In our blog article, “Why Deploy Identity and Key Management at the Edge,” we discussed how localizing security functions, such as hardware security modules (HSM), delivers greater control and improves security and performance. We know this is true from our own experiences with our customers that leverage hybrid and multiple cloud platforms.By providing key management capabilities in proximity to data but not directly with it, you can enable a more secure, faster user validation and access to critical data assets.
The 451 Research Pathfinder Advisory report, “Key Management as a Service: A Concept for Modern Encrypted Data Requirements,” cites that more and more enterprise workloads are being placed in the cloud, an estimated 60% by 2018. Given these findings, the time has come for digital businesses to leverage key management as a service for protecting and accessing their data in multiple cloud platforms.
Deploying key management as a service in the public cloud gives digital businesses many advantages, including:
However, there are some enterprise concerns around cloud-based security that will need to be addressed before more mission-critical workloads can use key management as a service and be safely deployed.
CONTACT Equinix info@equinix.com 1.800.322.9280 |
Company Website |
Company Blog |
YouTube |
RSS Feed |
Google + |