Townsend Security's virtualized encryption key
manager, Alliance Key Manager Hosted HSM, allows enterprises to properly manage their encryption keys
while meeting security requirements in less time and at a lower cost.
The CA EKM solution utilizes the same base technology for encryption key
has been beta-testing the CA Encryption Key
Manager for the past month.
Access to central key management functions should require a separate and optional strong authentication and management of encryption keys
should be logged in an evidence-quality audit system.
To meet compliance demands, such as HIPAA's privacy requirements, when the retention period expires on files that are protected through Assureon's WORM disk functions, a crypto-shredding process destroys the encryption key
, ensuring that acces to the data is completly disabled.
The technology, dubbed CIPHERUNICORN-A, is based on a proprietary NEC technique that creates a number of fake encryption keys
in addition to the true one, making transmissions especially difficult for potential intruders to crack.
SNW Europe --Spectra Logic, today announced a new enterprise-level encryption key
management offering for its T-Series tape libraries.
Giving the data owner the ability to define and control security policy that regulates encryption keys
provides the customer flexibility to benefit from the cloud-based key management offered by Azure".
Using the same FIPS 140-2 compliant technology that is in Townsend Security's hardware security module (HSM) and in use by over 3,000 customers, Alliance Key Manager for VMware brings a proven and mature encryption key
management solution to virtualized environments, with a lower total cost of ownership.
Key features of the new offering include a web-based user interface, Internet connection, licence management, encryption key
management and encryption policy management.
The addition of multiple software encryption key
slots provides greater security for users.
Eliminate data theft and liability risks: In the event a tape is lost or stolen, deleting the encryption key
makes the information unreadable inside or outside of the company.