encryption

Encryption – A Beginner’s Guide

Encryption is the process of protecting data by changing it from a readable form to an unreadable form. It uses complex algorithms to “scramble” and therefore protect data - as it’s unreadable and can’t be accessed.

StorMagic ‘How-To’ Series: Configuring SvSAN with SvKMS Encryption Key Management

StorMagic Technical Pre-Sales Engineer, Steve Bettison, recently produced a new series of training videos for our customers and partners. Within this series, Steve demonstrates how to perform certain actions in the setup, configuration, and general operation of our software products -- SvSAN and SvKMS. The first set of videos in this ‘How-To’ series cover training demonstrations for SvSAN, our virtual [...]

Do Your Part, #BeCyberSmart: StorMagic Celebrates Cybersecurity Awareness Month 

Over the past several decades, the world has become increasingly dependent on technology. The advent of technology has brought with it several advantages, including increased accessibility to information, innovation across many different fields, time and cost efficiencies, and better communication. However, it has also opened up the door to some serious problems -- one of the most common being cyber [...]

An Introduction to Trusted Computing: What It Is and How StorMagic Is Utilizing It with SvKMS

What is Trusted Computing? Trusted Computing is a broad term that refers to technologies and proposals that aims to make computing more secure through hardware enhancements and associated software modifications. It can be broken down into four different categories: Memory Curtaining: Provides full isolation of sensitive areas of memories, and keeps memory from being read or written to inappropriately. This [...]

StorMagic Expands Partnership with Nutanix, Introducing New Product Validations with SvKMS

StorMagic has joined the Nutanix Elevate Technology Alliance Partner Program, and our encryption key management solution, SvKMS, has been validated with Nutanix data encryption and their AHV hypervisor. What Does This Mean? SvKMS has been named a Nutanix Ready validated solution, for customers looking to implement a third party key manager with Nutanix built-in encryption, or that want to operate [...]

BYOK – A Beginner’s Guide

Bring Your Own Key (BYOK), also referred to as Customer Supplied Encryption Keys (CSEK), is a model of encryption key management that enables customers to take full control of their encryption keys when storing data in the cloud.

StorMagic Expands VMware Ready Partnership with SvKMS Certification and Marketplace Listing

Under its vSphere 6.5 release, VMware enabled the ability to encrypt VMs for data-at-rest encryption, a tried-and-true data security approach. This capability has continued through vSphere versions 6.7 and 7.0, and is now available for vSAN encryption. While VMware has made turning on encryption easy, customers require a third-party key management server (KMS) that supports the key management interoperability protocol [...]

Commvault Certifies StorMagic SvKMS as a Third-Party Encryption Key Management Solution

We are excited to announce that SvKMS is now officially certified as a third-party encryption key management solution for Commvault encrypted backups. Commvault is a data management company that specializes in backup and recovery, cloud and infrastructure management, retention, and compliance. Nowadays, there is an increased need to protect data that exists in disparate environments -- from the edge, datacenter [...]

StorMagic KMaaS: Simple Encryption Key Management for Any Environment (On-Prem, Cloud, Multi-Cloud, and Hybrid)

According to the research firm Gartner, the events of 2020 have accelerated cloud adoption to the point that technology leaders should follow “cloud first” as a guiding principle. However, while “cloud first” may be the new standard, data still exists in multiple locations across the enterprise and a “security first” paradigm goes hand-in-hand with cloud adoption. StorMagic recognizes that modern [...]

Encryption Key Management Best Practices for Advanced Data Protection

How is your data being protected from unauthorized access and use? Although encryption key management is incredibly important, many IT and security professionals are often unaware of best practices for managing encryption keys. If these best practices are not implemented, it can lead to an insecure system that increases the risk of encryption keys being compromised, opening the doors of [...]

