We are excited to announce that SvKMS is now officially certified as a third-party encryption key management solution for Commvault encrypted backups. Commvault is a data management company that specializes in backup and recovery, cloud and infrastructure management, retention, and compliance. Nowadays, there is an increased need to protect data that exists in disparate environments […]
What is Trusted Computing? Trusted Computing is a broad term that refers to technologies and proposals that aims to make computing more secure through hardware enhancements and associated software modifications. It can be broken down into four different categories: Memory Curtaining: Provides full isolation of sensitive areas of memories, and keeps memory from being read […]
Each year, CRN, a brand of the Channel Company, releases a list of leading IT channel vendor executives who continually demonstrate outstanding leadership, influence, innovation, and growth — i.e. CRN Channel Chiefs. StorMagic is thrilled to announce that our CRO and Board Member, Brian Grainger, was included in this year’s list. To celebrate this achievement, […]
According to the research firm Gartner, the events of 2020 have accelerated cloud adoption to the point that technology leaders should follow “cloud first” as a guiding principle. However, while “cloud first” may be the new standard, data still exists in multiple locations across the enterprise and a “security first” paradigm goes hand-in-hand with cloud […]
Bring Your Own Key (BYOK), also referred to as Customer Supplied Encryption Keys (CSEK), is a model of encryption key management that enables customers to take full control of their encryption keys when storing data in the cloud. It allows them to use their own encryption key management software to store their encrypted keys outside of the cloud, instead of in the cloud, alongside their data.
Organizations around the world are becoming more reliant on technology for everyday operations, and the demand for IT resources continues to grow exponentially. Many of today’s IT managers are faced with the challenge of implementing solutions that reduce their organization’s carbon footprints, without sacrificing performance or productivity. In this blog, we share several tips on […]
StorMagic has expanded our original equipment manufacturer (OEM) agreement with ARIA Cybersecurity Solutions, a business of CSPi. ARIA Cybersecurity is now able to embed StorMagic SvKMS enterprise key management software to deliver their ARIA microHSM product through channel partners worldwide. Through this expanded partnership, ARIA Cybersecurity is now delivering the industry’s smallest general purpose hardware […]
We are thrilled to announce that we were selected as a top performer in the “GigaOm Radar for Hyperconverged Infrastructure: Small-to-Medium Enterprises and Edge” report. With 13 total HCI vendors in the running, GigaOm selected StorMagic SvSAN as a leading solution for SMEs and edge computing sites. GigaOm is a technology research and analysis company, […]
Hardware Security Modules (HSMs) have been the standard for encryption for the last 20 years. But with the emergence of computing that spans on-prem, cloud and edge environments, there has been a shift away from physical, on-premise HSMs to software-based key management systems. With that said, are HSMs still relevant? Is an HSM best for […]
2020 is coming to a close, and oh what a year it has been. Over the past 12 months, the Coronavirus pandemic swept the globe and changed the world significantly. COVID-19 not only had an impact on our personal lives, but also our work lives. Many employees were forced to transition to remote work, which […]
We are thrilled to announce that CRN®, a brand of The Channel Company, included StorMagic in its first ever 2020 Edge Computing 100 list. This new list, selected by a panel of respected CRN editors, recognizes leading vendors whose technology provides the building blocks channel partners need to build next-generation intelligent edge solutions that bring […]
High availability (HA) is vital to protecting sensitive data, and an important part of key management. Key management is central to data encryption – encryption keys are like the keys to your house, and act to protect your valuables (the encrypted data). But, much like standard house keys, key management has a number of potential […]
The Key Management Interoperability Protocol (KMIP) is a universal language for secure data management across platforms. It was developed by the Organization for Advancement of Structured Information Standards (OASIS), with the purpose of enabling communication between key management systems and cryptographically-enabled applications.
