With its announcement of SvKMS, StorMagic, known for leading-edge storage solutions, has officially entered the security marketplace. A key management system (KMS) provides a framework for managing keys throughout their lifecycle. SvKMS provides key management for any application that requires encryption in any location – edge, datacenter, or cloud – the proverbial magic bullet for KMS.
Organizations have been moving from decentralized and distributed key management to centralized key management systems for many years now in order to provide a secure and unified key lifecycle management system. As more organizations move workloads to the cloud, this quickly becomes a more cumbersome challenge. StorMagic’s SvKMS is a virtualized key management software solution that has been added to its portfolio of solutions.
The objective of centralized key management systems is to provide uniform key management across the organization using technology, policies, and processes that support the lifecycle of keys. The amount of data typically increases at a steady pace, therefore the volume of data that needs to be protected increases, which inherently boosts the number of encryption keys to be managed.
StorMagic’s stated goal is to eliminate the pain of encryption for customers by delivering an enterprise key management solution. SvKMS includes some important features, including:
StorMagic’s SvKMS offering supports the company’s branding message, “Making the Complex Simple.” StorMagic has done this by releasing an encryption key management system that is flexible, robust, simple, and adaptable to any environment.
Source: StorMagic, accessed May 2020.
The core benefits of a KMS are risk reduction, compliance efficiencies around process and controls, and cost reduction.
StorMagic’s entry into the security marketplace with the SvKMS solution is timely. As the public and private cloud infrastructures, IoT, and big data technologies grow significantly, the need for data security has also increased significantly due to the geo-distribution of data on various types of networks, devices, operating systems, etc.
Add in the latest data privacy laws and industry regulatory and compliance requirements such as GDPR (General Data Protection Regulation from the European Union) and PCI DSS (Payment Card Industry Data Security Standard) and you end up with increased levels of complexity and overall costs that many organizations are not equipped to address efficiently.
It is refreshing to see a vendor that is developing solutions for the future to simplify the complexity of managing encryption keys. CISOs/CIOs should take note that StorMagic ensures useful functionality is included in the SvKMS solution such as detailed auditing and logging features that are exportable to mainstream security information and event management (SIEM) solutions – an integral factor in this day and age. Additionally, it is a cost-effective solution for modern key management across most organizations, regardless of size.
Info-Tech’s strategic suggestion is that organizations should review their security strategy regularly and understand how a KMS refresh supports their security strategy, compliance requirements, and, most importantly, the business strategy. Vendor lock-in should always be considered in the selection criteria, hence the need to review the security strategy.
Organizations that are planning or currently undertaking a key management project should consider StorMagic’s SvKMS solution. Its combination of scalability, affordability, ease of implementation, and overall key management capabilities for applications that require encryption in any location – edge, datacenter, or cloud – makes StorMagic a “key” contender in the KMS marketspace.
The impact of COVID-19, as it became a global pandemic in Q1 of 2020, has affected user sentiment toward software during a growing period of fear, uncertainty, and doubt. To analyze the impact, SoftwareReviews compared Satisfaction (willingness to recommend to a peer), ability to deliver Business Value (fair cost to value), and Likeliness to Renew prior to March 10 and post March 10.
As the SIEM market continues to grow, organizations have more options than ever to decide which SIEM is right for them. In the first of this five-part series on SIEM pricing, we investigate the different pricing options and what these mean for organizations looking to invest in a SIEM.
Cisco is beginning to lose patience with its Zoom interoperability after another Zoom security risk: access for the Zoom Connector for Cisco hosted on zoom.us did not require authentication, allowing external users to join a Zoom meeting without password credentials.
Avaya’s newly released firmware addresses a vulnerability that has survived for 10 years in VoIP phone models configured with H.323 signaling.
A hacker has compromised 106 million Capital One customers after a data breach. But the real story might be less to do with cloud security itself and more to do with Capital One’s own security engine for cloud services.
Apple has delivered a silent update to Macs, rectifying a security flaw in its Zoom web-conferencing service.
Cyberattacks are terrible and require the same dedication to overcome them as would any other disaster response effort. Just like natural disasters, cyberattacks cause millions of dollars in damage, disrupt infrastructure, and impede citizens from their daily lives.
LogPoint, the next generation SIEM, UEBA, and big data analytics company, continues to expand into the global market outside of its European base.
Analysis by Frost & Sullivan recently claimed that the Security Information and Event Management (SIEM) market will grow to $3.23 billion by 2023 as a result of recent advances and greater versatility.