StorMagic Expands OEM Agreement with ARIA Cybersecurity to Deliver the Industry’s Smallest General-Purpose HSM

StorMagic has expanded our original equipment manufacturer (OEM) agreement with ARIA Cybersecurity Solutions, a business of CSPi. ARIA Cybersecurity is now able to embed StorMagic SvKMS enterprise key management software to deliver their ARIA microHSM product through channel partners worldwide. Through this expanded partnership, ARIA Cybersecurity is now delivering the industry’s smallest general purpose hardware security module (HSM) -- ARIA [...]

Is There Still a Place for HSMs in Modern Data Protection?

Hardware Security Modules (HSMs) have been the standard for encryption for the last 20 years. But with the emergence of computing that spans on-prem, cloud and edge environments, there has been a shift away from physical, on-premises HSMs to software-based key management systems. With that said, are HSMs still relevant? Is an HSM best for an organization’s current data protection [...]

KMIP – A Beginner’s Guide

The Key Management Interoperability Protocol (KMIP) is a universal language for secure data management across platforms. It was developed by the Organization for Advancement of Structured Information Standards (OASIS), with the purpose of enabling communication between key management systems and cryptographically-enabled applications.

SvKMS 2.5: Latest Update Delivers Extended Support for Encryption Integrations

We are excited to announce that a new version of SvKMS, StorMagic’s enterprise encryption key management solution, is now available -- SvKMS 2.5. SvKMS 2.5 encompasses several expanded encryption integrations for on-prem, IaaS, and SaaS applications. This latest update provides new support for the Google Cloud External Key Management (EKM) Program, Azure Key Vault Managed HSM BYOK, Salesforce Shield, and [...]

Encrypting in MongoDB? You’ll Need a Third Party Key Manager

Database security is a vital component of an overall data protection strategy, especially for organizations that manage and store highly sensitive data, such as financial information or health records. MongoDB is a non-relational, or noSQL database that has quickly become one of the world's biggest database players, competing with large incumbent companies like Oracle and Microsoft SQL Server. noSQL databases are [...]

Meet Security and Regulatory Requirements with SvKMS and Nutanix Encryption

As technologies produce new means of creating, using, and benefiting from vast data stores, they also confront new security risks and regulatory requirements -- especially for sensitive data. Nutanix is a cloud computing company, leading the market in hyperconverged infrastructure appliances and software-defined storage. Nutanix’s software delivers a full infrastructure stack that integrates compute, virtualization, storage, networking, and security, to [...]

Ensure Strong Data Protection by Combining StorMagic SvKMS and Commvault Encrypted Backups

Data is the lifeblood of an organization. Whether it be customer data stored in a database, or a record of transactions that’s part of a larger order management system, data is what fuels the modern enterprise. As more and more companies store their data across the cloud, multiple clouds, and hybrid-systems, protecting that data has become critical. What happens when [...]

An Introduction to Regulatory Compliance and Data Protection

With personal data becoming more important and bountiful in a digital and virtual world, the importance of regulatory compliance and data protection, storage, and management has also increased. Major regulations exist in several specific sectors, including, in the US, healthcare (HIPAA and HiTech), financial services (PCI-DSS and GLBA), biotechnology (FDA) and the energy industry, and IoT (NERC and FERC). Moreover, [...]

Introducing StorMagic KMaaS: Painless, Cloud-Based Security for any Encryption Workload

Many of today’s businesses are moving their data and applications from onsite datacenters to the cloud. Leveraging cloud services can provide a variety of customer benefits, including improved performance, reduced capital expenses, and increased business agility. At the same time however, cloud services have introduced a number of new vulnerabilities and security risks. In the increasingly predatory world of cloud-stored [...]

Infographic: Key Management-as-a-Service

StorMagic KMaaS (Key Management-as-a-Service) is a cloud-based key management offering that enables painless security for any encryption workload. It allows organizations to migrate their key management infrastructure into the cloud, eliminating any physical hardware needed to run the solution. StorMagic KMaaS ensures an organization can keep all keys secure and accessible within the cloud, regardless of encryption workload or location. [...]

