Beginners Guide featured

Cybersecurity – A Beginner’s Guide

Cybersecurity is a term used to describe the practice of defending networks, devices, applications, and data from unauthorized access and cyber threats. It consists of a variety of different technologies, tools, processes, and approaches, for ensuring data integrity, confidentiality, and availability.

Cybersecurity Excellence Awards

StorMagic Proudly Claims Gold in the 2021 Cybersecurity Excellence Awards

We are excited to announce that StorMagic was selected as a gold winner in two different categories of the 2021 Cybersecurity Excellence Awards. StorMagic KMaaS was awarded gold in the “Cybersecurity Product / Service Awards — Data Security” category, and SvKMS in the “Cybersecurity Industry Solutions Awards — Manufacturing” category.  Each year, Cybersecurity Insiders hosts […]

Channel Chiefs

CRN Names StorMagic CRO, Brian Grainger, a 2021 Channel Chief

Each year, CRN, a brand of the Channel Company, releases a list of leading IT channel vendor executives who continually demonstrate outstanding leadership, influence, innovation, and growth — i.e. CRN Channel Chiefs.  StorMagic is thrilled to announce that our CRO and Board Member, Brian Grainger, was included in this year’s list. To celebrate this achievement, […]

BYOK beginners guide featured image2

BYOK – A Beginner’s Guide

Bring Your Own Key (BYOK), also referred to as Customer Supplied Encryption Keys (CSEK), is a model of encryption key management that enables customers to take full control of their encryption keys when storing data in the cloud. It allows them to use their own encryption key management software to store their encrypted keys outside of the cloud, instead of in the cloud, alongside their data.

Green IT

Mitigating the Impact of Green IT Initiatives on High Availability

Organizations around the world are becoming more reliant on technology for everyday operations, and the demand for IT resources continues to grow exponentially. Many of today’s IT managers are faced with the challenge of implementing solutions that reduce their organization’s carbon footprints, without sacrificing performance or productivity. In this blog, we share several tips on […]

ARIA Cybersecurity

StorMagic Expands OEM Agreement with ARIA Cybersecurity to Deliver the Industry’s Smallest General-Purpose HSM

StorMagic has expanded our original equipment manufacturer (OEM) agreement with ARIA Cybersecurity Solutions, a business of CSPi. ARIA Cybersecurity is now able to embed StorMagic SvKMS enterprise key management software to deliver their ARIA microHSM product through channel partners worldwide. Through this expanded partnership, ARIA Cybersecurity is now delivering the industry’s smallest general purpose hardware […]

HSMs

Is There Still a Place for HSMs in Modern Data Protection?

Hardware Security Modules (HSMs) have been the standard for encryption for the last 20 years. But with the emergence of computing that spans on-prem, cloud and edge environments, there has been a shift away from physical, on-premise HSMs to software-based key management systems. With that said, are HSMs still relevant? Is an HSM best for […]

Edge Computing 100

StorMagic Recognized in CRN’s 2020 Edge Computing 100 List

We are thrilled to announce that CRN®, a brand of The Channel Company, included StorMagic in its first ever 2020 Edge Computing 100 list. This new list, selected by a panel of respected CRN editors, recognizes leading vendors whose technology provides the building blocks channel partners need to build next-generation intelligent edge solutions that bring […]

high availability

High Availability’s Role in Protecting Data and Improving Performance

High availability (HA) is vital to protecting sensitive data, and an important part of key management. Key management is central to data encryption – encryption keys are like the keys to your house, and act to protect your valuables (the encrypted data). But, much like standard house keys, key management has a number of potential […]

KMIP beginners guide featured image

KMIP – A Beginner’s Guide

The Key Management Interoperability Protocol (KMIP) is a universal language for secure data management across platforms. It was developed by the Organization for Advancement of Structured Information Standards (OASIS), with the purpose of enabling communication between key management systems and cryptographically-enabled applications.

security

New White Paper: 6 Technology Trends that Improve Data Security for Any Cloud

The popularity of cloud computing continues to grow, with many of today’s businesses moving their data and applications from traditional datacenters to the cloud. In fact, Gartner analysts estimate the worldwide cloud services market to be $258 billion in 2020, and grow to $513 billion by 2024. While the cloud offers many benefits to organizations, […]

Cyber Resilience Beginners Guide featured

Cyber Resilience – A Beginner’s Guide

While cyber security is incredibly important, organizations are beginning to realize that they need to take their data protection strategies a step further. The term “cyber resilience” is becoming more prevalent, as a means of describing an organization’s ability to continue operating and to uphold the integrity of their data, even in the event of a breach.