Gartner has released its annual Magic Quadrant for Hyperconverged Infrastructure (HCI) research note, and StorMagic is proud to have been recognized in the report for its ability to execute and completeness of vision, for the third time. As in reports prior, StorMagic was identified as a “Niche Player” in the 2020 Magic Quadrant, which we […]
StorMagic is excited to announce that we’ve been named a winner in the 2020 Storage Awards. We were selected as the winner in the “Hyperconvergence Vendor of the Year” category, recognizing our SvSAN product, which enables highly available virtualized storage within hyperconverged infrastructures (HCIs). In 2019, StorMagic was named a runner up in the “Software-Defined […]
The popularity of cloud computing continues to grow, with many of today’s businesses moving their data and applications from traditional datacenters to the cloud. In fact, Gartner analysts estimate the worldwide cloud services market to be $258 billion in 2020, and grow to $513 billion by 2024. While the cloud offers many benefits to organizations, […]
While cyber security is incredibly important, organizations are beginning to realize that they need to take their data protection strategies a step further. The term “cyber resilience” is becoming more prevalent, as a means of describing an organization’s ability to continue operating and to uphold the integrity of their data, even in the event of a breach.
Everyone has made a trip to the pharmacy at some point in their lives. But have you ever stopped to think about the technologies pharmacies utilize and how much data they’re generating, sharing, and storing on a daily basis? There are many steps that go into the process of getting the right medication into the […]
We are thrilled to announce that StorMagic has expanded its partnership with Hewlett Packard Enterprise (HPE), through the validation of our virtual SAN software solution, SvSAN, with HPE Edgeline Converged Edge Systems. Together, StorMagic and HPE are dedicated to designing hyperconverged solutions that are purpose-built for edge computing environments. Edge organizations (i.e. branch offices, retails […]
We are excited to announce that a new version of SvKMS, StorMagic’s enterprise encryption key management solution, is now available — SvKMS 2.5. SvKMS 2.5 encompasses several expanded encryption integrations for on-prem, IaaS, and SaaS applications. This latest update provides new support for the Google Cloud External Key Management (EKM) Program, Azure Key Vault Managed […]
Database security is a vital component of an overall data protection strategy, especially for organizations that manage and store highly sensitive data, such as financial information or health records. MongoDB is a non-relational, or noSQL database that has quickly become one of the world’s biggest database players, competing with large incumbent companies like Oracle and Microsoft […]
Many of today’s organizations are producing, sharing, and storing mass amounts of sensitive information on a regular basis. As the volume of critical data being generated and circulated around the globe has increased over time, so too have threats of hacking and cyber attacks. Security and risk management (SRM) staff are being driven by an […]
StorMagic SvKMS is a one-of-a-kind key management solution, designed specifically for modern encryption infrastructures. It simplifies complex security configurations by providing a centralized, one-stop approach to key management and enables customers to deploy encryption wherever they need it – whether at the edge, datacenter, or cloud. SvKMS delivers the following benefits to customers: Flexible: SvKMS […]
Banks and financial services organizations are faced with unique challenges when it comes to IT solutions and managing data. In regard to data storage in particular, financial institutions are often plagued with expensive and outdated architecture, slow speeds, and disruptive downtime. As these organizations begin researching ways to upgrade and modernize their IT, they are […]
With winter fast approaching, many of us are hoping to get out and enjoy some of the season’s most sought after sports. Recently, as I was considering where best to plan our own family trip, I was reminded of a customer story published by one of our key Alliance Partners, StorMagic. The company is one […]
Encryption is the process of protecting data by changing it from a readable form to an unreadable form. It uses complex algorithms to “scramble” and therefore protect data – as it’s unreadable and can’t be accessed.
Together, StorMagic, Schneider Electric, and HPE are revolutionizing the way edge computing environments manage their IT systems. We’ve collaborated to launch a new, all-inclusive solution called “Edge in a Box.” This one-of-a-kind offering enables edge sites to process, manage, and store data in minutes, with one of the leanest solutions on the market. Its low […]
As technologies produce new means of creating, using, and benefiting from vast data stores, they also confront new security risks and regulatory requirements — especially for sensitive data. Nutanix is a cloud computing company, leading the market in hyperconverged infrastructure appliances and software-defined storage. Nutanix’s software delivers a full infrastructure stack that integrates compute, virtualization, […]
Hyperconvergence and software-defined-storage (SDS) have come a long way in recent times and branched into areas that were thought impossible, just a few years ago. IT has always been about eliminating single points of failure. Roll back to the 90s and early 00s when companies ran their applications and services on bare-metal servers; the idea […]
Virtualized storage, or storage virtualization, is a technological concept developed within the past few decades. It enables organizations to remove the traditional boundaries of physical storage devices, by abstracting the disks and drives, and presenting them as a single, centralized pool of storage capacity.