Best Practices For Encryption Key Management When Storing Data in the Cloud

The proliferation of cloud-based services has radically simplified day-to-day data management and decreased overhead costs for many businesses. It is currently estimated that more than 60% of organizations have moved to cloud-based data systems, with many using the cloud to store sensitive information. At the same time however, cloud technology has brought with it a number of new business risks. [...]

Infographic: StorMagic MSP Program

StorMagic's MSP Program addresses the pain points faced by service providers when offering a key management service to their customers. The MSP Program allows StorMagic SvKMS encryption key management to be integrated into an MSP's suite of services, delivering differentiated data security through a unique high margin offering. Find out more about the key benefits in our MSP Program infographic [...]

IoT and Security: Protecting Data in the Internet of Things

The internet of things (IoT) – the interconnection of everyday devices via networks that facilitate interactions, including the exchange of data – is an ever-present force in the contemporary world. Whether in our personal or professional lives, we seem to always be “connected” to IoT endpoints. The growth of these types of network capacities comes with huge potentials, as well [...]

SvKMS: Differentiated Data Security for MSPs

Organizations around the globe are creating, sharing, and storing vast amounts of data every day. As technology evolves and that data continues to grow, securing it is becoming more and more critical for businesses looking to keep their most valuable assets safe. It’s no secret that cybersecurity has become an essential component within IT environments. In fact, Gartner predicts that [...]

Beyond Data Encryption – The Need for an Enterprise Key Management System

Enterprise Strategy Group (ESG) is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community. This report provides insight into why organizations must prioritize an efficient key management strategy alongside encryption for adequate cybersecurity and breaks down the challenges and requirements of modern key management. Abstract: Encryption is crucial to [...]

StorMagic Wins Silver in the 2020 Cybersecurity Excellence Awards

Last week, Cybersecurity Insiders announced the winners of its 2020 Cybersecurity Excellence Awards. StorMagic's data encryption software was announced as a silver winner in three different categories: encryption, software, and technology. The encryption award was recognized under the 2020 Cybersecurity Product / Service Awards umbrella, and the software and technology awards under 2020 Cybersecurity Industry Solution Awards. The Cybersecurity Excellence [...]

Top 5 List: Why SvSAN and Data Encryption are a Magic Fit for Channel Partners

On the heels of recent channel program enhancements and global partnership expansion, let’s explore the top five reasons why SvSAN and its data encryption feature are the ideal addition to your partner toolkit: Expertise: Edge and small datacenter sites have always been our focus. StorMagic SvSAN provides exactly what edge and small datacenters are looking for: high availability, reliability including encryption [...]

Infographic: SvSAN’s Data Encryption Feature

Our SvSAN data encryption infographic provides an overview of the data encryption feature of StorMagic SvSAN. Available as an additional feature on top of the base SvSAN license, SvSAN's data encryption feature is the most cost-effective encryption solution for storing data in edge computing environments. Want to find out more about transforming your IT infrastructure with SvSAN data encryption? Read [...]

StorMagic SvSAN with Data Encryption Named Winner in 2019 Cybersecurity Excellence Awards Program

This week, StorMagic SvSAN was named a Bronze Winner in the Encryption Product Category of the 2019 Cybersecurity Excellence Awards. This program honors individuals, products and companies that demonstrate excellence, innovation and leadership in information security. The finalists and winners were selected based on the strength of their nomination, as well as the popular vote by members of the Information [...]

Is Your Edge Site a Cybersecurity Weak Point?

What do you picture when you think of cyber crime? Gangs stealing credit card details? Computer whizzes hacking organizations and stealing data? Physical cyber-security attacks are probably not the first thing that come to mind. However, we are living in a time where demand for computing power is at an all time high and there are more edge computing sites [...]

Global Trends in Data Security: Threats and the Rise of Encryption

Thales, one of the leading providers of data security solutions has recently released their annual Data Threat Report for 2018. This report analyzes data from 1,200 senior security managers from 11 countries around the globe, including the US, Germany, UK, the Netherlands, Japan, India, and Sweden and highlights among other trends, the rise of encryption. The report shows that spending [...]