Posts

Caution in the Factory

Safeguarding Manufacturing: Data Security Control

 

The Vulnerabilities.

Manufacturing involves multiple tiers of suppliers providing components that come together to create the end product. Each tier is an exercise in unique processes to the manufacturer and their third-party suppliers’ raw materials, production, inventory, and distribution. This complicated convergence of players, processes, and data creates a wicked infrastructure security problem.

Read more

The Good, the Bad and the Ugly of 5G for Business

The Good, the Bad, and the Ugly of 5G for Business

The Good.

The advent of 5G is an exciting development in connectivity for most businesses. From the farmer who can now remotely monitor field conditions to the global manufacturing leader dependent upon a digital supply chain, to mom-and-pop shops offering real-time-customer service, 5G is changing the way business gets done. And both owners and consumers are enjoying the benefits!

For most, 5G still lacks the true “100 times faster” connection that service providers touted it would bring in 2019. But still, its improvements to speed and lower latency over 4G LTE for business connectivity have already established it as a game changer.

Although 5G is one of the fastest growing technologies in history with adoption 4x as fast as LTE, it will be years before 5G networks blanket the globe. However, explosive adoption is already well underway in the automotive, manufacturing, utilities, and healthcare industries, all of which have been catalysts for a rush on new IoT devices for business efficiencies, enhanced customer service, the movement of large amounts of data, and more.

As 5G network availability grows, the potential for 5G IoT business devices has grown exponentially. Unfortunately, the security risks have grown with it

Read more

CCPA: The 500 Pound Gorilla Sitting on Your Security Strategy | Fornetix

CCPA stands for California Consumer Privacy Act. However, your company doesn’t have to be located in California for this law to affect business. If you’ve collected personal data on at least 50,000 people, or have $25 million or more in annual revenue, CCPA applies to your organization.

Proposition 24, also known as the California Privacy Rights and Enforcement Act of 2020, was passed by California voters in the November 2020 election. Proposition 24 expands the reach and amends some provisions of CCPA, creating additional protections for Californians, and additional work for organizations.

In short, CCPA (and the passage of Proposition 24) was enacted to protect California residents’ data from theft or misuse. It was also created to compel companies collecting or storing Californians’ data to initiate more effective data security practices to curb the increasing number of data breaches negatively impacting Californians.

The Gorilla can Cause Real DamageGorilla

GorillaAt the core of CCPA’s initiatives is the new responsibility placed on organizations to encrypt sensitive data. Companies across the globe have quickly complied by increasing their encryption of data at rest, in motion, and in the Cloud. But this move to mass encrypt data has inadvertently created a staggering problem for many organizations – a 500-pound gorilla – that instead of helping protect sensitive data, has quelled efforts by leaving organizations with more encryption key material than can adequately and successfully be managed without a dedicated encryption Key Management System (KMS).

More data encryption means more encryption keys. The more keys that are generated and used, the higher the odds an attacker will find a way to compromise them. Just like passwords on our computers, encryption keys must be rotated as frequently as possible. The rotation of keys increases the complexity and expense of encryption exponentially, but greatly decreases the probability of a successful attack on data.

So How do You Get Rid of the Gorilla?

A proper solution would be to install a highly scalable encryption key management system that fully automates the key lifecycle thereby alleviating the excessive weight additional encryption keys have put on your security strategy.

Enter: Fornetix’s VaultCore™. This patented, next generation key management solution provides a robust, simple to use, and secure “set it and forget it” approach that works actively to protect your data. The VaultCore system allows organizations to put in place a re-keying schedule that matches their desired policy, often saving organizations tens of thousands of dollars by turning a manual process into a simple click of a button, and grossly reducing errors associated with human nature.

How Encryption Key Management is Saving Companies Struggling with CCPA

Delivered as a physical or virtual appliance, VaultCore delivers a unified approach to data security through deploying and enforcing encryption across the entire organization – across all devices. This means an organization has the power to store and control all encryption keys for all data and helps to ensure the organization is meeting CCPA by adequately protecting data through encryption AND key management.

The most scalable KMS available, VaultCore is capable of handling over 100 million keys, more than adequate for any industry as they grow and continue to strive to meet CCPA, GDPR and the myriad of other regulations being put in place.