HPE Edgeline

Protect and Simplify the Edge with StorMagic SvSAN and HPE Edgeline Converged Edge Systems

We are thrilled to announce that StorMagic has expanded its partnership with Hewlett Packard Enterprise (HPE), through the validation of our virtual SAN software solution, SvSAN, with HPE Edgeline Converged Edge Systems.  Together, StorMagic and HPE are dedicated to designing hyperconverged solutions that are purpose-built for edge computing environments. Edge organizations (i.e. branch offices, retails […]

SvKMS 2.5

SvKMS 2.5: Latest Update Delivers Extended Support for Encryption Integrations

We are excited to announce that a new version of SvKMS, StorMagic’s enterprise encryption key management solution, is now available — SvKMS 2.5.   SvKMS 2.5 encompasses several expanded encryption integrations for on-prem, IaaS, and SaaS applications. This latest update provides new support for the Google Cloud External Key Management (EKM) Program, Azure Key Vault Managed […]

MongoDB

Encrypting in MongoDB? You’ll Need a Third Party Key Manager

Database security is a vital component of an overall data protection strategy, especially for organizations that manage and store highly sensitive data, such as financial information or health records. MongoDB is a non-relational, or noSQL database that has quickly become one of the world’s biggest database players, competing with large incumbent companies like Oracle and Microsoft […]

SvKMS demos

NEW SvKMS Demos: Initializing a Multi-Node Cluster and Configuring StorMagic SvKMS with Different Applications

StorMagic SvKMS is a one-of-a-kind key management solution, designed specifically for modern encryption infrastructures. It simplifies complex security configurations by providing a centralized, one-stop approach to key management and enables customers to deploy encryption wherever they need it – whether at the edge, datacenter, or cloud. SvKMS delivers the following benefits to customers:  Flexible: SvKMS […]

Financial

StorMagic SvSAN: Modern, Virtualized Storage for Banks and Financial Organizations

Banks and financial services organizations are faced with unique challenges when it comes to IT solutions and managing data. In regard to data storage in particular, financial institutions are often plagued with expensive and outdated architecture, slow speeds, and disruptive downtime. As these organizations begin researching ways to upgrade and modernize their IT, they are […]

Encryption Beginners Guide featured

Encryption – A Beginner’s Guide

Encryption is the process of protecting data by changing it from a readable form to an unreadable form. It uses complex algorithms to “scramble” and therefore protect data – as it’s unreadable and can’t be accessed.

edge in a box

Edge in a Box: Simple, Cost-Effective and Lean Solution Delivers 100% Uptime for Any Edge or Small Datacenter Location

Together, StorMagic, Schneider Electric, and HPE are revolutionizing the way edge computing environments manage their IT systems. We’ve collaborated to launch a new, all-inclusive solution called “Edge in a Box.” This one-of-a-kind offering enables edge sites to process, manage, and store data in minutes, with one of the leanest solutions on the market. Its low […]

Nutanix encryption

Meet Security and Regulatory Requirements with SvKMS and Nutanix Encryption

As technologies produce new means of creating, using, and benefiting from vast data stores, they also confront new security risks and regulatory requirements — especially for sensitive data.   Nutanix is a cloud computing company, leading the market in hyperconverged infrastructure appliances and software-defined storage. Nutanix’s software delivers a full infrastructure stack that integrates compute, virtualization, […]

software-defined storage

The Evolution of Software-Defined Storage and the Virtual SAN

Hyperconvergence and software-defined-storage (SDS) have come a long way in recent times and branched into areas that were thought impossible, just a few years ago.  IT has always been about eliminating single points of failure. Roll back to the 90s and early 00s when companies ran their applications and services on bare-metal servers; the idea […]

Virtualized Storage Beginners Guide featured

Virtualized Storage – A Beginner’s Guide

Virtualized storage, or storage virtualization, is a technological concept developed within the past few decades. It enables organizations to remove the traditional boundaries of physical storage devices, by abstracting the disks and drives, and presenting them as a single, centralized pool of storage capacity.

Virtual SAN Beginners Guide featured

Virtual SAN – A Beginner’s Guide

A virtual storage area network (SAN) is a software-based component that provides a virtualized ‘pool’ of storage to multiple virtual machines (VMs) and applications. In order to achieve this, data is passed (shared) between servers over a network using a protocol such as iSCSI or fibre channel.

compliance

An Introduction to Regulatory Compliance and Data Protection

With personal data becoming more important and bountiful in a digital and virtual world, the importance of regulatory compliance and data protection, storage, and management has also increased. Major regulations exist in several specific sectors, including, in the US, healthcare (HIPAA and HiTech), financial services (PCI-DSS and GLBA), biotechnology (FDA) and the energy industry, and […]

software RAID

Hardware vs. Software RAID: How to Make a Wise Choice

Rapid developments in digital and mobile technologies are making edge computing more prevalent and critical to the success of businesses across a wide range of industries. Organizations that are implementing edge computing technology are commonly faced with deciding which is better suited for their environment – hardware or software RAID. But how do you know […]

Mt. Hood

Mt. Hood Ski Resort Reduces Hardware Requirements and Costs by 33% with StorMagic SvSAN

Based in Oregon, Mt. Hood Meadows Ski Resort offers visitors skiing, snowboarding, and panoramic views from its 7,300-foot elevation. The resort was previously utilizing a physical SAN appliance to manage its point-of-sale transactional data. They decided to update and virtualize their IT environment with HPE StoreVirtual, which was later discontinued. Earlier this year, StorMagic’s SvSAN virtual […]

