Digital Evidence

Gather, Store and Find Your Digital Evidence, with StorMagic ARQvault Digital Evidence Management Solutions

The proliferation of digital technology has led to a proliferation of digital evidence: images, texts, emails, documents, video, audio, and more. Digital evidence is everywhere and its use is no longer restricted to law enforcement and public agencies. Transportation providers are using in-vehicle cameras, delivery and service providers are using both in-vehicle and body cameras […]

Data Compliance Beginner Guide

Data Compliance – A Beginner’s Guide

Cybersecurity is a term used to describe the practice of defending networks, devices, applications, and data from unauthorized access and cyber threats. It consists of a variety of different technologies, tools, processes, and approaches, for ensuring data integrity, confidentiality, and availability.

video surveillance

Watch Your Assets with ARQvault Video Surveillance Solutions

These days, video surveillance is everywhere – retail stores, parking lots, warehouses, manufacturing sites, hospitals, government facilities, airports, train stations, corporate campuses, schools, stadiums, and more. The term “video surveillance” often conjures something serious and nefarious, which can sometimes be the case. But what it typically equates to is watching out for your assets — […]

Data Breakthrough Awards

The 2021 Data Breakthrough Awards Names StorMagic Witness as-a-Service as the “Overall Data Storage Solution of the Year”

StorMagic’s Witness as-a-Service (WaaS) product was recognized as the “Overall Data Storage Solution of the Year” in the 2021 Data Breakthrough Awards. We are so thrilled to be celebrating this achievement, and to be acknowledged as a leader in the data storage space! The Data Breakthrough Awards recognize the best companies, products and services in […]

Rommelsbacher

Rommelsbacher Eliminates Single Point of Failure and Ensures Maximum Uptime with StorMagic SvSAN

For more than 90 years, Rommelsbacher has been designing and producing electric appliances, and delivering them to countries around the world. Based in Germany, the company is family-owned and is dedicated to manufacturing first class kitchen products that provide “Pure Cooking Pleasure,” and are both functional and aesthetically pleasing.  Rommelsbacher was looking to upgrade its […]

Cybersecurity Beginners Guide featured

Cybersecurity – A Beginner’s Guide

Cybersecurity is a term used to describe the practice of defending networks, devices, applications, and data from unauthorized access and cyber threats. It consists of a variety of different technologies, tools, processes, and approaches, for ensuring data integrity, confidentiality, and availability.

Cybersecurity Excellence Awards

StorMagic Proudly Claims Gold in the 2021 Cybersecurity Excellence Awards

We are excited to announce that StorMagic was selected as a gold winner in two different categories of the 2021 Cybersecurity Excellence Awards. StorMagic KMaaS was awarded gold in the “Cybersecurity Product / Service Awards — Data Security” category, and SvKMS in the “Cybersecurity Industry Solutions Awards — Manufacturing” category.  Each year, Cybersecurity Insiders hosts […]

Channel Chiefs

CRN Names StorMagic CRO, Brian Grainger, a 2021 Channel Chief

Each year, CRN, a brand of the Channel Company, releases a list of leading IT channel vendor executives who continually demonstrate outstanding leadership, influence, innovation, and growth — i.e. CRN Channel Chiefs.  StorMagic is thrilled to announce that our CRO and Board Member, Brian Grainger, was included in this year’s list. To celebrate this achievement, […]

BYOK beginners guide featured image2

BYOK – A Beginner’s Guide

Bring Your Own Key (BYOK), also referred to as Customer Supplied Encryption Keys (CSEK), is a model of encryption key management that enables customers to take full control of their encryption keys when storing data in the cloud. It allows them to use their own encryption key management software to store their encrypted keys outside of the cloud, instead of in the cloud, alongside their data.

Green IT

Mitigating the Impact of Green IT Initiatives on High Availability

Organizations around the world are becoming more reliant on technology for everyday operations, and the demand for IT resources continues to grow exponentially. Many of today’s IT managers are faced with the challenge of implementing solutions that reduce their organization’s carbon footprints, without sacrificing performance or productivity. In this blog, we share several tips on […]

ARIA Cybersecurity

StorMagic Expands OEM Agreement with ARIA Cybersecurity to Deliver the Industry’s Smallest General-Purpose HSM

StorMagic has expanded our original equipment manufacturer (OEM) agreement with ARIA Cybersecurity Solutions, a business of CSPi. ARIA Cybersecurity is now able to embed StorMagic SvKMS enterprise key management software to deliver their ARIA microHSM product through channel partners worldwide. Through this expanded partnership, ARIA Cybersecurity is now delivering the industry’s smallest general purpose hardware […]

HSMs

Is There Still a Place for HSMs in Modern Data Protection?