A virtual storage area network (SAN) is a software-based component that provides a virtualized ‘pool’ of storage to multiple virtual machines (VMs) and applications. In order to achieve this, data is passed (shared) between servers over a network using a protocol such as iSCSI or fibre channel.
As the volume of data being created, managed and stored by organizations around the world increases and diversifies, it becomes ever more important to have a data security and protection plan in place. Encryption is a tried-and-tested form of data protection. However, one of the challenges of effective data encryption involves the security, storage, and […]
Data is the lifeblood of an organization. Whether it be customer data stored in a database, or a record of transactions that’s part of a larger order management system, data is what fuels the modern enterprise. As more and more companies store their data across the cloud, multiple clouds, and hybrid-systems, protecting that data has […]
With personal data becoming more important and bountiful in a digital and virtual world, the importance of regulatory compliance and data protection, storage, and management has also increased. Major regulations exist in several specific sectors, including, in the US, healthcare (HIPAA and HiTech), financial services (PCI-DSS and GLBA), biotechnology (FDA) and the energy industry, and […]
Rapid developments in digital and mobile technologies are making edge computing more prevalent and critical to the success of businesses across a wide range of industries. Organizations that are implementing edge computing technology are commonly faced with deciding which is better suited for their environment – hardware or software RAID. But how do you know […]
Based in Oregon, Mt. Hood Meadows Ski Resort offers visitors skiing, snowboarding, and panoramic views from its 7,300-foot elevation. The resort was previously utilizing a physical SAN appliance to manage its point-of-sale transactional data. They decided to update and virtualize their IT environment with HPE StoreVirtual, which was later discontinued. Earlier this year, StorMagic’s SvSAN virtual […]
Each year, Gartner Peer Insights releases its “Voice of the Customer” reports, compiling peer reviews and ratings of vendors received across more than 300 different markets, and complementing those reviews with expert research. The purpose of these “Voice of the Customer” reports is to help guide decision makers during their buying processes, by supplying them […]
There are a number of benefits associated with transitioning from traditional, physical storage infrastructure and switching to a virtual SAN (virtual storage network). However, one of the most notable and advantageous for organizations, at the edge and beyond, is the significant cost savings delivered by making the switch. Traditional datacenter models require a physical NAS […]
Many of today’s businesses are moving their data and applications from onsite datacenters to the cloud. Leveraging cloud services can provide a variety of customer benefits, including improved performance, reduced capital expenses, and increased business agility. At the same time however, cloud services have introduced a number of new vulnerabilities and security risks. In the […]
The proliferation of cloud-based services has radically simplified day-to-day data management and decreased overhead costs for many businesses. It is currently estimated that more than 60% of organizations have moved to cloud-based data systems, with many using the cloud to store sensitive information. At the same time however, cloud technology has brought with it a […]
Ecommerce has become a critical pillar of the global economy. Prior to the current pandemic, 2 billion people were buying from over 7 million online businesses according to etailinsights. As COVID-19 has progressed, brick-and-mortar businesses around the globe have adopted many new precautions and regulations to keep their customers safe. This includes transitioning to primarily, […]
Businesses today depend heavily on their IT systems to keep everyday operations up and running. Many organizations require minimal to zero disruption to applications and services, in order to maintain productivity and profitability. However, eliminating IT downtime entirely and achieving true high availability is often easier said than done. What is Fault Tolerance? Fault Tolerance […]
Toronto Internet Exchange (TorIX) is a non-profit organization created to directly connect the internet traffic of Canadian businesses via local network infrastructure. TorIX was previously using a VMware installation without replication, and wanted to find a new solution that reduced hardware dependency to decrease costs and complexities. Their sights were set on a hyperconverged solution […]
High Availability (HA) describes a system that can sustain long periods of continuous operation, and remain operational, even if a part of the system is no longer in service. Decreased downtime, the elimination of single points of failure, and replication and distribution of data across multiple locations, are all contributing factors that come together to create a high availability infrastructure.