Virtual SAN

Looking to Reduce Your IT Budget? Consider Switching to a Virtual SAN

There are a number of benefits associated with transitioning from traditional, physical storage infrastructure and switching to a virtual SAN (virtual storage network). However, one of the most notable and advantageous for organizations, at the edge and beyond, is the significant cost savings delivered by making the switch.  Traditional datacenter models require a physical NAS […]

encryption key management cloud

Best Practices For Encryption Key Management When Storing Data in the Cloud

The proliferation of cloud-based services has radically simplified day-to-day data management and decreased overhead costs for many businesses. It is currently estimated that more than 60% of organizations have moved to cloud-based data systems, with many using the cloud to store sensitive information. At the same time however, cloud technology has brought with it a […]

ecommerce

Ecommerce Merchants: Stay Resilient in the Face of Downtime and Cyber Threats

Ecommerce has become a critical pillar of the global economy. Prior to the current pandemic, 2 billion people were buying from over 7 million online businesses according to etailinsights. As COVID-19 has progressed, brick-and-mortar businesses around the globe have adopted many new precautions and regulations to keep their customers safe. This includes transitioning to primarily, […]

VMware fault tolerance

VMware Fault Tolerance vs. High Availability

Businesses today depend heavily on their IT systems to keep everyday operations up and running. Many organizations require minimal to zero disruption to applications and services, in order to maintain productivity and profitability. However, eliminating IT downtime entirely and achieving true high availability is often easier said than done. What is Fault Tolerance? Fault Tolerance […]

TorIX

TorIX Eliminates Downtime and Improves Performance Rates with StorMagic SvSAN

Toronto Internet Exchange (TorIX) is a non-profit organization created to directly connect the internet traffic of Canadian businesses via local network infrastructure. TorIX was previously using a VMware installation without replication, and wanted to find a new solution that reduced hardware dependency to decrease costs and complexities. Their sights were set on a hyperconverged solution […]

High Availability Beginners Guide featured image

High Availability – A Beginner’s Guide

High Availability (HA) describes a system that can sustain long periods of continuous operation, and remain operational, even if a part of the system is no longer in service. Decreased downtime, the elimination of single points of failure, and replication and distribution of data across multiple locations, are all contributing factors that come together to create a high availability infrastructure.

StorMagic MSP Program infographic featured image

Infographic: StorMagic MSP Program

StorMagic’s MSP Program addresses the pain points faced by service providers when offering a key management service to their customers. The MSP Program allows StorMagic SvKMS encryption key management to be integrated into an MSP’s suite of services, delivering differentiated data security through a unique high margin offering. Find out more about the key benefits […]

IoT

IoT and Security: Protecting Data in the Internet of Things

The internet of things (IoT) – the interconnection of everyday devices via networks that facilitate interactions, including the exchange of data – is an ever-present force in the contemporary world. Whether in our personal or professional lives, we seem to always be “connected” to IoT endpoints.  The growth of these types of network capacities comes […]

flash

All-Flash vs. Hard Disk Drives: Which Are Best Suited for the Edge?

One of the hottest debates in the IT world centers around all-flash versus traditional hard disk drives. Once seen as a luxury, reserved for corporations like Google, Facebook, and the NSA, solid-state disk (SSD) drives have shifted to become almost commonplace in both enterprise and consumer technology. The need for increased performance and smaller footprints […]

MSPs

SvKMS: Differentiated Data Security for MSPs

Organizations around the globe are creating, sharing, and storing vast amounts of data every day. As technology evolves and that data continues to grow, securing it is becoming more and more critical for businesses looking to keep their most valuable assets safe.  It’s no secret that cybersecurity has become an essential component within IT environments. […]

key management

Key Management – A Beginners Guide

Key management refers to the process of creating, using, storing, exchanging, archiving, discarding, and replacing cryptographic keys in an encryption system. Its purpose is to secure an organization’s keys, and to prevent cybercriminals or unauthorized individuals from accessing and corrupting sensitive data that has been protected through encryption.

vSphere 7.0

StorMagic SvSAN Compatibility with VMware vSphere 7.0

Many of today’s organizations are modernizing their traditional IT infrastructure, in an effort to save money, improve performance, and reduce downtime. They are taking steps to virtualize their environments by replacing their clunky, physical IT equipment, with virtualized systems that enable the hyperconvergence of compute, networking, and storage resources.  Storage virtualization enables the pooling of […]

Social Media – retail 2 infog

Infographic: Talking Shop with StorMagic

SvSAN provides the most simple and lightweight virtual SAN solution on the market, significantly reducing costs per site. This makes it the perfect storage infrastructure solution for retailers of all sizes. Find out why Sheetz Inc., Autohaus Gruppe Seitz and allnatura chose to deploy SvSAN in their stores. Read more about SvSAN for Retail, or browse […]