An Introduction to Trusted Computing: What It Is and How StorMagic Is Utilizing It with SvKMS

What is Trusted Computing? Trusted Computing is a broad term that refers to technologies and proposals that aims to make computing more secure through hardware enhancements and associated software modifications. It can be broken down into four different categories: Memory Curtaining: Provides full isolation of sensitive areas of memories, and keeps memory from being read or written to inappropriately. This [...]

StorMagic Expands OEM Agreement with ARIA Cybersecurity to Deliver the Industry’s Smallest General-Purpose HSM

StorMagic has expanded our original equipment manufacturer (OEM) agreement with ARIA Cybersecurity Solutions, a business of CSPi. ARIA Cybersecurity is now able to embed StorMagic SvKMS enterprise key management software to deliver their ARIA microHSM product through channel partners worldwide. Through this expanded partnership, ARIA Cybersecurity is now delivering the industry’s smallest general purpose hardware security module (HSM) -- ARIA [...]

Is There Still a Place for HSMs in Modern Data Protection?

Hardware Security Modules (HSMs) have been the standard for encryption for the last 20 years. But with the emergence of computing that spans on-prem, cloud and edge environments, there has been a shift away from physical, on-premises HSMs to software-based key management systems. With that said, are HSMs still relevant? Is an HSM best for an organization’s current data protection [...]

Go to Top