For a deeper dive into understanding encryption key management and how it works with your current security strategy to meet CCPA to protect sensitive data and relieve your organization’s security strategy struggles, click here to read how Encryption Key Management is Saving Companies Struggling with California Consumer Privacy Act (CCPA).

header

CISO SCENARIO: Your Subcontractor Has Been Breached | Fornetix

Let us consider a scenario in which an organization, a general contractor utilizing at least one subcontractor, implements a production chain security strategy powered by encryption, but NEGLECTS the addition of a key management system. You’re the CISO, responsible for the cybersecurity strategy that ensures your organization’s information assets and technologies are adequately protected.

Your team implemented standards-based encryption across the board and provided a common software platform to your supply chain partners, allowing for data to be transferred securely between your organizations…or so you thought.

Suddenly, your organization gets word from a subcontractor that they’re experiencing unusual network activity. The cybersecurity strategy you spent months creating is clear; cut off your partner’s network, lock down your data, and as CISO, stay up all night hoping the bad actor wasn’t able to permeate your network’s exterior defenses. In the interim, your IT department heads begin the grievous task of pulling reports from various locations and mulling them over to better understand any potential impact.

In the early morning hours, you find out that there was indeed a breach, courtesy of your subcontractor’s less-than-robust “secure network.” A bad actor was able to breach your defenses through your subcontractor’s weaker network, grabbed your data, and basically left unnoticed until your subcontractor alerted you to a “possible problem.” You’ve already spent a good portion of the night calculating the estimated costs of just such a breach, and you’re now faced with explaining what happened to your CEO.

Now, rewind, and imagine that you are the CISO who went beyond just “checking the box” for data encryption

The CISO who went beyond just “checking the box” for data encryption when planning their security strategy slept like a baby while his IT department went home in time for dinner with their families. The subcontractor did experience a breach, but your organization was left unscathed. Thanks to the encryption key management system you integrated with your legacy system earlier in the year, the company’s data remained secure. With the automated, short-life periodic key rotations, and the system’s robust identity capabilities, applications, and storage services, the necessary insight and controls needed to thwart this sort of next generation attack were in place and all data remained secure.

Addressing the overall security of not only your enterprise, but also those in your supply or distribution chains, in a protection-centric approach, is the most cost-effective and simple solution you can add to your current security strategy to protect your data. Learn how one encryption key management solution like Fornetix® VaultCore™ can extend the reach and power of your encryption and better protect your data from attack.

For a deeper dive into understanding encryption key management and how CISOs, CTOs, and others tasked with implementing enterprise security strategy and securing data across multiple environments can utilize a key management system to better protect their data, click here to read The CISO’s Guide to Understanding Encryption Key Management.

blog-pr-nutanix

PRESS RELEASE: Fornetix to Present VaultCore™ encryption key management technology at Nutanix .NEXT Digital Experience

FREDERICK, MARYLANDFornetix, a Nutanix partner, announced today that they will host a booth at Nutanix’s Global .NEXT Digital Experience conference September 8-11. Visit Fornetix’s digital booth and learn how Fornetix’s patented key encryption management technology, VaultCore™ integrates with the Nutanix platform to help companies:

  • Reduce Costs by Executing & Scheduling Key Management Operations in Seconds
  • Meet Compliance & Security Concerns with a Validated Solution
  • Incorporate Key Management in Organizational Log Management Strategies
  • Encrypt Virtual Machines Through Interoperability with vSphere 6.5
  • Manage Keys Consistently Across Heterogeneous Environments

VaultCore is a highly scalable encryption key management solution that when coupled with Nutanix’s powerful, yet flexible, hyper-converged data center infrastructure creates a secure solution that orchestrates encryption strategy without hindering business productivity.

Nutanix applies a holistic approach to security throughout their solution which includes support for FIPS 140-2 compliant data-at-rest encryption, with options to leverage self-encrypting drives (SEDs) or software-based encryption using standard drives. This capability allows customers to encrypt data using strong encryption algorithms backed by enterprise grade key management.

With an integration made possible through the Key Management Interoperability Protocol (KMIP), Nutanix communicates with the Fornetix VaultCore™ Key Management System to ensure unification and control over encryption keys across the enterprise.

