Blog

7 Reasons to Review Your Permissions in Your Key Management Infrastructure

by Alex Eakins on March 22nd, 2016

Imagine making a dozen copies of the keys to your house, labeling those keys with an address, and handing them to the first 12 strangers you see. You wouldn’t, would you?

But say someone who had a copy of your house key decided they wanted to widely disseminate it. Could you stop them? Should they have had the key in the first place? Unwittingly, companies that do not regularly control and review permissions, by which we mean access to specific information and actions, run the risk of stirring access with malevolence—handing the keys to the kingdom to the wrong person.

Read More

Futurex and Trintas: Migrating Environments

by Futurex on February 17th, 2016

Given prior successes with Futurex technology, Trintas, a leading provider of Point-of-Sale (POS) solutions and longstanding Futurex customer, recently chose to upgrade their cryptographic infrastructure by migrating from the SKI3000 Secure Key Injector to the newer and more advanced model, the SKI9000.

Read More
123