High availability (HA) is vital to protecting sensitive data, and an important part of key management. Key management is central to data encryption – encryption keys are like the keys to your house, and act to protect your valuables (the encrypted data). But, much like standard house keys, key management has a number of potential […]
The Key Management Interoperability Protocol (KMIP) is a universal language for secure data management across platforms. It was developed by the Organization for Advancement of Structured Information Standards (OASIS), with the purpose of enabling communication between key management systems and cryptographically-enabled applications.
With the launch of the latest version of StorMagic SvKMS, this SvKMS 2.5 infographic accompanies the release with all of the key information on what’s new. SvKMS 2.5 introduces a number of new integrations, allowing organizations even greater security of their cloud applications and data. Google Cloud EKM, Azure Key Vault Managed HSM, Salesforce Shield […]
We are excited to announce that a new version of SvKMS, StorMagic’s enterprise encryption key management solution, is now available — SvKMS 2.5. SvKMS 2.5 encompasses several expanded encryption integrations for on-prem, IaaS, and SaaS applications. This latest update provides new support for the Google Cloud External Key Management (EKM) Program, Azure Key Vault Managed […]
Database security is a vital component of an overall data protection strategy, especially for organizations that manage and store highly sensitive data, such as financial information or health records. MongoDB is a non-relational, or noSQL database that has quickly become one of the world’s biggest database players, competing with large incumbent companies like Oracle and Microsoft […]
Many of today’s organizations are producing, sharing, and storing mass amounts of sensitive information on a regular basis. As the volume of critical data being generated and circulated around the globe has increased over time, so too have threats of hacking and cyber attacks. Security and risk management (SRM) staff are being driven by an […]
Many of today’s businesses are moving their data and applications from onsite datacenters to the cloud. Leveraging cloud services can provide a variety of customer benefits, including improved performance, reduced capital expenses, and increased business agility. At the same time however, cloud services have introduced a number of new vulnerabilities and security risks. In the […]
StorMagic KMaaS (Key Management-as-a-Service) is a cloud-based key management offering that enables painless security for any encryption workload. It allows organizations to migrate their key management infrastructure into the cloud, eliminating any physical hardware needed to run the solution. StorMagic KMaaS ensures an organization can keep all keys secure and accessible within the cloud, regardless […]
The proliferation of cloud-based services has radically simplified day-to-day data management and decreased overhead costs for many businesses. It is currently estimated that more than 60% of organizations have moved to cloud-based data systems, with many using the cloud to store sensitive information. At the same time however, cloud technology has brought with it a […]
StorMagic’s MSP Program addresses the pain points faced by service providers when offering a key management service to their customers. The MSP Program allows StorMagic SvKMS encryption key management to be integrated into an MSP’s suite of services, delivering differentiated data security through a unique high margin offering. Find out more about the key benefits […]
Managed Service Providers Unlock Revenue Opportunities Through the Only Key Management Service that Supports Any Encryption Use Case BRISTOL, England – 9 June, 2020 – StorMagic®, simplifying storage and security from the edge to the core, announced the launch of its new MSP (managed service provider) program that enables MSPs to integrate StorMagic SvKMS into […]
Key management refers to the process of creating, using, storing, exchanging, archiving, discarding, and replacing cryptographic keys in an encryption system. Its purpose is to secure an organization’s keys, and to prevent cybercriminals or unauthorized individuals from accessing and corrupting sensitive data that has been protected through encryption.
El acuerdo de distribución añade soluciones de SAN virtual y ciberseguridad a la cartera de productos de General Procurement, y expande la presencia de StorMagic en México. BRISTOL, Inglaterra – 28 Mayo, 2020 – StorMagic®, cuya misión es simplificar el almacenamiento y la seguridad en soluciones que van desde el Edge Computing hasta el Core […]
Distribution Agreement Adds Virtual SAN and Security Software Solutions to General Procurement’s Portfolio and Expands StorMagic’s Presence in Mexico BRISTOL, England – 28 May, 2020 – StorMagic®, simplifying storage and security from the edge to the core, announced today a new distribution agreement with General Procurement, Inc., who selected StorMagic SvSAN and SvKMS as its […]
Edge sites require leaner infrastructure than traditional datacenters, making physical attack the most likely security threat that an edge site will face. Therefore, a critical aspect of security for edge sites is encryption. Unfortunately, a fundamental part of encryption is key management, something that can be almost impossible to implement over lots of edge and […]