Posts

Peanut butter and jelly sandwich

Some Things Just Go Better Together, Like VMware and VaultCore

Portability, versatility, efficiency, and cost-effectiveness are just a few of the advantages of moving to virtualized environments. Instead of requiring a data center full of equipment, virtualization lets organizations rely on just a few servers. A smaller footprint equals less power consumption, lowered cost of ownership, and less overhead. However, too often, enterprises neglect security when it comes to implementing virtualization. Now, VMware makes it possible to easily encrypt and manage virtual machines (VMs) in minutes. Read more

pr-bg-thinkon

PRESS RELEASE: Fornetix to Partner with ThinkOn to Create Key Management as a Service Solution

FREDERICK, MARYLANDFornetix, LLC. today announced their technology partnership with ThinkOn Inc., Canada’s largest wholesale provider of cloud storage, compute, and networking resources. The VaultCore™ Key Management Solution will be deployed as an integral part of the ThinkOn suite of Infrastructure as a Service Offerings (IaaS), and will provide a critical layer of encryption management to ensure that sensitive data will remain secure wherever it resides.

“We are excited to partner with ThinkOn and introduce the VaultCore KMaaS Cloud solution to their ecosystem. We look forward to massive opportunities to work together providing the most secure solution on the market for encryption key management in the cloud,” said Mark Gilroy, CEO of Fornetix.

VaultCore will be providing encryption key management for ThinkOn’s cloud data storage environments enabling IT administrators and security professionals to manage encryption across their entire enterprise with precision, speed, and without impacting performance. ThinkOn will be utilizing VaultCore for cloud-based data management solutions where subscriber information is siloed and requires compliance with stringent laws and regulations involving privacy and protection of classified and sensitive data. VaultCore’s ability to delegate key user privileges for management via cloud services plays a pivotal role in the development of this partnership.

“At ThinkOn, we care about security and efficiency of cloud data management. We are very excited to align and partner with the best in industry innovators like Fornetix to deliver an enterprise level security framework to our subscribers,” said Craig McLellan, Founder of ThinkOn.

A key feature of VaultCore is its Policy Engine. VaultCore provides fine-grained inherited access controls for encryption, thus enabling organizations to define encryption key management use in line with their corporate policy. In addition to this, users can easily schedule and automate the full encryption key lifecycle process and manage over one hundred million keys across their entire infrastructure. VaultCore is certified as VMware Ready for Platform and Compute, providing seamless integration for datacenter environments that require KMIP.

About Fornetix

At Fornetix we understand that managing encryption in today’s complex environment can seem an impossible task. That is why we created VaultCore, a simplified, automated, and secure encryption key management solution designed to address security challenges arising from the proliferation of IoT, big distributed networks, and rapid cloud adoption. Our commitment to standards and interoperability enable us to join forces with leading technologies around the globe to provide smart and unified security solutions that bring order to the chaos of encryption management. For more about Fornetix, please follow us on LinkedIn and Twitter.

About ThinkOn

ThinkOn is an exclusive wholesale provider of cloud infrastructure and data management services with over 150 partners and over 1,100 end subscribers in the commercial and public sector. ThinkOn’s cloud is engineered for high availability, reliability, and scalability to meet the requirements of all kinds of critical workload. Headquartered in Toronto, the company delivers true data availability, protection, and privacy with 20+ operating regions compliant to critical industry level certifications across the globe. For more information visit www.thinkon.com.

For press inquiries and more information contact:

C Wolniewicz
SVP Global Marketing
Fornetix, LLC
marketing@fornetix.com

header

CISO SCENARIO: Your Subcontractor Has Been Breached | Fornetix

Let us consider a scenario in which an organization, a general contractor utilizing at least one subcontractor, implements a production chain security strategy powered by encryption, but NEGLECTS the addition of a key management system. You’re the CISO, responsible for the cybersecurity strategy that ensures your organization’s information assets and technologies are adequately protected.

Your team implemented standards-based encryption across the board and provided a common software platform to your supply chain partners, allowing for data to be transferred securely between your organizations…or so you thought.

Suddenly, your organization gets word from a subcontractor that they’re experiencing unusual network activity. The cybersecurity strategy you spent months creating is clear; cut off your partner’s network, lock down your data, and as CISO, stay up all night hoping the bad actor wasn’t able to permeate your network’s exterior defenses. In the interim, your IT department heads begin the grievous task of pulling reports from various locations and mulling them over to better understand any potential impact.

