Nutanix encryption

Meet Security and Regulatory Requirements with SvKMS and Nutanix Encryption

As technologies produce new means of creating, using, and benefiting from vast data stores, they also confront new security risks and regulatory requirements — especially for sensitive data.   Nutanix is a cloud computing company, leading the market in hyperconverged infrastructure appliances and software-defined storage. Nutanix’s software delivers a full infrastructure stack that integrates compute, virtualization, […]

compliance

An Introduction to Regulatory Compliance and Data Protection

With personal data becoming more important and bountiful in a digital and virtual world, the importance of regulatory compliance and data protection, storage, and management has also increased. Major regulations exist in several specific sectors, including, in the US, healthcare (HIPAA and HiTech), financial services (PCI-DSS and GLBA), biotechnology (FDA) and the energy industry, and […]

KMaaS cloud security key management

Infographic: Key Management-as-a-Service

StorMagic KMaaS (Key Management-as-a-Service) is a cloud-based key management offering that enables painless security for any encryption workload. It allows organizations to migrate their key management infrastructure into the cloud, eliminating any physical hardware needed to run the solution. StorMagic KMaaS ensures an organization can keep all keys secure and accessible within the cloud, regardless […]

encryption key management cloud

Best Practices For Encryption Key Management When Storing Data in the Cloud

The proliferation of cloud-based services has radically simplified day-to-day data management and decreased overhead costs for many businesses. It is currently estimated that more than 60% of organizations have moved to cloud-based data systems, with many using the cloud to store sensitive information. At the same time however, cloud technology has brought with it a […]

StorMagic MSP Program infographic featured image

Infographic: StorMagic MSP Program

StorMagic’s MSP Program addresses the pain points faced by service providers when offering a key management service to their customers. The MSP Program allows StorMagic SvKMS encryption key management to be integrated into an MSP’s suite of services, delivering differentiated data security through a unique high margin offering. Find out more about the key benefits […]

IoT

IoT and Security: Protecting Data in the Internet of Things

The internet of things (IoT) – the interconnection of everyday devices via networks that facilitate interactions, including the exchange of data – is an ever-present force in the contemporary world. Whether in our personal or professional lives, we seem to always be “connected” to IoT endpoints.  The growth of these types of network capacities comes […]

MSPs

SvKMS: Differentiated Data Security for MSPs

Organizations around the globe are creating, sharing, and storing vast amounts of data every day. As technology evolves and that data continues to grow, securing it is becoming more and more critical for businesses looking to keep their most valuable assets safe.  It’s no secret that cybersecurity has become an essential component within IT environments. […]

Cybersecurity Award_Blog_Image-page-001

StorMagic Wins Silver in the 2020 Cybersecurity Excellence Awards

Last week, Cybersecurity Insiders announced the winners of its 2020 Cybersecurity Excellence Awards. StorMagic’s data encryption software was announced as a silver winner in three different categories: encryption, software, and technology. The encryption award was recognized under the 2020 Cybersecurity Product / Service Awards umbrella, and the software and technology awards under 2020 Cybersecurity Industry […]

HCI and encryption

Enabling secure HCI at the edge with Encryption and Key Management

Edge sites require leaner infrastructure than traditional datacenters, making physical attack the most likely security threat that an edge site will face. Therefore, a critical aspect of security for edge sites is encryption. Unfortunately, a fundamental part of encryption is key management, something that can be almost impossible to implement over lots of edge and […]