Fortanix

New infosec products of the week: November 19, 2021
Here’s a look at the most interesting product releases from the past week, featuring releases from 1Password, Fortanix, Jetico, Palo Alto Networks, Saviynt, StorONE, Viavi …

Fortanix Confidential AI uses sensitive data without compromising privacy or compliance
Fortanix introduced Confidential AI, a new software and infrastructure subscription service that leverages Fortanix’s confidential computing to improve the quality and …

Fortanix partners with Google to unveil Client-side encryption for user data in Google Workspace apps
Fortanix announced that its Data Security Manager Platform (SaaS/ On-Prem) has been integrated with Google Workspace Client-side encryption, a new privacy and confidentiality …

Today’s cars are mobile data centers, and that data needs to be protected
In a recent report, AlixPartners estimate that the global microchip shortage will cost car manufacturers $110 billion dollars in 2021, through the lost production of around …

How do I select a hardware security module for my business?
Protecting your data has never been more important, and the best way to do it is by using encryption keys. These keys should then be stored inside a hardware security module …
Fortanix DSM SaaS provides FIPS certified HSM services to cloud platforms and applications
Fortanix announced the availability of its comprehensive Data Security Manager (DSM) solution as a cloud-delivered service. DSM SaaS provides the complete proven capabilities …
Fortanix powers new applications of confidential computing
Fortanix announced that its technology is powering new applications of confidential computing. Confidential computing protects applications and the sensitive data they process …

Using confidential computing to protect Function-as-a-Service data
Organizations are embracing the power of Function-as-a-Service (FaaS). FaaS can be viewed as a very positive and beneficial result coming from years of data successfully …
Fortanix Self-Defending Key Management Service now running on Microsoft Azure
Fortanix, a Runtime Encryption company, announced the availability of the Fortanix Self-Defending Key Management Service running on Microsoft Azure to help customers protect …

Keeping your app’s secrets secret
The software development process has vastly changed in this past decade. Thanks to the relentless efforts of the cloud and virtualization technology providers, we now have …
Fortanix HSM Gateway: Integrating cloud apps and databases with legacy on-premises HSMs
Fortanix, the Runtime Encryption company, announced the availability of the Fortanix HSM Gateway, a new extension to the Fortanix Self-Defending Key Management Service. This …

Businesses can avoid fines if customer data is encrypted or redacted
Encryption provides the best defense against any fines that might be levied for violations or data breaches under CCPA, according to ESG and Fortanix. What can you do? The …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility