flash_area

Have any questions?

contactUs


The Futurex Blog. News, Announcements and Much More.


BAM! Futurex’s Base Architecture Model

by Alex Hopkins on April 21st, 2014

With new attack vectors targeting IT ecosystems emerging regularly, the role of enterprise data security is dramatically expanding. Systems administrators charged with the task of protecting an organization’s information must be able to rely on their core cryptographic infrastructure to protect their sensitive data.

Futurex’s Hardened Enterprise Security Platform is known for its protection of this confidential data for some of the largest Tier-1 organizations in the world. One of the components that allows Futurex solutions to stand apart from other security providers is our Base Architecture Model, a common code platform and user interface used across our technology.

Cryptographic infrastructures that do not utilize a common platform like Futurex’s Base Architecture Model often face many challenges in updating their technology, such as delayed updates and difficulty sharing useful features between different products. When systems administrators must source individual components from different vendors, numerous delays happen because they are forced to make changes for each individual component as well as make separate, time consuming upgrades to their entire system. Similarly, while performing quality assurance and testing, an application that may work on one component of the infrastructure may not function properly on another. The users again would have to manually adapt the application to work on both devices.

As new updates are made to Futurex’s product suite, however, the Base Architecture Model allows new features to be seamlessly and quickly replicated on all future releases of the entire product line.  This provides expedited access to new features for our customers, allowing them rapid access to the efforts of our research and development teams. This accelerated feature development guarantees peak performance in all devices that continuously work to combat new threats as well increase ease-of-use.

To learn more, visit our webpage detailing Futurex’s Base Architecture Model.


Bookmark and Share

Data Security & Fraud Prevention Roundup – April 18th, 2014

by Futurex on April 18th, 2014

Our Data Security & Fraud Prevention Roundup contain links to the best data security and fraud prevention-related articles, blog posts, news releases, interviews, and anything else that we found interesting from around the web over the course of the prior week and our thoughts on them.

#1: Financial services firms to increase cyber security budgets this year, PwC claims by Matthew Finnegan, CSO (April 17, 2014)

As financial institutions increase their reliance on upon digital processes, their firms are more susceptible to invasions within their cyber security. Many of these companies are becoming aware of the potential threats to their cyber security and have realized the importance of extending their budget for data security protection.

#2: Why You Need A Chief Information Security Officer by Brian Evans, Health Data Management (April 14, 2014)

Whether you’re a healthcare organization or a financial institution, your enterprise will benefit from the appointment of a skilled and knowledgeable CISO. Brian Evans discusses why Chief Information Security Officers are so vital to the success of healthcare organizations’ data security efforts.

#3: Tech Toolkit: Creating a Security Policy that Sticks by Elizabeth Millard, Finance & Commerce (April 16, 2014)

Your organization may have an employee security policy, but is it as comprehensive as it should be? Elizabeth Millard identifies some key principles to keep in mind when creating a security policy that will actually be effective in thwarting data breaches.

#4: More online Americans say they’ve experienced a personal data breach by Mary Madden, Pew Research Center (April 14, 2014)

It’s one thing to state the frequency of personal data breaches is increasing, and another to have the statistics to back up that claim. A recent survey from Pew Research Center reveals some interesting facts about how data breaches have affected Americans in the last year.

If you find something interesting that you’d like to see considered for next week’s Data Security & Fraud Prevention Roundup, don’t hesitate to let us know. We’re always on the lookout for new and interesting perspectives on data security news, issues, thoughts, and best practices. Send your best links to info@futurex.com, or share them with us on Twitter (@Futurex).


Bookmark and Share

Data Security & Fraud Prevention Roundup – April 11th, 2014

by Futurex on April 11th, 2014

Our Data Security & Fraud Prevention Roundup contain links to the best data security and fraud prevention-related articles, blog posts, news releases, interviews, and anything else that we found interesting from around the web over the course of the prior week and our thoughts on them.

#1: Hackers Lurking in Vents and Soda Machines by Nicole Perlroth, The New York Times (April 7, 2014)

Hackers are coming up with more inventive ways to gain access to organizations’ sensitive data through devices such as heating and cooling systems, printers, thermostats, and more. Hackers are able to accomplish this by penetrating the weak data security of third-party vendors who have been given access to a larger company’s sensitive data, inadvertently or not.