In the early morning hours, you find out that there was indeed a breach, courtesy of your subcontractor’s less-than-robust “secure network.” A bad actor was able to breach your defenses through your subcontractor’s weaker network, grabbed your data, and basically left unnoticed until your subcontractor alerted you to a “possible problem.” You’ve already spent a good portion of the night calculating the estimated costs of just such a breach, and you’re now faced with explaining what happened to your CEO.

Now, rewind, and imagine that you are the CISO who went beyond just “checking the box” for data encryption

The CISO who went beyond just “checking the box” for data encryption when planning their security strategy slept like a baby while his IT department went home in time for dinner with their families. The subcontractor did experience a breach, but your organization was left unscathed. Thanks to the encryption key management system you integrated with your legacy system earlier in the year, the company’s data remained secure. With the automated, short-life periodic key rotations, and the system’s robust identity capabilities, applications, and storage services, the necessary insight and controls needed to thwart this sort of next generation attack were in place and all data remained secure.

Addressing the overall security of not only your enterprise, but also those in your supply or distribution chains, in a protection-centric approach, is the most cost-effective and simple solution you can add to your current security strategy to protect your data. Learn how one encryption key management solution like Fornetix® VaultCore™ can extend the reach and power of your encryption and better protect your data from attack.

For a deeper dive into understanding encryption key management and how CISOs, CTOs, and others tasked with implementing enterprise security strategy and securing data across multiple environments can utilize a key management system to better protect their data, click here to read The CISO’s Guide to Understanding Encryption Key Management.

Wall of keys

Top 4 Challenges When Managing Encryption Issues

Implementing an encryption strategy comes with hefty baggage, but don’t worry; we’ve got you covered. In this post, we’ll cover the top four challenges of managing encryption issues and solutions to overcome them.  

Encryption key management is increasingly more important the more connected we become. With millions of devices and millions of users, there becomes an increasing need for effective cybersecurity tools that safeguard sensitive assets for individuals and organizations.

Read more

Panorama aerial view in the cityscape

Security and the Internet of Everything – Are We Ready?

The demand for connected devices is growing exponentially, but the technology to secure these devices is lagging creating cyber security vulnerabilities at a massive scale.

The Current State of Cyber Security

Every day we hear about breaches, hacks, and cyber-attacks affecting banks, hospitals, transportation, and even entire cities. In some instances, the impact can mean life or death. Our most trusted institutions – like the US election process – are not the pillars of security they once were. And yet the demand for “connected everything” continues to grow in all sectors and across the globe.

Read more

PODCAST: Chuck White Visits ‘New Cyber Frontier’ to Discuss Encryption and Cyber Defense

Our Chief Technology Officer at Fornetix, Chuck White, sat down with Professor Andre Hinton from the New Cyber Frontier podcast to explore the ways powerful encryption can solve the big problems of cybersecurity. Take a listen using the audio player below! Read more

Your Data Is in the Cloud and It’s at Risk

Companies and individuals are using cloud services more and more. Putting so much of our data into the cloud introduces a growing problem. The lines between public cloud, private cloud, and software-as-a-service (Saas) have rapidly blurred as new technology develops, redefining what “cloud” actually means. Some businesses put significant portions of their infrastructure into the cloud and choose to keep only a very small footprint in a traditional data center or office. More commonly, businesses will leverage SaaS to handle common IT requirements such as email, storage, CRM, and backups.

Read more

Fornetix Key Orchestration Achieves VMware Ready™ Status

Fornetix secures position as trusted VMware security partner for providing customers with easy-to-implement encryption solutions.

March 2018 — Fornetix® today announced that its enterprise key management system, Key Orchestration™, has achieved VMware Ready™ status. This designation indicates that after a detailed validation process, Key Orchestration has been awarded VMware’s highest level of endorsement and is supported on VMware vSphere 6.5 and vSAN 6.6 for production environments. Read more

Bringing Smart Encryption Management to Virtual Machines

Securing Virtual Environments Shouldn’t be an Afterthought

Portability, versatility, efficiency, and cost effectiveness — these are just a few of the advantages of moving to virtualized environments. Virtualization allows enterprises to shift datacenters full of equipment down to a just a few servers. A smaller footprint means less power consumption, lowered cost of ownership, and less overhead. Too often, though, enterprises neglect security when it comes to implementing virtualization. Securing virtual environments has become an afterthought. Read more