Have any questions?


The Futurex Blog. News, Announcements and Much More.

Integrating VirtuCrypt into a Financial Environment

by Futurex on January 26th, 2015

For banks, credit unions, payment processors, and other businesses within the financial services industry, data security is a key component of success. One data breach can drop you into the red, while years without breaches earn you a reputation of security and trust.

For more than 30 years, businesses of all sizes and industries have trusted Futurex’s suite of data security solutions to keep their information secure, and now they can take advantage of Futurex’s hardened technology through the convenience of the cloud. Futurex’s VirtuCrypt Hardened Enterprise Security Cloud is a cloud service centered around key management and data encryption: two areas that financial institutions must address in order to avoid data breaches.

To facilitate key management, every VirtuCrypt Enterprise service offering comes with the Securus – a FIPS 140-2 Level 3 validated remote access tablet. The Securus enables financial institutions to securely perform key management tasks such as loading master keys from virtually anywhere in the world, saving financial institutions both time and money by eliminating the need to travel for key loading ceremonies.

The wide-ranging functionality of VirtuCrypt ensures that, whether your financial institution is looking for EMV card issuance, P2PE, tokenization, remote key loading, and more, VirtuCrypt can handle all of your data encryption needs. Transaction processing is available through VirtuCrypt via Futurex’s hardware security modules, which are the fastest payment HSMs in the world.

Want to know more about VirtuCrypt? Visit our website or contact us today.


Bookmark and Share

Data Security & Fraud Prevention Roundup – January 23rd, 2015

by Futurex on January 23rd, 2015

Our Data Security & Fraud Prevention Roundup contain links to the best data security and fraud prevention-related articles, blog posts, news releases, interviews, and anything else that we found interesting from around the web over the course of the last few weeks and our thoughts on them.

#1: Is Cloud an Opportunity to Do Security Right? by Jeff Peters, Hacksurfer (January 15, 2015)

Businesses are facing the daunting task of protecting sensitive company data from being stolen, but these organizations don’t have to fight for data security alone. This article discusses how some security experts believe that the cloud can help combat these security breaches.

#2: Data breaches can be prevented with one simple solution by Tony Bradley, PC World (January 19, 2015)

Data security is a multifaceted and complex issue that encompasses measures such as encryption and firewalls, employee policies, and user permissions. This article argues in favor of an often overlooked but very effective strategy: dual factor authentication.

#3: “123456” Maintains the Top Spot on SplashData’s Annual “Worst Passwords” List by SplashData (January 20, 2015)

It’s that time again. Password management firm SplashData has compiled their list of the top most common passwords chosen by internet users, and the results are both amusing and alarming. Check out the list, then see our recommendations for password “do’s and don’ts”.

#4: Over 90 percent of data breaches in first half of 2014 were preventable by Charlie Osborne, ZDNet (January 21, 2015)

What causes data breaches? Your first thought is probably hacking but, according to the Online Trust Alliance’s 2015 Data Protection Best Practices and Risk Assessment Guides, that’s not always the case. It is often the negligence or intentional sabotage of employees that puts your company’s data at risk. This article summarizes the guides’ findings and recommendations.

#5: Payment security top priority for retailers in 2015 by Sarah Jones, Luxury Daily (January 22, 2015)

It’s not a shock that, after all the data breaches that occurred in 2014, the Retail industry has set a precedence on payment security this year. In this article, Sarah Jones has compiled some helpful suggestions and steps to follow in order to help Retailers boost their data security.

If you find something interesting that you’d like to see considered for our next Data Security & Fraud Prevention Roundup, don’t hesitate to let us know. We’re always on the lookout for new and interesting perspectives on data security news, issues, thoughts, and best practices. Send your best links to info@futurex.com, or share them with us on Twitter (@Futurex).

Bookmark and Share

Deconstructing PKCS #11

by Nick Van Duyn on January 22nd, 2015

To some, PKCS #11 may be a common term used on a daily basis, but to others, it’s unfamiliar jargon. Whether you’re a tech guru or not, PKCS #11 is a beneficial technology that you can implement into your organization’s IT infrastructure.


What Is It?

PKCS #11 (Public-Key Cryptographic Standard #11) is a standard originally developed by RSA Laboratories and currently maintained by OASIS. PKCS #11 specifies a standardized API in the C programming language that offers substantial benefits to organizations, including significantly decreased integration work.


What Is Its Purpose?

PKCS #11 is used to facilitate easy automation of cryptographic operations such as encryption, decryption, signing, and verifying objects such as certificates and keys.


Hardware vs. Software: Which Should I Use?

Using hardware security modules (HSM) to perform cryptographic tasks on sensitive information is always more secure than software alone, due to the robust physical measures that prevent tampering and intrusion. The HSM provides a software library that bridges the PKCS #11 API defined in the standard with their own proprietary API to perform the cryptographic operations in hardware as opposed to software. While PKCS #11 can be used through software on the host computer, it is much easier for the host application’s hardware to be compromised, leading to the exposure of the encryption keys.


PKCS #11 in Futurex HSMs

Futurex products support PKCS #11 in order to communicate with a wide range of applications. With just a few exceptions incorporated to enhance overall security, Futurex supports all functions supplied in PKCS #11, with the addition of some custom functions developed by Futurex in order to increase utility. Enabling PKCS #11 on existing Futurex technology is a simple process. Contact Futurex to learn more, or download our PKCS #11 whitepaper today.

Bookmark and Share

Observe Data Privacy Day and Raise Your Information Security Awareness

by Katrina Moser on January 12th, 2015

On January 28, the National Cyber Security Alliance will lead the recognition of Data Privacy Day, originally started in 2008 to celebrate an international effort to increase awareness of the importance of “respecting privacy, safeguarding data, and enabling trust” online.

This year, taking time to think about data privacy is especially relevant, as new technologies are transforming the way people conduct their business online. The risks of data breaches became even more apparent in 2014, and both customers and businesses are doing what they can to try to become more aware of ways to keep data secure.

The goal of Data Privacy Day is to raise awareness and educate everyone who is involved with sharing information online or concerned about how to protect that information – businesses, consumers, families, and educators. At Futurex, we are again showing our support as an official Data Privacy Day Champion and are dedicated to raising awareness of this important topic throughout the year.

We have provided many resources for individuals and corporations looking to take control of their information: on our blog, in our line of data security solutions, and throughout our social media presence. We also encourage you to check out the material on the official National Cyber Security Alliance website, which is filled with tips and helpful information on data protection relevant for individuals, teachers, and businesses. Start discovering ways to get involved today!

Bookmark and Share