“We’re excited to be presenting our joint solution at the Nutanix .NEXT virtual conference,” says Mark Gilroy, CEO of Fornetix. “The combination of our innovative key management technology, VaultCore, and Nutanix’s storage software, provide a seamless solution at the largest scale available on the market to unify data control and security.”

The .NEXT Digital Experience will bring together visionaries, developers, and IT leaders from around the globe to share the latest in hybrid and multicloud computing, datacenter infrastructure, storage, end user computing, database and more. The interactive event will feature a virtual “expo floor” where attendees can explore and discover new ways to modernize and optimize their datacenter operations.

About Fornetix

At Fornetix we understand that managing encryption in today’s complex environment can seem an impossible task. That is why we created VaultCore, a simplified, automated, and secure encryption key management solution designed to address security challenges arising from the proliferation of IoT, big distributed networks, and rapid cloud adoption. Our commitment to standards and interoperability enable us to join forces with leading technologies around the globe to provide smart and unified security solutions that bring order to the chaos of encryption management. To request a complimentary demo of VaultCore, click here.

For press inquiries and more information contact:

C Wolniewicz
SVP Global Marketing
Fornetix, LLC
marketing@fornetix.com

power lines

PRESS RELEASE: Fornetix to Provide Encryption Management for ADD-Bulgaria on Millions of Smart Meters in Eastern Europe

FREDERICK, MARYLANDFornetix, LLC today announced it has commenced the launch of a central project with ADD-Bulgaria, a technology company providing intelligent solutions for remote data transfer, analysis of information, and management of smart meters in Eastern Europe. Fornetix’s VaultCore was chosen as it is the only key management solution to meet all the requirements needed for securing millions of smart meters. VaultCore not only provides the scalability needed, but also meets compliance requirements as directed by the Prime Alliance who oversees the interoperable standards for advanced meter management and smart grids in Europe. VaultCore will be deployed for encryption key management of over 2.5 million smart meters.

add-fornetix“VaultCore’s ability to easily manage hundreds of millions of keys coupled with our commitment to interoperability and compliance make this project a perfect fit, and we look forward to a long relationship with Fornetix and providing advanced secure solutions for connected devices to our customers in Europe,” said Alexandar Dikarlo, Sales Director at ADD-Bulgaria.

ADD-Bulgaria focuses on offering a turn-key solution to its customers since its establishment in 2006. A complete end-to-end system of an MDM, data concentrators and meters, all designed according to the customers’ needs and requirements. ADD has grown bigger, has attracted some of the most important players on the energy arena as its partners, suppliers and customers. This project with Fornetix will enable ADD-Bulgaria to provide secure solutions that meet Personally Identifiable Information (PII) regulations such as the General Data Protection Regulation (GDPR). Since energy data is considered private and, in some cases, PII, it must be encrypted to comply with EU laws.

“It is wonderful to be supporting the advancement of key solutions for the European consumers that meets GDPR and the rigorous requirements for securing smart meters. It is quite a challenging environment, but we are excited to be able to be the encryption key management provider for 2.5 million secure smart meters in Eastern Europe,” said Mark Gilroy, CEO of Fornetix.

Fornetix will address testing, delivery, and implementation of a new generation system for automated and dynamic management of cryptographic materials with capacity up to 100 million keys. The key distribution system was successfully integrated into the existing Smart Metering system on the territory of the utility company.

This is a massive, central program that came together between ADD-Bulgaria and Fornetix after a few years of working together to ensure the best possible security solution for the implementation of smart metering systems for electricity, water, gas, and street lighting in Eastern Europe.

About Fornetix

At Fornetix we understand that managing encryption in today’s complex environment can seem an impossible task. That is why we created VaultCore, a simplified, automated, and secure encryption key management solution designed to address security challenges arising from the proliferation of IoT, big distributed networks, and rapid cloud adoption. Our commitment to standards and interoperability enable us to join forces with leading technologies around the globe to provide smart and unified security solutions that bring order to the chaos of encryption management. To request a complimentary demo of VaultCore, click here.

