Under its vSphere 6.5 release, VMware enabled the ability to encrypt VMs for data-at-rest encryption, a tried-and-true data security approach. This capability has continued through vSphere versions 6.7 and 7.0, and is now available for vSAN encryption. While VMware has made turning on encryption easy, customers require a third-party key management server (KMS) that supports […]
Commvault Certifies StorMagic SvKMS as a Third-Party Encryption Key Management Solution
We are excited to announce that SvKMS is now officially certified as a third-party encryption key management solution for Commvault encrypted backups. Commvault is a data management company that specializes in backup and recovery, cloud and infrastructure management, retention, and compliance. Nowadays, there is an increased need to protect data that exists in disparate environments […]
An Introduction to Trusted Computing: What It Is and How StorMagic is Utilizing it With SvKMS
What is Trusted Computing? Trusted Computing is a broad term that refers to technologies and proposals that aims to make computing more secure through hardware enhancements and associated software modifications. It can be broken down into four different categories: Memory Curtaining: Provides full isolation of sensitive areas of memories, and keeps memory from being read […]
StorMagic KMaaS: Simple Encryption Key Management for Any Environment (On-Prem, Cloud, Multi-Cloud, and Hybrid)
According to the research firm Gartner, the events of 2020 have accelerated cloud adoption to the point that technology leaders should follow “cloud first” as a guiding principle. However, while “cloud first” may be the new standard, data still exists in multiple locations across the enterprise and a “security first” paradigm goes hand-in-hand with cloud […]
BYOK – A Beginner’s Guide
Bring Your Own Key (BYOK), also referred to as Customer Supplied Encryption Keys (CSEK), is a model of encryption key management that enables customers to take full control of their encryption keys when storing data in the cloud. It allows them to use their own encryption key management software to store their encrypted keys outside of the cloud, instead of in the cloud, alongside their data.
StorMagic Expands OEM Agreement with ARIA Cybersecurity to Deliver the Industry’s Smallest General-Purpose HSM
StorMagic has expanded our original equipment manufacturer (OEM) agreement with ARIA Cybersecurity Solutions, a business of CSPi. ARIA Cybersecurity is now able to embed StorMagic SvKMS enterprise key management software to deliver their ARIA microHSM product through channel partners worldwide. Through this expanded partnership, ARIA Cybersecurity is now delivering the industry’s smallest general purpose hardware […]
Is There Still a Place for HSMs in Modern Data Protection?
Hardware Security Modules (HSMs) have been the standard for encryption for the last 20 years. But with the emergence of computing that spans on-prem, cloud and edge environments, there has been a shift away from physical, on-premise HSMs to software-based key management systems. With that said, are HSMs still relevant? Is an HSM best for […]
KMIP – A Beginner’s Guide
The Key Management Interoperability Protocol (KMIP) is a universal language for secure data management across platforms. It was developed by the Organization for Advancement of Structured Information Standards (OASIS), with the purpose of enabling communication between key management systems and cryptographically-enabled applications.
SvKMS 2.5: Latest Update Delivers Extended Support for Encryption Integrations
We are excited to announce that a new version of SvKMS, StorMagic’s enterprise encryption key management solution, is now available — SvKMS 2.5. SvKMS 2.5 encompasses several expanded encryption integrations for on-prem, IaaS, and SaaS applications. This latest update provides new support for the Google Cloud External Key Management (EKM) Program, Azure Key Vault Managed […]
Encrypting in MongoDB? You’ll Need a Third Party Key Manager
Database security is a vital component of an overall data protection strategy, especially for organizations that manage and store highly sensitive data, such as financial information or health records. MongoDB is a non-relational, or noSQL database that has quickly become one of the world’s biggest database players, competing with large incumbent companies like Oracle and Microsoft […]
Lacking an Encryption Key Management Strategy? Your Organization Could Be at Risk of Losing Its Data!
Many of today’s organizations are producing, sharing, and storing mass amounts of sensitive information on a regular basis. As the volume of critical data being generated and circulated around the globe has increased over time, so too have threats of hacking and cyber attacks. Security and risk management (SRM) staff are being driven by an […]
Encryption – A Beginner’s Guide
Encryption is the process of protecting data by changing it from a readable form to an unreadable form. It uses complex algorithms to “scramble” and therefore protect data – as it’s unreadable and can’t be accessed.
