IoT

Securing the Internet of Things (IoT) with Encryption

The Internet of Things (IoT) is growing three times faster than traditional IT, with the number of connected devices ballooning from 4.9 billion in 2015 to over 12 billion in 2020 [Cisco Systems]. These billions of endpoints include wearable devices, cars, electrical grids, and manufacturing facilities, to name a few, and collect sensitive data such […]

BYOK beginners guide featured image2

BYOK – A Beginner’s Guide

Bring Your Own Key (BYOK), also referred to as Customer Supplied Encryption Keys (CSEK), is a model of encryption key management that enables customers to take full control of their encryption keys when storing data in the cloud. It allows them to use their own encryption key management software to store their encrypted keys outside of the cloud, instead of in the cloud, alongside their data.

ARIA Cybersecurity

StorMagic Expands OEM Agreement with ARIA Cybersecurity to Deliver the Industry’s Smallest General-Purpose HSM

StorMagic has expanded our original equipment manufacturer (OEM) agreement with ARIA Cybersecurity Solutions, a business of CSPi. ARIA Cybersecurity is now able to embed StorMagic SvKMS enterprise key management software to deliver their ARIA microHSM product through channel partners worldwide. Through this expanded partnership, ARIA Cybersecurity is now delivering the industry’s smallest general purpose hardware […]

HSMs

Is There Still a Place for HSMs in Modern Data Protection?

Hardware Security Modules (HSMs) have been the standard for encryption for the last 20 years. But with the emergence of computing that spans on-prem, cloud and edge environments, there has been a shift away from physical, on-premise HSMs to software-based key management systems. With that said, are HSMs still relevant? Is an HSM best for […]

KMIP beginners guide featured image

KMIP – A Beginner’s Guide

The Key Management Interoperability Protocol (KMIP) is a universal language for secure data management across platforms. It was developed by the Organization for Advancement of Structured Information Standards (OASIS), with the purpose of enabling communication between key management systems and cryptographically-enabled applications.

SvKMS 2.5

SvKMS 2.5: Latest Update Delivers Extended Support for Encryption Integrations

We are excited to announce that a new version of SvKMS, StorMagic’s enterprise encryption key management solution, is now available — SvKMS 2.5.   SvKMS 2.5 encompasses several expanded encryption integrations for on-prem, IaaS, and SaaS applications. This latest update provides new support for the Google Cloud External Key Management (EKM) Program, Azure Key Vault Managed […]

MongoDB

Encrypting in MongoDB? You’ll Need a Third Party Key Manager

Database security is a vital component of an overall data protection strategy, especially for organizations that manage and store highly sensitive data, such as financial information or health records. MongoDB is a non-relational, or noSQL database that has quickly become one of the world’s biggest database players, competing with large incumbent companies like Oracle and Microsoft […]

Encryption Beginners Guide featured

Encryption – A Beginner’s Guide

Encryption is the process of protecting data by changing it from a readable form to an unreadable form. It uses complex algorithms to “scramble” and therefore protect data – as it’s unreadable and can’t be accessed.

Nutanix encryption

Meet Security and Regulatory Requirements with SvKMS and Nutanix Encryption

As technologies produce new means of creating, using, and benefiting from vast data stores, they also confront new security risks and regulatory requirements — especially for sensitive data.   Nutanix is a cloud computing company, leading the market in hyperconverged infrastructure appliances and software-defined storage. Nutanix’s software delivers a full infrastructure stack that integrates compute, virtualization, […]

compliance

An Introduction to Regulatory Compliance and Data Protection

With personal data becoming more important and bountiful in a digital and virtual world, the importance of regulatory compliance and data protection, storage, and management has also increased. Major regulations exist in several specific sectors, including, in the US, healthcare (HIPAA and HiTech), financial services (PCI-DSS and GLBA), biotechnology (FDA) and the energy industry, and […]

KMaaS cloud security key management

Infographic: Key Management-as-a-Service

StorMagic KMaaS (Key Management-as-a-Service) is a cloud-based key management offering that enables painless security for any encryption workload. It allows organizations to migrate their key management infrastructure into the cloud, eliminating any physical hardware needed to run the solution. StorMagic KMaaS ensures an organization can keep all keys secure and accessible within the cloud, regardless […]

encryption key management cloud

Best Practices For Encryption Key Management When Storing Data in the Cloud

The proliferation of cloud-based services has radically simplified day-to-day data management and decreased overhead costs for many businesses. It is currently estimated that more than 60% of organizations have moved to cloud-based data systems, with many using the cloud to store sensitive information. At the same time however, cloud technology has brought with it a […]

StorMagic MSP Program infographic featured image

Infographic: StorMagic MSP Program

StorMagic’s MSP Program addresses the pain points faced by service providers when offering a key management service to their customers. The MSP Program allows StorMagic SvKMS encryption key management to be integrated into an MSP’s suite of services, delivering differentiated data security through a unique high margin offering. Find out more about the key benefits […]

IoT

IoT and Security: Protecting Data in the Internet of Things

The internet of things (IoT) – the interconnection of everyday devices via networks that facilitate interactions, including the exchange of data – is an ever-present force in the contemporary world. Whether in our personal or professional lives, we seem to always be “connected” to IoT endpoints.  The growth of these types of network capacities comes […]

MSPs

SvKMS: Differentiated Data Security for MSPs

Organizations around the globe are creating, sharing, and storing vast amounts of data every day. As technology evolves and that data continues to grow, securing it is becoming more and more critical for businesses looking to keep their most valuable assets safe.  It’s no secret that cybersecurity has become an essential component within IT environments. […]

Cybersecurity Award_Blog_Image-page-001

StorMagic Wins Silver in the 2020 Cybersecurity Excellence Awards

Last week, Cybersecurity Insiders announced the winners of its 2020 Cybersecurity Excellence Awards. StorMagic’s data encryption software was announced as a silver winner in three different categories: encryption, software, and technology. The encryption award was recognized under the 2020 Cybersecurity Product / Service Awards umbrella, and the software and technology awards under 2020 Cybersecurity Industry […]

HCI and encryption

Enabling secure HCI at the edge with Encryption and Key Management

Edge sites require leaner infrastructure than traditional datacenters, making physical attack the most likely security threat that an edge site will face. Therefore, a critical aspect of security for edge sites is encryption. Unfortunately, a fundamental part of encryption is key management, something that can be almost impossible to implement over lots of edge and […]

mervyn-chan-RFXxBTHze_crop-800×500

Top 5 List: Why SvSAN and Data Encryption are a Magic Fit for Channel Partners

On the heels of recent channel program enhancements and global partnership expansion, let’s explore the top five reasons why SvSAN and its data encryption feature are the ideal addition to your partner toolkit: Expertise: Edge and small datacenter sites have always been our focus. StorMagic SvSAN provides exactly what edge and small datacenters are looking for: […]

bolt-1751089_1920

Infographic: SvSAN’s Data Encryption Feature

Our SvSAN data encryption infographic provides an overview of the data encryption feature of StorMagic SvSAN. Available as an additional feature on top of the base SvSAN license, SvSAN’s data encryption feature is the most cost-effective encryption solution for storing data in edge computing environments. Want to find out more about transforming your IT infrastructure […]

it_security_bg_60_crop

Upcoming Webcast: The Post-GDPR Impact on Edge-based Encryption

On June 22, Fornetix and StorMagic will team up to discuss the current state of the encryption landscape now that GDPR is officially in place. With the long-awaited compliance deadline now in the rearview mirror, how are end users coping with the challenges that come along with change? The recent spike in encryption adoption at […]