key management

StorMagic ‘How-To’ Series: Configuring SvSAN with SvKMS Encryption Key Management

StorMagic Technical Pre-Sales Engineer, Steve Bettison, recently produced a new series of training videos for our customers and partners. Within this series, Steve demonstrates how to perform certain actions in the setup, configuration, and general operation of our software products -- SvSAN and SvKMS. The first set of videos in this ‘How-To’ series cover training demonstrations for SvSAN, our virtual [...]

Do Your Part, #BeCyberSmart: StorMagic Celebrates Cybersecurity Awareness Month 

Over the past several decades, the world has become increasingly dependent on technology. The advent of technology has brought with it several advantages, including increased accessibility to information, innovation across many different fields, time and cost efficiencies, and better communication. However, it has also opened up the door to some serious problems -- one of the most common being cyber [...]

Infographic: Giant Eagle with StorMagic SvSAN and SvKMS

Keeping a retail organization’s instore applications online is critical to ensure shops remain open, but it is even more paramount for pharmacy systems and patient data. Giant Eagle, one of the United States’ largest food retailers needed a solution to eliminate downtime and keep their instore pharmacies operational and their data secure. The infographic below details how Giant Eagle turned [...]

BYOK – A Beginner’s Guide

Bring Your Own Key (BYOK), also referred to as Customer Supplied Encryption Keys (CSEK), is a model of encryption key management that enables customers to take full control of their encryption keys when storing data in the cloud.

Commvault Certifies StorMagic SvKMS as a Third-Party Encryption Key Management Solution

We are excited to announce that SvKMS is now officially certified as a third-party encryption key management solution for Commvault encrypted backups. Commvault is a data management company that specializes in backup and recovery, cloud and infrastructure management, retention, and compliance. Nowadays, there is an increased need to protect data that exists in disparate environments -- from the edge, datacenter [...]

Encryption Key Management Best Practices for Advanced Data Protection

How is your data being protected from unauthorized access and use? Although encryption key management is incredibly important, many IT and security professionals are often unaware of best practices for managing encryption keys. If these best practices are not implemented, it can lead to an insecure system that increases the risk of encryption keys being compromised, opening the doors of [...]

High Availability’s Role in Protecting Data and Improving Performance

High availability (HA) is vital to protecting sensitive data, and an important part of key management. Key management is central to data encryption – encryption keys are like the keys to your house, and act to protect your valuables (the encrypted data). But, much like standard house keys, key management has a number of potential difficulties that can affect the [...]

KMIP – A Beginner’s Guide

The Key Management Interoperability Protocol (KMIP) is a universal language for secure data management across platforms. It was developed by the Organization for Advancement of Structured Information Standards (OASIS), with the purpose of enabling communication between key management systems and cryptographically-enabled applications.

Infographic: New Integrations Available With SvKMS 2.5

With the launch of the latest version of StorMagic SvKMS, this SvKMS 2.5 infographic accompanies the release with all of the key information on what's new. SvKMS 2.5 introduces a number of new integrations, allowing organizations even greater security of their cloud applications and data. Google Cloud EKM, Azure Key Vault Managed HSM, Salesforce Shield and BitLocker can all now [...]

SvKMS 2.5: Latest Update Delivers Extended Support for Encryption Integrations

We are excited to announce that a new version of SvKMS, StorMagic’s enterprise encryption key management solution, is now available -- SvKMS 2.5. SvKMS 2.5 encompasses several expanded encryption integrations for on-prem, IaaS, and SaaS applications. This latest update provides new support for the Google Cloud External Key Management (EKM) Program, Azure Key Vault Managed HSM BYOK, Salesforce Shield, and [...]

Encrypting in MongoDB? You’ll Need a Third Party Key Manager

Database security is a vital component of an overall data protection strategy, especially for organizations that manage and store highly sensitive data, such as financial information or health records. MongoDB is a non-relational, or noSQL database that has quickly become one of the world's biggest database players, competing with large incumbent companies like Oracle and Microsoft SQL Server. noSQL databases are [...]

Introducing StorMagic KMaaS: Painless, Cloud-Based Security for any Encryption Workload

Many of today’s businesses are moving their data and applications from onsite datacenters to the cloud. Leveraging cloud services can provide a variety of customer benefits, including improved performance, reduced capital expenses, and increased business agility. At the same time however, cloud services have introduced a number of new vulnerabilities and security risks. In the increasingly predatory world of cloud-stored [...]

Infographic: Key Management-as-a-Service

StorMagic KMaaS (Key Management-as-a-Service) is a cloud-based key management offering that enables painless security for any encryption workload. It allows organizations to migrate their key management infrastructure into the cloud, eliminating any physical hardware needed to run the solution. StorMagic KMaaS ensures an organization can keep all keys secure and accessible within the cloud, regardless of encryption workload or location. [...]

Best Practices For Encryption Key Management When Storing Data in the Cloud

The proliferation of cloud-based services has radically simplified day-to-day data management and decreased overhead costs for many businesses. It is currently estimated that more than 60% of organizations have moved to cloud-based data systems, with many using the cloud to store sensitive information. At the same time however, cloud technology has brought with it a number of new business risks. [...]

Infographic: StorMagic MSP Program

StorMagic's MSP Program addresses the pain points faced by service providers when offering a key management service to their customers. The MSP Program allows StorMagic SvKMS encryption key management to be integrated into an MSP's suite of services, delivering differentiated data security through a unique high margin offering. Find out more about the key benefits in our MSP Program infographic [...]

StorMagic Introduces New MSP Program to Enable Partners to Build and Deliver Differentiated Data Security Solutions

Managed Service Providers Unlock Revenue Opportunities Through the Only Key Management Service that Supports Any Encryption Use Case BRISTOL, England – 9 June, 2020 – StorMagic®, simplifying storage and security from the edge to the core, announced the launch of its new MSP (managed service provider) program that enables MSPs to integrate StorMagic SvKMS into their own suite of services [...]

Distributor General Procurement Selects StorMagic for its First Virtual SAN and Key Manager Offerings

Distribution Agreement Adds Virtual SAN and Security Software Solutions to General Procurement’s Portfolio and Expands StorMagic’s Presence in Mexico BRISTOL, England – 28 May, 2020 – StorMagic®, simplifying storage and security from the edge to the core, announced today a new distribution agreement with General Procurement, Inc., who selected StorMagic SvSAN and SvKMS as its first virtual SAN and key [...]

Beyond Data Encryption – The Need for an Enterprise Key Management System

Enterprise Strategy Group (ESG) is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community. This report provides insight into why organizations must prioritize an efficient key management strategy alongside encryption for adequate cybersecurity and breaks down the challenges and requirements of modern key management. Abstract: Encryption is crucial to [...]

Is Your Edge Site a Cybersecurity Weak Point?

What do you picture when you think of cyber crime? Gangs stealing credit card details? Computer whizzes hacking organizations and stealing data? Physical cyber-security attacks are probably not the first thing that come to mind. However, we are living in a time where demand for computing power is at an all time high and there are more edge computing sites [...]