7 Reasons to Review Your Permissions in Your Key Management Infrastructure

by Futurex on March 22nd, 2016

Imagine making a dozen copies of the keys to your house, labeling those keys with an address, and handing them to the first 12 strangers you see. You wouldn’t, would you?

But say someone who had a copy of your house key decided they wanted to widely disseminate it. Could you stop them? Should they have had the key in the first place? Unwittingly, companies that do not regularly control and review permissions, by which we mean access to specific information and actions, run the risk of stirring access with malevolence—handing the keys to the kingdom to the wrong person.

Read More

Futurex and Trintas: Migrating Environments

by Futurex on February 17th, 2016

Given prior successes with Futurex technology, Trintas, a leading provider of Point-of-Sale (POS) solutions and longstanding Futurex customer, recently chose to upgrade their cryptographic infrastructure by migrating from the SKI3000 Secure Key Injector to the newer and more advanced model, the SKI9000.

Read More

Hosted Monitoring, Alerting, and Reporting with VirtuCrypt Plus

by Samantha Renteria on February 1st, 2016

Before you can address any IT issue you have to know it exists. For this reason, Futurex and VirtuCrypt have partnered to offer a hosted monitoring, alerting, and reporting service exclusively for Futurex-based cryptographic environments. This VirtuCrypt Plus service leverages the convenience of the cloud to monitor the activities conducted by customer-owned Futurex devices.

Read More

Futurex: Data Privacy Day Champions

by Futurex on January 28th, 2016

At Futurex, we continually promote safe, secure measures for data security through our product line of hardware security modules and cryptographic solutions. Today, on National Data Privacy Day, we get to celebrate our passion for data security with the entire world. Led by the National Cyber Security Alliance (NCSA), Data Privacy Day is held each year on January 28th to commemorate the 1981 Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data and the signing of Treaty 108 by the Council of Europe.

Read More