On November 20th, Fortanix announced integration between the Fortanix Self-Defending Key Management Service (SDKMS) with the Google Cloud External Key Manager (Cloud EKM) service in the session Bringing You More Control: New Services for Data Security and Transparency, featuring a demonstration by joint customer PayPal.
Early morning today, GCP became the first major cloud provider to give its customers the controls needed to protect their data, even when using the native cloud services such as BigQuery. Google unveiled "External KMS" working with Fortanix and PayPal at Next'19 in London.
Today, Fortanix introduced a new feature in the Fortanix Self-Defending Key Management Service (SDKMS) to support integration with the Google Cloud’s External Key Manager service, which was announced today at the Google Cloud Next UK conference.
Fortanix SDKMS is a unified cryptography and key management solution which offers HSM-grade security with software-like scalability, flexibility, and effectiveness. It has a cryptography toolkit, key management, role-based access control, and tamper-proof audit logs. Fortanix has implemented a deterministic HD wallet as an SDKMS plugin which uses the SDKMS native cryptography library.
You’ve probably heard the phrases "The world runs on software" and "Software is eating the world", which date back to 2010 and 2011 respectively. If it was true back then, it is even more true today. We cannot imagine a world without computers, mobile phones or the Internet. Software is also increasingly prevalent in industrial robots, cars, airplanes, televisions and a plethora of IoT devices around the home.
Container-based software development and deployment has become the next big thing in technology. Container technology, especially Docker, is redefining cloud computing and offers tremendous benefits to companies and developers, including consistency, reliability, efficiency, cost savings, and scalability for the entire DevOps processes.
True to its name, Confidential Computing remained, well – confidential – for a rather long time. Until today, with the public announcement of the Linux Foundation Confidential Computing Consortium.
Cloud applications have put trust in the accuracy and security of the code and the cloud infrastructure to ensure their classification and uprightness. But what if, the infrastructure itself is compromised or a hidden gateway in the OS/hypervisor could bargain the application's security or could end up controlling its state. So, what is the solution to it?
This year the RSA Conference is happening March 4th-8th in San Francisco. And, this year’s theme is simply 'Better'. Our young company, Fortanix, will have our first booth, #4518, and we look forward to talking to real Security pros about protecting keys and data regardless of where applications are deployed.
Since our announcement last year on developing our open source Rust SDK, hundreds of developers have shown interest in this platform. Today, we are excited to announce the launch of Fortanix Enclave Development Platform (EDP). Fortanix Enclave Development Platform (EDP) is the preferred way to write Intel SGX enclaves from scratch.
In this blog we will describe common application threats and how Fortanix Runtime Encryption® protects application assets from these threats on untrusted platforms including public cloud. We will use a 3-tiered application as an example with Nginx as the front-end load balancer tier, Python Flask as the application server tier and MariaDB as the data tier.
Fortanix is delighted to partner with Alibaba Cloud. We have seen multiple customers reach out to us about the best practices of securing their sensitive digital assets while operating overseas. Intel® SGX offers the incredible level of security by removing the cloud provider and infrastructure entirely from the trust boundary. Alibaba Cloud launched commercial Intel® SGX cloud servers as ECS bare metal instances in April 2018.
The Big Hack demonstrates that the cyber warfare has moved from the realm of the software to the realm of the hardware. Software-based security, such as anti-malware, firewall, user behavior analysis, network flow analysis, etc. are ineffective in the face of such sophisticated attacks.
Today, we are excited to announce that Fortanix Self-Defending Key Management Service (SDKMS) has achieved VMware Ready status for vSphere and vSAN. The joint VMware and Fortanix SDKMS solution offers scalable data protection and compliance for software-defined data center and cloud environments.
The Fortanix team had a great RSA 2018 Conference. Starting with winning second place on Innovation Sandbox Contests and over the next few days at the Intel booth and Equinix booth, the Fortanix team had great discussions with hundreds of security architects, executives, and partners.
In conversations with customers, we find a strong demand to be able to run sensitive application logic and custom cryptographic schemes inside an HSM-grade trust boundary. To address this demand, Fortanix developed a Runtime Encryption® Plugin capability for Fortanix Self-Defending Key Management Service™ (SDKMS) and Equinix SmartKey™, powered by Fortanix.
For historical reasons and technological barriers traditional HSM and key management did not, and still cannot, be delivered as a managed service. But what if they could be delivered as a secure, easy and simple to consume managed service?
While encryption remains an effective data protection control, it is increasingly difficult to use to protect databases given rapid data growth, clustering of databases and distribution of databases across geographies, across clouds.
At Fortanix we are building a new class of solutions called Runtime Encryption, leveraging Intel® SGX, to protect applications and data in use. We often receive inquiries about the impact of side channel attacks on Intel® SGX and Fortanix solutions.
When it comes to the adoption of hybrid or multi-cloud IT, we find in our customer conversations that it's not a question of whether to adopt but rather at what stage of maturity to adopt. To ensure that transition is secure, most customers are rethinking data protection, encryption, and key management controls.
One of the challenges to implementing data at rest encryption is the need for robust key management. Solutions dealing with sensitive or high-value data require the use of a hardware security module (HSM).