SYS-CON MEDIA Authors: Liz McMillan, Yeshim Deniz, Elizabeth White, William Schmarzo, Dana Gardner

News Feed Item

Cryptsoft and Fornetix Announce greater security infrastructure capability using Open Standards

Industry leading encryption key management vendors leverage newly released KMIP v2.0 to better support growing market demand

SAN FRANCISCO, April 16, 2018 /PRNewswire/ -- Leading OEM key management technology supplier, Cryptsoft, and Fornetix, a provider of secure, IoT scale encryption management, today announced their results in the latest round of interoperability testing for the benchmark key management standard, Key Management Interoperability Protocol (KMIP). With 9 companies testing 17 distinct products to prove the core components of the v2.0 specification, KMIP continues to develop a standard that delivers interoperability between vendors.

With new functionality in scope for KMIP v2.0, both companies are delivering capability to meet the needs of the rapidly evolving security object management landscape across a range of industry verticals. KMIP has a rapidly increasing adoption rate, and is being specified as a mandatory requirement for many procurement activities. It is currently being utilized in systems supporting critical infrastructure, finance, automotive, communications, ecommerce, manufacturing, and defense.

As both a valued customer and partner over the past 4 years, Fornetix has developed its Key Orchestration solution to be one of the most capable enterprise key managers on the market today. The ongoing partnership enables organizations to combine and consolidate visibility and control of their enterprise security assets with a range of KMIP toolkits from Cryptsoft, as well as a range of KMIP-enabled storage, security and cloud implementations available today.

With new challenges emerging globally, both companies are actively engaged to support KMIP deployments underpinning blockchain, machine identity, and supply chain security on a scale not witnessed at any time in the past.

"Working in conjunction with our source code and enterprise licensees enables us to address the more sophisticated requirements of our combined customers' sooner," said Tony Cox, VP Partners, Alliances & Standards at Cryptsoft. "Cryptsoft's customers range from ultra-conservative to very forward thinking and agile in the adoption of newer security technologies. Working with innovative customers like Fornetix means the new range of functionality in KMIP v2.0 can be tested, finalized and delivered on a rapid timescale, to better secure security assets globally."

"Cryptsoft's KMIP SDK's consistently deliver us a capability multiplier, enabling us to build on a proven technology platform. This means we can deliver the power of enterprise security orchestration, our customers are looking for," said Chuck White, CTO Fornetix. "This collaboration provides our customers technology that is secure, interoperable, extensible and scalable while being cost effective. Simply put - we deliver the promise of encryption without the fear of losing keys."

Both companies are demonstrating their KMIP enabled products in a live interoperability demonstration at the OASIS KMIP Interop booth (#1601) at this week's RSA Conference in San Francisco.

About Cryptsoft
Cryptsoft is a privately held Australian company that operates worldwide in the enterprise key management security market. Cryptsoft's Key Management Interoperability Protocol (KMIP) software development kits (SDKs) are the market's preferred OEM solutions. Cryptsoft's solutions have been selected by prominent global companies for interoperable enterprise key management and encryption technology in their storage, security and cloud products. Cryptsoft is an OASIS Foundational Sponsor. www.cryptsoft.com

About Fornetix
Fornetix® Key Orchestration™ is a groundbreaking cybersecurity solution designed to unleash encryption's full potential by simplifying key management. Fornetix empowers organizations to build a data security strategy with encryption as the strong foundation. www.fornetix.com

PRLog ID: www.prlog.org/12703228

 

Cision View original content:http://www.prnewswire.com/news-releases/cryptsoft-and-fornetix-announce-greater-security-infrastructure-capability-using-open-standards-300630786.html

SOURCE Cryptsoft

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...
Serveless Architectures brings the ability to independently scale, deploy and heal based on workloads and move away from monolithic designs. From the front-end, middle-ware and back-end layers, serverless workloads potentially have a larger security risk surface due to the many moving pieces. This talk will focus on key areas to consider for securing end to end, from dev to prod. We will discuss patterns for end to end TLS, session management, scaling to absorb attacks and mitigation techniques.
Crosscode Panoptics Automated Enterprise Architecture Software. Application Discovery and Dependency Mapping. Automatically generate a powerful enterprise-wide map of your organization's IT assets down to the code level. Enterprise Impact Assessment. Automatically analyze the impact, to every asset in the enterprise down to the code level. Automated IT Governance Software. Create rules and alerts based on code level insights, including security issues, to automate governance. Enterpr...
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
The benefits of automated cloud deployments for speed, reliability and security are undeniable. The cornerstone of this approach, immutable deployment, promotes the idea of continuously rolling safe, stable images instead of trying to keep up with managing a fixed pool of virtual or physical machines. In this talk, we'll explore the immutable infrastructure pattern and how to use continuous deployment and continuous integration (CI/CD) process to build and manage server images for any platfo...
DevOpsSUMMIT at CloudEXPO, to be held June 25-26, 2019 at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
It cannot be overseen or regulated by any one administrator, like a government or bank. Currently, there is no government regulation on them which also means there is no government safeguards over them. Although many are looking at Bitcoin to put money into, it would be wise to proceed with caution. Regular central banks are watching it and deciding whether or not to make them illegal (Criminalize them) and therefore make them worthless and eliminate them as competition. ICOs (Initial Coin Offer...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
The current environment of Continuous Disruption requires companies to transform how they work and how they engineer their products. Transformations are notoriously hard to execute, yet many companies have succeeded. What can we learn from them? Can we produce a blueprint for a transformation? This presentation will cover several distinct approaches that companies take to achieve transformation. Each approach utilizes different levers and comes with its own advantages, tradeoffs, costs, risks, a...