About ADD-Bulgaria

ADD-Bulgaria offers turn-key technology for remote management of connected devices, data transfer and data analysis for the energy and industrial sector. At ADD we believe that the time and resource consuming processes of measurement and maintenance of expensive equipment can be substituted with remote, timely and smart management and monitoring solutions with one ultimate goal – to help our customers achieve greater efficiency, process optimisation and huge cost reduction.

Our experience dates back from 2006 and lies upon many projects of various type, application and complexity. We have installed and are currently supporting one of the biggest smart metering deployments in Europe, with millions of electric meters, we have realized several projects for street lights modernization and we are participating in projects for automating the electricity and water metering process in ports and marinas. For more visit the ADD-Bulgaria Website.

Media Contact

C Wolniewicz
SVP Global Marketing
Fornetix, LLC
marketing@fornetix.com

blog-pr-dell

PRESS RELEASE: Fornetix’s VaultCore™ Now an Embedded Security Solution

FREDERICK, MARYLANDFornetix, LLC today announced the selection of Dell Technologies Design Solutions to deliver its VaultCore™ encryption key management system on Dell Technologies storage and hyperconverged infrastructure platforms. VaultCore is a 1u or 2u appliance that slots into the management pod rack providing an integrated system for enterprise key policy and automation.

“We are pleased to deliver VaultCore on Dell Technologies infrastructure hardware. This solution will equip customers with embedded protection from cyber-attacks for storage, hyperconverged infrastructure and more,” said Mark Gilroy, CEO of Fornetix.

VaultCore provides a single-pane-of-glass for IT administrators and security professionals to manage encryption across the entire enterprise with precision, speed, and little impact on performance. A key feature of VaultCore is its Policy Engine which provides fine-grained inherited access controls for encryption giving enterprises the ability to define encryption key management use in line with their corporate policy. All of this works behind the scenes, automatically with no effort from an end user to offer consistent, secure encryption key management for applications, communications, and storage.

Users can easily schedule and automate the full encryption key lifecycle process and manage tens of millions of keys for large-scale environments. VaultCore is the only key management solution on the market with US provenance and secure supply chain ensuring integrity across the entire enterprise infrastructure. VaultCore can also employ FIPS 140-2 Level 3 validated protections by using an HSM.

The VaultCore solution enables security in various uses cases including IoT, Edge, Multi-cloud and MSL. Examples include: Storage D@RE – enterprise approach to handling keys for heterogenous storage platforms; Data Center and Multi-Cloud – serves trust to DC components, servers switches, storage, and virtualization, extending to the cloud via VMware or Microsoft; Zero Trust/Multi-Tenancy – secure separation of network enclaves; Seamless integration with vRealize, NSX and VSAN; and for Edge/IOT, a remote kill switch keeps access points in the wild secure.

ABOUT FORNETIX

At Fornetix we understand that managing encryption in today’s complex environment can seem an impossible task. That is why we created VaultCore, a simplified, automated, and secure encryption key management solution designed to address security challenges arising from the proliferation of IoT, big distributed networks, and rapid cloud adoption. Our commitment to standards and interoperability enable us to join forces with leading technologies around the globe to provide smart and unified security solutions that bring order to the chaos of encryption management. For more about Fornetix visit our website. Follow us on LinkedIn and Twitter #VaultCore

MEDIA CONTACT

C Wolniewicz
SVP Global Marketing
Fornetix, LLC
marketing@fornetix.com

blog-vaultcore

PRESS RELEASE: Fornetix and D360 Technologies Partner to Bring Fornetix VaultCore™ to Japan Market

FREDERICK, MARYLANDFornetix, LLC and D360 Technologies jointly announced today that they formed a partnership to bring Fornetix VaultCore™ to the Japan market. Fornetix VaultCore is an advanced encryption key management solution that automates the full key lifecycle across the entire enterprise from infrastructure to end-point, allowing organizations to easily manage encryption keys and secure critical data assets. This partnership will be focused on introducing the VaultCore solution to the medical, smart IoT, telecommunications, and automotive industry sectors.

