Blog

How the Three Pillars of Crypto-Agility Prepare Your Enterprise for Whatever the Future Holds

How the Three Pillars of Crypto-Agility Prepare Your Enterprise for Whatever the Future Holds

by Futurex on August 19th, 2020

By Mike Cooper, Revocent

With the challenges only becoming more complex as certificate lifespans get shorter and shorter, there is only one path forward and that is to achieve crypto-agility. By crypto-agility we mean that your organization has taken complete control over cryptographic mechanisms – your public key infrastructure (PKI) and associated processes – and can quickly make whatever changes are needed without intense manual effort.

Read More
Payment Processing in the Cloud Has Just Gotten Real

Payment Processing in the Cloud Has Just Gotten Real

by Futurex on June 26th, 2020

“We’re proud to announce a range of groundbreaking enhancements to our VirtuCrypt financial cloud HSM – the industry’s first financial cloud HSM with native AWS integration – building on years of cloud HSM experience and delivering on our commitment to meeting the security, robustness, scalability, and compliance needs of financial services organizations worldwide.” said Ryan Smith, Vice President, Global Business Development at Futurex.

Read More
See How Futurex and Venafi Expand Machine Identity Protection

See How Futurex and Venafi Expand Machine Identity Protection

by Venafi on June 19th, 2020

The Machine Identity Protection Development Fund continues to extend new levels of protection to the world’s largest and most security conscious organizations. Today, I’d like to feature an integration from Futurex, a leading provider of hardened enterprise-class data security solutions. Last week, Futurex and Venafi announced the integration of Futurex’s hardware security modules (HSMs), KMES Series 3 and Vectera Plus, with Venafi’s Trust Protection Platform. The integration of Machine Identity Protection with secure key generation and storage and integrated private PKI with FIPS 140-2 Level 3-validated HSMs enables enterprises to guard against key compromise, reduce fraud risk and protect against insider attacks.

Read More
123