#2: Fake job applications most common entry point for fraudsters, says CIFAS by Grace Lewis, People Management (April 8, 2014)

As fraud cases are continuously increasing in the workplace, there is no better time to incorporate more security measures to protect your sensitive data. According to a new report, deceitful job applications have attributed to over 50% of all internal fraud cases just last year.

#3:  4 Tips for Choosing a Secure POS System by Sarita Harbour, Business News Daily (April 7, 2013)

If you’re a large retailer or financial institution looking to implement a Point of Sale (POS) system, there are a few things you should keep in mind. Sarita Harbour highlights four areas merchants should focus on, from PCI compliance to Point-to-Point Encryption (P2PE).

#4: 6 ways the Internet of Things will transform enterprise security by Jaikumar Vijayan, Computerworld (April 7, 2014)

Vijayan presents the top 6 ways the Internet of Things trend will affect large enterprises in the coming years, showing how vital it is that organizations start bolstering their data security infrastructures now.

 #5:  One of the Most Important Data Security Cases Was Just Decided: FTC v. Wyndham by Daniel Solove, LinkedIn (April 8, 2014)

What is FTC v. Wyndham, and why does it matter for your organization? If your enterprise handles any sort of sensitive personal data, this case makes enforcing good data security practices even more important. Daniel Solove discusses this data security case and what it means for the future of privacy policies.

If you find something interesting that you’d like to see considered for next week’s Data Security & Fraud Prevention Roundup, don’t hesitate to let us know.  We’re always on the lookout for new and interesting perspectives on data security news, issues, thoughts, and best practices.  Send your best links to info@futurex.com, or share them with us on Twitter (@Futurex).


Bookmark and Share

CryptoCube: Increasing the Efficiency of Your Cryptographic Infrastructure

by Rachel Barnett on April 8th, 2014

The trend toward converged cryptographic infrastructure is aiding organizations by reducing the cost of data center space and energy consumption, as well as simplifying the process of maintaining and managing multiple devices.

The traditional cryptographic infrastructure, up until now, had typically been fragmented and isolated, with very little centralized management. Sourcing different devices from various vendors made it difficult to standardize on one platform. Maintenance, upgrades, and data processing required specific employee training for each device, as well as separate monitoring and management. In large organizations, these devices would often be physically placed in several locations all over the globe, requiring a great deal of travel for the organization’s employees. This fragmentation was incredibly costly to organizations who must pay to hold separate devices at multiple data centers.

Fortunately, the technology of the past has been replaced. Futurex has developed a line of data security solutions that operate together to produce a result far beyond the sum of its parts. These devices cover an organization’s entire cryptographic infrastructure, eliminating the hassle and cost of sourcing equipment from multiple vendors. Because Futurex’s Hardened Enterprise Security Platform is built using a base architecture model, any enhancements, upgrades, and features made to one Futurex device can be implemented across all the other components of the platform.

Futurex’s push toward continuous innovation allowed us to take the functionality of the Hardened Enterprise Security Platform one step further, promoting even more ease of use and convenience for organizations. That step resulted in CryptoCube, an all-in-one consolidation of the Hardened Enterprise Security Platform. CryptoCube allows organizations to customize their own cryptographic infrastructure, compiling a unique collection of devices together while reducing their data center footprint.

CryptoCube decreases the cost of data center storage and energy consumption by placing all the devices in one compact, energy efficient unit. Having all the devices located together aids in device maintenance, with secure access and key management functionality available anywhere in the world through Futurex’s Securus FIPS 140-2 Level 3 validated tablet. Disaster recovery and backup of all your organization’s data can be easily added through the VirtuCrypt Hardened Enterprise Security Cloud service.

By creating devices that fulfill every aspect of cryptographic management and combining it with the functionality of CryptoCube and the VirtuCrypt cloud, organizations can rest easy knowing that Futurex has them completely covered, from key management to transaction processing to disaster recovery, and everything in between.


Bookmark and Share