The COVID-19 crisis has created a significant need for telework and the distributed networks to support it. This has enabled an increase in the attack surface area for bad actors uncovering major vulnerabilities throughout the enterprise. According to a recent Gartner report, only 18% of IT leaders believe their businesses are highly prepared for the impact of coronavirus. It is clear that this requires the immediate establishment of an encryption security solution that protects data seamlessly wherever it resides, and enforces consistent security policies throughout the data life cycle.

“We are excited to bring Fornetix VaultCore to the Japan market and help companies protect themselves from the increase of vulnerabilities due to the current pandemic. Implementing VaultCore is a smart decision for any IT administrator who is looking for a security solution to protect critical data, now and for the future.” – Mark Gilroy, CEO, Fornetix, Inc.

fornetix-vaultcore-logo-blackVaultCore provides simple scale encryption management for public, private, on-premise, virtual, and cloud environments. VaultCore’s detailed policy tools, user access controls, and robust automation make it easy to manage the entire encryption key lifecycle across the enterprise. VaultCore is the only encryption management solution capable of providing, processing and supporting hundreds of millions of keys for large distributed environments with minimal performance impact. Easy integration with KMIP and non-KMIP using Fornetix’s Orchestration Gateway™ allows companies to leverage their existing technology investments. The Fornetix VaultCore appliance is a FIPS 140-2 Level 2 validated solution (with NIST Certification pending) that employs an HSM for a FIPS 140-2 Level 3 root of trust.

About Fornetix

At Fornetix we understand that managing encryption in today’s complex environment can seem an impossible task. That’s why we created VaultCore, a simplified, automated, and secure encryption key management solution designed to address security challenges arising from the proliferation of IoT, big distributed networks, and rapid cloud adoption. Our commitment to standards and interoperability enable us to work with leading technologies around the globe to provide smart and unified security solutions that bring order to the chaos of encryption management. For more information please visit our website, www.fornetix.com.

About D360 Technologies

D360 is a leading agency that specializes in helping companies build and launch new disruptive products and services globally. D360 services include product management, software development, business development, licensing, demand generation and all necessary go-to-market elements that help companies launch successfully.

D360 experts bring significant real-world experience across digital media, consumer electronics and e-commerce which enable clients to have a solid playbook on how to build and launch a product or service effectively. Further, with D360 experts located throughout North America, Europe, Asia and Japan, it gives clients a wide footprint with immediate access to key partners and resellers across the globe. www.d360technologies.com

Media Contact

Catherine Wolniewicz
SVP Global Marketing
Fornetix, LLC
marketing@fornetix.com

blog-vaultcore

Fornetix Granted U.S. Patent That Ensures Accurate and Swift Deployment of Encryption Policies Across All Devices

Innovative breakthrough in encryption key management strengthens VaultCore™ as leading security solution for enterprises

FREDERICK, MD – Fornetix, LLC, an industry pioneer and leader in enterprise encryption management technology, today announced that the United States Patent and Trademark Office has issued US Patent 10,630,686 B2, entitled “Systems and Methods for Organizing Devices in a Policy Hierarchy.”

This patented proprietary technology affords enterprise IT administrators from every industry the power to organize all of their systems in a policy-based hierarchy. This ensures only encryption keys that comply with the latest standards are deployed to the appropriate devices and enforced accordingly.

A cornerstone of VaultCore™, Fornetix’s encryption key management solution, patent coinventor and Fornetix CTO Chuck White explains, “This innovation is a key differentiator between VaultCore and the competition. The ability to deploy policy in a hierarchy guarantees swift and accurate integration and enforcement of mandated cryptographic policies throughout the entire enterprise.” White added, “Combine this technology with VaultCore’s capacity to manage hundreds of millions of encryption keys, and you have the best solution available for a unified approach to key management.”

The issuance of this novel patent brings Fornetix to eight sole rights for groundbreaking technologies that have been incorporated into the VaultCore encryption key management solution. Additionally, Fornetix has five US patent applications currently pending along with nearly one hundred international applications.