Meet Security and Regulatory Requirements with SvKMS and Nutanix Encryption
As technologies produce new means of creating, using, and benefiting from vast data stores, they also confront new security risks and regulatory requirements — especially for sensitive data. Nutanix is a cloud computing company, leading the market in hyperconverged infrastructure appliances and software-defined storage. Nutanix’s software delivers a full infrastructure stack that integrates compute, virtualization, […]
Keys to the Kingdom: Consolidating Encryption Key Management with StorMagic SvKMS
As the volume of data being created, managed and stored by organizations around the world increases and diversifies, it becomes ever more important to have a data security and protection plan in place. Encryption is a tried-and-tested form of data protection. However, one of the challenges of effective data encryption involves the security, storage, and […]
Ensure Strong Data Protection by Combining StorMagic SvKMS and Commvault Encrypted Backups
Data is the lifeblood of an organization. Whether it be customer data stored in a database, or a record of transactions that’s part of a larger order management system, data is what fuels the modern enterprise. As more and more companies store their data across the cloud, multiple clouds, and hybrid-systems, protecting that data has […]
An Introduction to Regulatory Compliance and Data Protection
With personal data becoming more important and bountiful in a digital and virtual world, the importance of regulatory compliance and data protection, storage, and management has also increased. Major regulations exist in several specific sectors, including, in the US, healthcare (HIPAA and HiTech), financial services (PCI-DSS and GLBA), biotechnology (FDA) and the energy industry, and […]
Introducing StorMagic KMaaS: Painless, Cloud-Based Security for any Encryption Workload
Many of today’s businesses are moving their data and applications from onsite datacenters to the cloud. Leveraging cloud services can provide a variety of customer benefits, including improved performance, reduced capital expenses, and increased business agility. At the same time however, cloud services have introduced a number of new vulnerabilities and security risks. In the […]
Infographic: Key Management-as-a-Service
StorMagic KMaaS (Key Management-as-a-Service) is a cloud-based key management offering that enables painless security for any encryption workload. It allows organizations to migrate their key management infrastructure into the cloud, eliminating any physical hardware needed to run the solution. StorMagic KMaaS ensures an organization can keep all keys secure and accessible within the cloud, regardless […]
Best Practices For Encryption Key Management When Storing Data in the Cloud
The proliferation of cloud-based services has radically simplified day-to-day data management and decreased overhead costs for many businesses. It is currently estimated that more than 60% of organizations have moved to cloud-based data systems, with many using the cloud to store sensitive information. At the same time however, cloud technology has brought with it a […]
Infographic: StorMagic MSP Program
StorMagic’s MSP Program addresses the pain points faced by service providers when offering a key management service to their customers. The MSP Program allows StorMagic SvKMS encryption key management to be integrated into an MSP’s suite of services, delivering differentiated data security through a unique high margin offering. Find out more about the key benefits […]
IoT and Security: Protecting Data in the Internet of Things
The internet of things (IoT) – the interconnection of everyday devices via networks that facilitate interactions, including the exchange of data – is an ever-present force in the contemporary world. Whether in our personal or professional lives, we seem to always be “connected” to IoT endpoints. The growth of these types of network capacities comes […]
SvKMS: Differentiated Data Security for MSPs
Organizations around the globe are creating, sharing, and storing vast amounts of data every day. As technology evolves and that data continues to grow, securing it is becoming more and more critical for businesses looking to keep their most valuable assets safe. It’s no secret that cybersecurity has become an essential component within IT environments. […]
StorMagic Wins Silver in the 2020 Cybersecurity Excellence Awards
Last week, Cybersecurity Insiders announced the winners of its 2020 Cybersecurity Excellence Awards. StorMagic’s data encryption software was announced as a silver winner in three different categories: encryption, software, and technology. The encryption award was recognized under the 2020 Cybersecurity Product / Service Awards umbrella, and the software and technology awards under 2020 Cybersecurity Industry […]
Enabling secure HCI at the edge with Encryption and Key Management
Edge sites require leaner infrastructure than traditional datacenters, making physical attack the most likely security threat that an edge site will face. Therefore, a critical aspect of security for edge sites is encryption. Unfortunately, a fundamental part of encryption is key management, something that can be almost impossible to implement over lots of edge and […]
Top 5 List: Why SvSAN and Data Encryption are a Magic Fit for Channel Partners
On the heels of recent channel program enhancements and global partnership expansion, let’s explore the top five reasons why SvSAN and its data encryption feature are the ideal addition to your partner toolkit: Expertise: Edge and small datacenter sites have always been our focus. StorMagic SvSAN provides exactly what edge and small datacenters are looking for: […]
Infographic: SvSAN’s Data Encryption Feature
Our SvSAN data encryption infographic provides an overview of the data encryption feature of StorMagic SvSAN. Available as an additional feature on top of the base SvSAN license, SvSAN’s data encryption feature is the most cost-effective encryption solution for storing data in edge computing environments. Want to find out more about transforming your IT infrastructure […]
StorMagic SvSAN with Data Encryption Named Winner in 2019 Cybersecurity Excellence Awards Program
This week, StorMagic SvSAN was named a Bronze Winner in the Encryption Product Category of the 2019 Cybersecurity Excellence Awards. This program honors individuals, products and companies that demonstrate excellence, innovation and leadership in information security. The finalists and winners were selected based on the strength of their nomination, as well as the popular vote […]
Upcoming Webcast: The Post-GDPR Impact on Edge-based Encryption
On June 22, Fornetix and StorMagic will team up to discuss the current state of the encryption landscape now that GDPR is officially in place. With the long-awaited compliance deadline now in the rearview mirror, how are end users coping with the challenges that come along with change? The recent spike in encryption adoption at […]