security

Encryption – A Beginner’s Guide

Encryption is the process of protecting data by changing it from a readable form to an unreadable form. It uses complex algorithms to “scramble” and therefore protect data - as it’s unreadable and can’t be accessed.

A Look Into StorMagic’s Crystal Ball: 2022 Predictions for Edge, Video, Security and More

As another year comes to a close, the folks at StorMagic have been spending some time reflecting on the past year and contemplating what IT trends and transformations they expect to see in 2022. Here are some of the technology predictions our experts anticipate for the year ahead: Advancements to Technology: Year over year, technology continues to evolve, and 2022 [...]

BYOK – A Beginner’s Guide

Bring Your Own Key (BYOK), also referred to as Customer Supplied Encryption Keys (CSEK), is a model of encryption key management that enables customers to take full control of their encryption keys when storing data in the cloud.

Cybersecurity – A Beginner’s Guide

What is Cybersecurity? Cybersecurity is a term used to describe the practice of defending networks, devices, applications, and data from unauthorized access, hacking, malware, and other forms of cyber threats. It consists of a variety of different technologies, tools, processes, and approaches, for ensuring data confidentiality, integrity, and availability, also known as the CIA triad. They are just [...]

StorMagic Proudly Claims Gold in the 2021 Cybersecurity Excellence Awards

We are excited to announce that StorMagic was selected as a gold winner in two different categories of the 2021 Cybersecurity Excellence Awards. StorMagic KMaaS was awarded gold in the “Cybersecurity Product / Service Awards -- Data Security” category, and SvKMS in the “Cybersecurity Industry Solutions Awards -- Manufacturing” category. Each year, Cybersecurity Insiders hosts its Cybersecurity Excellence Awards program, [...]

Is There Still a Place for HSMs in Modern Data Protection?

Hardware Security Modules (HSMs) have been the standard for encryption for the last 20 years. But with the emergence of computing that spans on-prem, cloud and edge environments, there has been a shift away from physical, on-premises HSMs to software-based key management systems. With that said, are HSMs still relevant? Is an HSM best for an organization’s current data protection [...]

High Availability’s Role in Protecting Data and Improving Performance

High availability (HA) is vital to protecting sensitive data, and an important part of key management. Key management is central to data encryption – encryption keys are like the keys to your house, and act to protect your valuables (the encrypted data). But, much like standard house keys, key management has a number of potential difficulties that can affect the [...]

KMIP – A Beginner’s Guide

The Key Management Interoperability Protocol (KMIP) is a universal language for secure data management across platforms. It was developed by the Organization for Advancement of Structured Information Standards (OASIS), with the purpose of enabling communication between key management systems and cryptographically-enabled applications.

Cyber Resilience – A Beginner’s Guide

What is Cyber Resilience? As the world becomes increasingly reliant on technology, the internet, and cloud computing, the level of cyber crime occurring around the globe is also on the rise. Consequently, “cyber security,” a term used to describe defending data, networks and IT systems, from cyber attacks, has become a hot topic in the business world. While [...]

Implementing IT Systems within Pharmacies: Challenges, Requirements, and More

Everyone has made a trip to the pharmacy at some point in their lives. But have you ever stopped to think about the technologies pharmacies utilize and how much data they’re generating, sharing, and storing on a daily basis? There are many steps that go into the process of getting the right medication into the hands of the right patient, [...]

Ecommerce Merchants: Stay Resilient in the Face of Downtime and Cyber Threats

Ecommerce has become a critical pillar of the global economy. Prior to the current pandemic, 2 billion people were buying from over 7 million online businesses according to etailinsights. As COVID-19 has progressed, brick-and-mortar businesses around the globe have adopted many new precautions and regulations to keep their customers safe. This includes transitioning to primarily, if not exclusively, selling their [...]

High Availability – A Beginner’s Guide

What is High Availability? High Availability (HA) refers to a system’s ability to ensure uninterrupted operation and accessibility, typically measured as a percentage of uptime. Decreased downtime, the elimination of single points of failure, and replication and distribution of data across multiple locations, are all contributing factors that come together to create a high availability architecture. Availability is the [...]

IoT and Security: Protecting Data in the Internet of Things

The internet of things (IoT) – the interconnection of everyday devices via networks that facilitate interactions, including the exchange of data – is an ever-present force in the contemporary world. Whether in our personal or professional lives, we seem to always be “connected” to IoT endpoints. The growth of these types of network capacities comes with huge potentials, as well [...]

Encryption Key Management – A Beginner’s Guide

Key management refers to the process of creating, using, storing, exchanging, archiving, discarding, and replacing cryptographic keys in an encryption system. Its purpose is to secure an organization’s keys, and to prevent cybercriminals or unauthorized individuals from accessing and corrupting sensitive data that has been protected through encryption.

Beyond Data Encryption – The Need for an Enterprise Key Management System

Enterprise Strategy Group (ESG) is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community. This report provides insight into why organizations must prioritize an efficient key management strategy alongside encryption for adequate cybersecurity and breaks down the challenges and requirements of modern key management. Abstract: Encryption is crucial to [...]