Hardware Security Modules (HSMs) have been the standard for encryption for the last 20 years. But with the emergence of computing that spans on-prem, cloud and edge environments, there has been a shift away from physical, on-premise HSMs to software-based key management systems. With that said, are HSMs still relevant? Is an HSM best for […]

Edge Computing 100

StorMagic Recognized in CRN’s 2020 Edge Computing 100 List

We are thrilled to announce that CRN®, a brand of The Channel Company, included StorMagic in its first ever 2020 Edge Computing 100 list. This new list, selected by a panel of respected CRN editors, recognizes leading vendors whose technology provides the building blocks channel partners need to build next-generation intelligent edge solutions that bring […]

high availability

High Availability’s Role in Protecting Data and Improving Performance

High availability (HA) is vital to protecting sensitive data, and an important part of key management. Key management is central to data encryption – encryption keys are like the keys to your house, and act to protect your valuables (the encrypted data). But, much like standard house keys, key management has a number of potential […]

KMIP beginners guide featured image

KMIP – A Beginner’s Guide

The Key Management Interoperability Protocol (KMIP) is a universal language for secure data management across platforms. It was developed by the Organization for Advancement of Structured Information Standards (OASIS), with the purpose of enabling communication between key management systems and cryptographically-enabled applications.

security

New White Paper: 6 Technology Trends that Improve Data Security for Any Cloud

The popularity of cloud computing continues to grow, with many of today’s businesses moving their data and applications from traditional datacenters to the cloud. In fact, Gartner analysts estimate the worldwide cloud services market to be $258 billion in 2020, and grow to $513 billion by 2024. While the cloud offers many benefits to organizations, […]

Cyber Resilience Beginners Guide featured

Cyber Resilience – A Beginner’s Guide

While cyber security is incredibly important, organizations are beginning to realize that they need to take their data protection strategies a step further. The term “cyber resilience” is becoming more prevalent, as a means of describing an organization’s ability to continue operating and to uphold the integrity of their data, even in the event of a breach.

HPE Edgeline

Protect and Simplify the Edge with StorMagic SvSAN and HPE Edgeline Converged Edge Systems

We are thrilled to announce that StorMagic has expanded its partnership with Hewlett Packard Enterprise (HPE), through the validation of our virtual SAN software solution, SvSAN, with HPE Edgeline Converged Edge Systems.  Together, StorMagic and HPE are dedicated to designing hyperconverged solutions that are purpose-built for edge computing environments. Edge organizations (i.e. branch offices, retails […]

SvKMS 2.5

SvKMS 2.5: Latest Update Delivers Extended Support for Encryption Integrations

We are excited to announce that a new version of SvKMS, StorMagic’s enterprise encryption key management solution, is now available — SvKMS 2.5.   SvKMS 2.5 encompasses several expanded encryption integrations for on-prem, IaaS, and SaaS applications. This latest update provides new support for the Google Cloud External Key Management (EKM) Program, Azure Key Vault Managed […]

MongoDB

Encrypting in MongoDB? You’ll Need a Third Party Key Manager

Database security is a vital component of an overall data protection strategy, especially for organizations that manage and store highly sensitive data, such as financial information or health records. MongoDB is a non-relational, or noSQL database that has quickly become one of the world’s biggest database players, competing with large incumbent companies like Oracle and Microsoft […]

SvKMS demos

NEW SvKMS Demos: Initializing a Multi-Node Cluster and Configuring StorMagic SvKMS with Different Applications

StorMagic SvKMS is a one-of-a-kind key management solution, designed specifically for modern encryption infrastructures. It simplifies complex security configurations by providing a centralized, one-stop approach to key management and enables customers to deploy encryption wherever they need it – whether at the edge, datacenter, or cloud. SvKMS delivers the following benefits to customers:  Flexible: SvKMS […]

Financial

StorMagic SvSAN: Modern, Virtualized Storage for Banks and Financial Organizations

Banks and financial services organizations are faced with unique challenges when it comes to IT solutions and managing data. In regard to data storage in particular, financial institutions are often plagued with expensive and outdated architecture, slow speeds, and disruptive downtime. As these organizations begin researching ways to upgrade and modernize their IT, they are […]

