Fortanix Expands Relationship with AWS, Fortanix Data Security Manager Works with the AWS KMS External Key Store

Simplifies Workflows and Audits with Centralized Key Management including via SaaS to Give Customers Full Control of Data Security and Regulatory Compliance  

Fortanix® Inc. has announced that Fortanix Data Security Manager (DSM) now works with the AWS KMS External Key Store (XKS), allowing organizations that deal with regulated data to run workloads on AWS by segregating data on AWS infrastructure from encryption keys. This gives AWS customers complete control of data security while helping keep pace with continually evolving compliance regulations.

One common challenge facing cloud infrastructure customers is proving they comply with privacy and security regulations such as the General Data Protection Regulation (GDPR) and the Schrems II ruling that mandate sensitive data remain within the region. By using Fortanix DSM as a centralized, external key store, customers maintain full custody of their keys with complete control over the data encryption policies on AWS or other cloud providers. This control includes defining where the keys reside, access, and policy control. In addition, Fortanix provides a unified platform with encryption services, cloud key management, tokenization, and more.

"We’re thrilled to work with AWS as they launch AWS KMS External Key Store to global enterprise customers that are subject to regulatory and compliance requirements," said Faiyaz Shahpurwala, chief product and strategy officer at Fortanix. "We believe this will give customers more choice and control over their key management lifecycle while leveraging the best-in-class benefits provided by AWS."

Fortanix DSM works with AWS KMS XKS to allow organizations to:

  • Use workloads with regulated data in AWS by segregating encryption keys from the data used and stored on AWS
  • Gain full control of encryption keys and enforce granular access control across hybrid cloud infrastructures
  • Simplify workflows and audits with Fortanix’s industry-leading centralized key management

Fortanix DSM is a simple-to-deploy, yet highly scalable data security platform that delivers a unified suite of services including encryption, hybrid cloud key management, tokenization and more. Fortanix DSM is offered as a Software as a Service (SaaS) solution as well as a virtual or physical appliance.

Featured

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3