StorMagic’s MSP Program addresses the pain points faced by service providers when offering a key management service to their customers. The MSP Program allows StorMagic SvKMS encryption key management to be integrated into an MSP’s suite of services, delivering differentiated data security through a unique high margin offering. Find out more about the key benefits […]
The internet of things (IoT) – the interconnection of everyday devices via networks that facilitate interactions, including the exchange of data – is an ever-present force in the contemporary world. Whether in our personal or professional lives, we seem to always be “connected” to IoT endpoints. The growth of these types of network capacities comes […]
One of the hottest debates in the IT world centers around all-flash versus traditional hard disk drives. Once seen as a luxury, reserved for corporations like Google, Facebook, and the NSA, solid-state disk (SSD) drives have shifted to become almost commonplace in both enterprise and consumer technology. The need for increased performance and smaller footprints […]
Organizations around the globe are creating, sharing, and storing vast amounts of data every day. As technology evolves and that data continues to grow, securing it is becoming more and more critical for businesses looking to keep their most valuable assets safe. It’s no secret that cybersecurity has become an essential component within IT environments. […]
Key management refers to the process of creating, using, storing, exchanging, archiving, discarding, and replacing cryptographic keys in an encryption system. Its purpose is to secure an organization’s keys, and to prevent cybercriminals or unauthorized individuals from accessing and corrupting sensitive data that has been protected through encryption.
Many of today’s organizations are modernizing their traditional IT infrastructure, in an effort to save money, improve performance, and reduce downtime. They are taking steps to virtualize their environments by replacing their clunky, physical IT equipment, with virtualized systems that enable the hyperconvergence of compute, networking, and storage resources. Storage virtualization enables the pooling of […]
SvSAN provides the most simple and lightweight virtual SAN solution on the market, significantly reducing costs per site. This makes it the perfect storage infrastructure solution for retailers of all sizes. Find out why Sheetz Inc., Autohaus Gruppe Seitz and allnatura chose to deploy SvSAN in their stores. Read more about SvSAN for Retail, or browse […]
SvSAN provides the most simple and lightweight virtual SAN solution on the market, significantly reducing costs per site. This makes it the perfect storage infrastructure solution for large retailers who have hundreds or thousands of individual store locations. Find out why a leading US home improvement retailer and a European supermarket chain both chose to […]
Retail businesses around the globe are faced with several common challenges when it comes to managing IT. While these challenges are common within retail environments, they are unique in comparison with other industries, and require specialized solutions to address them. Some of these challenges are: Minimal Space: Retail stores often have limited rack and floor […]
Hyperconvergence is a term used to describe the consolidation of computing, networking, and storage resources, into a single, streamlined datacenter architecture. Traditional datacenter architecture requires specialist hardware, with each piece designated for a specific function, whereas hyperconverged infrastructure (HCI) utilizes simplified hardware and software components.
Edge computing is a term used to describe decentralized IT infrastructure. In an edge computing environment, applications, computation, and data storage are all carried out near the source of the data (i.e. at the “network edge”), as opposed to in the cloud or at an offsite datacenter. By processing data locally and minimizing the distance between devices and servers, edge computing delivers improved performance, requires less bandwidth, and reduces latency.
At the end of 2019, HPE announced the EOL of its StoreVirtual VSA product family. In March, they confirmed that they would be reselling StorMagic SvSAN through their HPE Complete Program, as the official replacement for StoreVirtual. StorMagic SvSAN, our state-of-the-art VSA offering, is the ideal replacement for StoreVirtual. It simplifies storage for edge environments, […]
Earlier this month, StorMagic acquired KeyNexus, an innovator and designer of encryption key management solutions. Together, StorMagic and KeyNexus are dedicated to delivering modern, virtualized storage and security solutions to customers at the edge and beyond. Several new employees have joined the StorMagic family, through the acquisition of KeyNexus. We are excited to have these […]
Software-defined storage (SDS) is a form of storage virtualization. It significantly improves the simplicity and flexibility of data storage management by introducing a software layer, independent from the physical storage hardware (i.e. disks and SSDs). Subsequently, software-defined storage solutions allow more freedom in managing the way data is stored and retrieved.
StorMagic is thrilled to announce that it has acquired KeyNexus, an innovator and designer of encryption key management solutions. Together, StorMagic and KeyNexus are dedicated to delivering modern security solutions for the edge, datacenter, and cloud. This acquisition encompasses several exciting updates for StorMagic, its partners, and customers. These include the growth of our team, […]
StorMagic announced that it has acquired KeyNexus, an innovator and designer of encryption key management solutions. The acquisition combines two organizations committed to removing IT complexities for customers at the edge and beyond. StorMagic also announced the availability of SvKMS, its first modern, virtualized key management software solution. SvKMS delivers affordable enterprise-grade key management for […]