BYOK

BYOK – A Beginner’s Guide

Bring Your Own Key (BYOK), also referred to as Customer Supplied Encryption Keys (CSEK), is a model of encryption key management that enables customers to take full control of their encryption keys when storing data in the cloud.

A Modern HSM Built for Today’s Encryption Needs

A joint webinar with ARIA Cybersecurity Solutions Legacy hardware security modules (HSM) appliances aren't well-suited to meet today's organization encryption needs. Deployed as a stand-alone, "black-box" appliance attached to the network is costly in both equipment and power consumption. Also, these appliances cause variable roundtrip latency that can potentially impact application performance, response times, and business processes. Maybe more [...]

StorMagic KMaaS: Simple Encryption Key Management for Any Environment (On-Prem, Cloud, Multi-Cloud, and Hybrid)

According to the research firm Gartner, the events of 2020 have accelerated cloud adoption to the point that technology leaders should follow “cloud first” as a guiding principle. However, while “cloud first” may be the new standard, data still exists in multiple locations across the enterprise and a “security first” paradigm goes hand-in-hand with cloud adoption. StorMagic recognizes that modern [...]

6 Technology Trends That Improve Data Security for any Cloud

Enterprises are moving more data to the cloud and running more applications in the cloud. But is your security framework flexible enough to protect any environment confidently? New developments from Cloud Providers offer enhanced security for any cloud environment– from private, public and hybrid clouds to multiclouds and edge-to-cloud. But how can organizations extend platinum-level data security beyond public clouds [...]

An Introduction to Regulatory Compliance and Data Protection

With personal data becoming more important and bountiful in a digital and virtual world, the importance of regulatory compliance and data protection, storage, and management has also increased. Major regulations exist in several specific sectors, including, in the US, healthcare (HIPAA and HiTech), financial services (PCI-DSS and GLBA), biotechnology (FDA) and the energy industry, and IoT (NERC and FERC). Moreover, [...]

Best Practices For Encryption Key Management When Storing Data in the Cloud

The proliferation of cloud-based services has radically simplified day-to-day data management and decreased overhead costs for many businesses. It is currently estimated that more than 60% of organizations have moved to cloud-based data systems, with many using the cloud to store sensitive information. At the same time however, cloud technology has brought with it a number of new business risks. [...]