Posts

Blue clouds

The Benefits of nCipher’s New Serviced-Based Hardware Security Module (HSM)

When considering the intersection of Roots of Trust and the accessibility of services provided by cloud architecture, reliable options quickly become scarce. That is why we at Fornetix are excited to see nCipher launch their “nShield as a Service” (nSaaS) offering. With the combination of Internet of Things (IoT) based technologies and the embracing of “as a Service” cloud capabilities, there is a growing need for HSM services that can be provisioned and integrated with cloud principles while not belonging to a specific cloud vendor. At Fornetix, we built our technology to play to the middle, enabling public, private, and hybrid cloud solutions. We are excited to see nCipher’s nSaaS solution parallel our own. We believe the joint approach will help customers embrace effective use of cryptography no matter how they use technology, whether it be cloud first/cloud native, hybrid cloud, or private cloud.

Read more

Man jumping off a cliff

Guest Post: Before You Dive Into IoT, Do These Three Things

Olympic high diving requires concentration and self-control. Before divers jump off a 10-meter platform, they pause at the edge and concentrate on their goal: elegantly perform the acrobatic maneuver and gracefully pierce the water causing minimum surface disturbance. This same disciplined approach is required when adopting new and revolutionary technologies, such as those now available through the Internet of Things (IoT). Decision makers must assess the risks and benefits, consider potential difficulties, and then take the jump.

Read more

Differentiating Key Management Systems & Hardware Security Modules (HSMs)

Who let the encryption keys out? Dog with Keys

Key encryption managers have very clear differences from Hardware Security Modules (HSMs.)  The main differences reside in how the HSM encryption keys can be used by a Key Manager or HSM.  There are other more important differentiators, however, let’s start with how encryption key managers leverage open standards, like the Key Management Interoperability Protocol (KMIP), and what exactly an HSM is.

Read more