About Fornetix

At Fornetix we understand that managing encryption in today’s complex environment can seem an impossible task. That’s why we created VaultCore, a simplified, automated, and secure encryption key management solution designed to address security challenges arising from the proliferation of IoT, big distributed networks, and rapid cloud adoption. Our commitment to standards and interoperability enable us to join forces with leading technologies around the globe to provide smart and unified security solutions that bring order to the chaos of encryption management.

blog-vengar-header

PRESS RELEASE: Fornetix and Vengar Technologies Join Forces to Create Disruptive Zero-Trust Solution

Partnership delivers impenetrable security foundation throughout the enterprise and out to the edge

FREDERICK, MARYLANDFornetix, LLC today announced its technology partnership with Vengar Technologies, creating a powerful, innovative joint data protection solution that leverages Fornetix’s innovative encryption key management system, VaultCore™,and Vengar’s zero-trust object level data protection.

“As a young company, we’re excited to align Vengar Technologies with the Fornetix group. Fornetix brings a mature and impressive list of customers from gov to commercial,” said Toney Jennings, CEO of Vengar. “We’re confident this partnership will greatly increase our joint technology offering and sales velocity. Because of our relationship with Mr. Gilroy, the Fornetix team, and the new combined offering, we are also moving our east coast headquarters to the DC region, which will be hubbed out of the Fornetix headquarters in Frederick, Maryland embedded in a full SCIF.”

Using a unique combination of multi-layered encryption and Identity & Access Management technologies, Vengar’s solution creates a micro-perimeter all the way down to individual data object level. This micro-perimeter travels with the data wherever it goes, at all times for the entire document lifecycle. Before access to the data is granted, the user’s identity along with their access and usage rights are validated every time. Validation for access is based on multiple factors including user identity (username, password, biometrics, PIN, token, etc), Device ID, Geolocation, authorized access timeframes, usage rights (read only, etc), and threat risk. Vengar’s proprietary solution addresses concerns over where the zero-trust data package has gone or who has access to it is since it can only be accessed by authorized recipients under authorized circumstances.

“We are extremely excited to announce our relationship with Vengar Technologies. The combination of our innovative key management technology with Vengar’s object security solution empowers Fornetix to bring to market a disruptive joint solution like no other in the cybersecurity space,” says Mark Gilroy, CEO of Fornetix. “Now federal and commercial enterprises will be fully enabled to address and mitigate the core security vulnerabilities in this age of IoT and rapid cloud adoption.”

Fornetix’s VaultCore makes encryption management at scale simple whether in the cloud, on prem or hyperconverged environments. VaultCore’s granular policy tools, user access controls, and powerful automation makes it easy to manage the entire life cycle of encryption keys throughout the enterprise and out to the edge. VaultCore is the only encryption management solution with the capacity to deliver, process, and support hundreds of millions of keys for large-scale distributed environments with little impact on performance. Easy integration via KMIP, and non-KMIP, using Fornetix’s Orchestration Gateway, VaultCore enables companies to leverage their existing technology investments. VaultCore is also validated up to FIPS 140-2 Level 2, and Level 3 with HSM integration. The combination of Fornetix and Vengar addresses the complexity needed to meet more stringent regulatory mandates, guidelines, and standards that are being activated to protect sensitive customer data.

By combining VaultCore’s powerful key management system with Vengar’s innovative zero-trust data protection solution, customers now have a security solution that includes an easily integrated platform providing an impenetrable security foundation throughout the enterprise and out to the edge.

ABOUT FORNETIX

At Fornetix we understand that managing encryption in today’s complex environment can seem an impossible task. That’s why we created VaultCore, a simplified, automated, and secure encryption key management solution designed to address security challenges arising from the proliferation of IoT, big distributed networks, and rapid cloud adoption. Our commitment to standards and interoperability enable us to join forces with leading technologies around the globe to provide smart and unified security solutions that bring order to the chaos of encryption management.

ABOUT VENGAR

Vengar is a cybersecurity SaaS pioneer of “Zero-Trust” data solutions. Vengar solutions allows our clients to maintain control of their data, forever, even when it has left their possession and traveled around the world. In an increasingly prolific threat environment, new and innovative cross-platform approaches are required. Vengar combines on-device encryption, identity management, geofencing, and DRM to provide the very best data protection while also delivering simplified deployment and seamless user experience. Our philosophy is simple: Trust No One.

MEDIA CONTACT

Catherine Wolniewicz
SVP Global Marketing
Fornetix, LLC
marketing@fornetix.com