Encryption Beginners Guide featured

Encryption – A Beginner’s Guide

Encryption is the process of protecting data by changing it from a readable form to an unreadable form. It uses complex algorithms to “scramble” and therefore protect data – as it’s unreadable and can’t be accessed.

edge in a box

Edge in a Box: Simple, Cost-Effective and Lean Solution Delivers 100% Uptime for Any Edge or Small Datacenter Location

Together, StorMagic, Schneider Electric, and HPE are revolutionizing the way edge computing environments manage their IT systems. We’ve collaborated to launch a new, all-inclusive solution called “Edge in a Box.” This one-of-a-kind offering enables edge sites to process, manage, and store data in minutes, with one of the leanest solutions on the market. Its low […]

Nutanix encryption

Meet Security and Regulatory Requirements with SvKMS and Nutanix Encryption

As technologies produce new means of creating, using, and benefiting from vast data stores, they also confront new security risks and regulatory requirements — especially for sensitive data.   Nutanix is a cloud computing company, leading the market in hyperconverged infrastructure appliances and software-defined storage. Nutanix’s software delivers a full infrastructure stack that integrates compute, virtualization, […]

software-defined storage

The Evolution of Software-Defined Storage and the Virtual SAN

Hyperconvergence and software-defined-storage (SDS) have come a long way in recent times and branched into areas that were thought impossible, just a few years ago.  IT has always been about eliminating single points of failure. Roll back to the 90s and early 00s when companies ran their applications and services on bare-metal servers; the idea […]

Virtualized Storage Beginners Guide featured

Virtualized Storage – A Beginner’s Guide

Virtualized storage, or storage virtualization, is a technological concept developed within the past few decades. It enables organizations to remove the traditional boundaries of physical storage devices, by abstracting the disks and drives, and presenting them as a single, centralized pool of storage capacity.

Virtual SAN Beginners Guide featured

Virtual SAN – A Beginner’s Guide

A virtual storage area network (SAN) is a software-based component that provides a virtualized ‘pool’ of storage to multiple virtual machines (VMs) and applications. In order to achieve this, data is passed (shared) between servers over a network using a protocol such as iSCSI or fibre channel.

compliance

An Introduction to Regulatory Compliance and Data Protection

With personal data becoming more important and bountiful in a digital and virtual world, the importance of regulatory compliance and data protection, storage, and management has also increased. Major regulations exist in several specific sectors, including, in the US, healthcare (HIPAA and HiTech), financial services (PCI-DSS and GLBA), biotechnology (FDA) and the energy industry, and […]

software RAID

Hardware vs. Software RAID: How to Make a Wise Choice

Rapid developments in digital and mobile technologies are making edge computing more prevalent and critical to the success of businesses across a wide range of industries. Organizations that are implementing edge computing technology are commonly faced with deciding which is better suited for their environment – hardware or software RAID. But how do you know […]

Mt. Hood

Mt. Hood Ski Resort Reduces Hardware Requirements and Costs by 33% with StorMagic SvSAN

Based in Oregon, Mt. Hood Meadows Ski Resort offers visitors skiing, snowboarding, and panoramic views from its 7,300-foot elevation. The resort was previously utilizing a physical SAN appliance to manage its point-of-sale transactional data. They decided to update and virtualize their IT environment with HPE StoreVirtual, which was later discontinued. Earlier this year, StorMagic’s SvSAN virtual […]

Virtual SAN

Looking to Reduce Your IT Budget? Consider Switching to a Virtual SAN

There are a number of benefits associated with transitioning from traditional, physical storage infrastructure and switching to a virtual SAN (virtual storage network). However, one of the most notable and advantageous for organizations, at the edge and beyond, is the significant cost savings delivered by making the switch.  Traditional datacenter models require a physical NAS […]

encryption key management cloud

Best Practices For Encryption Key Management When Storing Data in the Cloud

The proliferation of cloud-based services has radically simplified day-to-day data management and decreased overhead costs for many businesses. It is currently estimated that more than 60% of organizations have moved to cloud-based data systems, with many using the cloud to store sensitive information. At the same time however, cloud technology has brought with it a […]

ecommerce

Ecommerce Merchants: Stay Resilient in the Face of Downtime and Cyber Threats

Ecommerce has become a critical pillar of the global economy. Prior to the current pandemic, 2 billion people were buying from over 7 million online businesses according to etailinsights. As COVID-19 has progressed, brick-and-mortar businesses around the globe have adopted many new precautions and regulations to keep their customers safe. This includes transitioning to primarily, […]