Story image

Interxion releases Key Guardian to secure the keys to the castle

27 Jun 18

​Almost every week we witness crippling data breaches or data centre outages with the most common cause being someone on the inside.

This brings rise to the question, who should hold the ‘keys to the castle’? In an attempt to solve this conundrum, Interxion has today announced the general availability of Key Guardian, an encryption key management service that works to simplify data protection across private, hybrid and multi-cloud environments.

According to Interxion, the aforementioned breaches in today’s sophisticated cyberthreat landscape in addition to data protection regulations like GDPR has seen businesses increasingly turn to encryption to protect their critical information, making securing encryption keys a top priority.

Key Guardian uses Interxion’s cloud access and interconnected data centre network to securely store the encryption keys in a dedicated hardware security module (HSM) appliance that is outside of – but very close to – the cloud environment.

“Key Guardian is designed to give businesses the trust and flexibility they require and enable the rapid development of applications without compromising on security or compliance,” says Interxion enterprise business development director Patrick Lastennet.

“Because Key Guardian leverages proven certified HSM technology and integrates with all of the leading cloud service providers, private on-premise networks, and networks colocated with Interxion, businesses can rest assured knowing that they can enable the right level of data protection for any new digital use case.”

The open platform makes available HSMs from several top providers like Gemalto, Tales-e-Security, and Utimaco, effectively providing customers an on-demand dedicated infrastructure to separate encryption material from cloud service providers and adhere to the strictest key management compliance regimes.

The company piloted the service in early 2018 after witnessing a growing demand for enhanced encryption services from startups and enterprises that looking to transform the ways that data shared, and that value can be transferred through blockchain technology.

Blockchain HELIX is a company benefiting from blockchain by utilising its distributed ledger that increases trust and security, however, it still faced the challenge of securing the cryptographic keys that allow access to the ledger – and thus need to be kept out of the hands of non-authorised users.

“Our vision at Blockchain HELIX is to enable a trusted and secure digital economy and society, but in order to do that we need to be able to bring the security level of traditional banking systems to our digital identity platform,” says Blockchain HELIX CEO & founder Oliver Naegele.

“By using Interxion’s Key Guardian service, we know we have auditable, best-in-class security without the management and maintenance overheads that would normally be required. This enables our team to free up resources to focus on innovation that helps us deliver on our vision.”

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.