FIPS 140-2

AppViewX and Fortanix Partner to Deliver Enterprises Streamlined and Secure Machine Identity Management and Code Signing Solutions

Retrieved on: 
Thursday, March 28, 2024

AppViewX, the leader in automated machine identity management (MIM) and application security, and Fortanix, a leader in data-first security and pioneer of Confidential Computing, today announced a partnership to offer cloud-delivered secure digital identity management and code signing.

Key Points: 
  • AppViewX, the leader in automated machine identity management (MIM) and application security, and Fortanix, a leader in data-first security and pioneer of Confidential Computing, today announced a partnership to offer cloud-delivered secure digital identity management and code signing.
  • “The collaboration between AppViewX and Fortanix not only addresses the immediate security needs of enterprises but also ensures a seamless and pure SaaS deployment of machine identity management and secure code signing solutions,” said Ravishankar Chamarajnagar, Chief Product Officer at AppViewX.
  • AppViewX and Fortanix are offering an end-to-end SaaS solution that simplifies secure code signing and meets CA/Browser Forum requirements.
  • The AppViewX Digital Trust Platform includes AppViewX CERT+, AppViewX PKI+, and AppViewX KUBE+, for automating PKI and certificate lifecycle management across complex hybrid multi-cloud environments, and AppViewX SIGN+ for simplifying secure code signing.

Safeguarding a 70 Billion Connected IoT Device Landscape by 2026 Requires an Advanced Three-Pronged Device-to-Cloud Security Approach

Retrieved on: 
Thursday, January 18, 2024

An effective IoT device-to-cloud security strategy should target security in three vital areas: device, network, and cloud.

Key Points: 
  • An effective IoT device-to-cloud security strategy should target security in three vital areas: device, network, and cloud.
  • "Device security often means securing the chipset and the data stored inside the device from being breached.
  • Its Prisma Cloud solution provides cloud threat visibility, while its Networks Enterprise IoT security focuses on zero-trust frameworks to address IoT device vulnerabilities.
  • These findings are from ABI Research's Device to Cloud: Security for IoT Device Management application analysis report.

Safeguarding a 70 Billion Connected IoT Device Landscape by 2026 Requires an Advanced Three-Pronged Device-to-Cloud Security Approach

Retrieved on: 
Thursday, January 18, 2024

An effective IoT device-to-cloud security strategy should target security in three vital areas: device, network, and cloud.

Key Points: 
  • An effective IoT device-to-cloud security strategy should target security in three vital areas: device, network, and cloud.
  • "Device security often means securing the chipset and the data stored inside the device from being breached.
  • Its Prisma Cloud solution provides cloud threat visibility, while its Networks Enterprise IoT security focuses on zero-trust frameworks to address IoT device vulnerabilities.
  • These findings are from ABI Research's Device to Cloud: Security for IoT Device Management application analysis report.

Qrypt Partners with Los Alamos National Labs to Advance Quantum Random Number Generation Technology

Retrieved on: 
Thursday, December 7, 2023

Qrypt , the pioneering quantum-secure encryption company, has completed its Cooperative Research and Development Agreement (CRADA) with Los Alamos National Labs (LANL) to develop Qrypt’s state-of-the-art Quantum Random Number Generation (QRNG).

Key Points: 
  • Qrypt , the pioneering quantum-secure encryption company, has completed its Cooperative Research and Development Agreement (CRADA) with Los Alamos National Labs (LANL) to develop Qrypt’s state-of-the-art Quantum Random Number Generation (QRNG).
  • This technology enables Qrypt’s cloud-based Quantum Entropy and Quantum Key Generation services with true quantum randomness to deliver reliable cryptographic security at scale, protecting data from the threat of quantum computing.
  • Qrypt addresses this data vulnerability by harnessing the inherent unpredictability of quantum mechanics to produce truly unpredictable random numbers.
  • “Los Alamos National Laboratory applies cutting edge science and technology to address critical national security challenges.

Japan Communications Contracted with the State of Utah, USA to Facilitate Implementation of Statewide CBRS (local 4/5G) for Educational and Telehealth Network

Retrieved on: 
Friday, December 15, 2023

Local 4/5G networks are a subset of this broad, global implementation strategy addressing the needs of high-density wireless communications technology utilizing "micro cells".

Key Points: 
  • Local 4/5G networks are a subset of this broad, global implementation strategy addressing the needs of high-density wireless communications technology utilizing "micro cells".
  • The UETN stands as a nationally acclaimed broadband provider, unifying the extensive services of two key organizations in the State of Utah: the Utah Education Network (UEN) and the Utah Telehealth Network (UTN).
  • The FCC has already announced an expansion of this capacity under CBRS as necessary to keep up with the industry's rapid expansion.
  • "We are pleased to be able to announce that the third and the final piece of our long-term strategy; Implementation of local 4/5G network solution, is finally achieved.

KoolSpan Earns FIPS 140-2 Certification From The National Institute of Standards and Technology (NIST) for Deployments in U.S. Federal Government and Regulated Industries

Retrieved on: 
Wednesday, November 15, 2023

BETHESDA, Md., Nov. 15, 2023 /PRNewswire-PRWeb/ -- KoolSpan, the leading global provider of enterprise communications security solutions, today announced the achievement of Federal Information Processing Standard (FIPS) 140-2 certification for its secure communications cryptographic module TrustCall™, which is software-based and compatible with all commercial smartphones, desktops, and laptops. This certification reinforces KoolSpan's commitment to delivering the highest level of security for enterprise communications.

Key Points: 
  • KoolSpan is excited to attain FIPS 140-2 certification for the core cryptographic module used in our software solutions.
  • "KoolSpan is excited to attain FIPS 140-2 certification for the core cryptographic module used in our software solutions," said KoolSpan Chief Operating Officer Alessandro Ossoli.
  • This also positions us for the next certification phase, FIPS 140-3, which is in our roadmap."
  • KoolSpan achieved accelerated certification by taking advantage of one of SafeLogic's FIPS 140 validated CryptoComply modules along with the company's RapidCert program.

Cubist Launches Wallet-as-a-Service Platform for Millisecond Latency Remote Signing Inside Secure Hardware

Retrieved on: 
Wednesday, November 1, 2023

Applications request signatures via simple API calls, and CubeSigner signs from within secure hardware—where keys are safe from prying eyes.

Key Points: 
  • Applications request signatures via simple API calls, and CubeSigner signs from within secure hardware—where keys are safe from prying eyes.
  • Some teams, for example, use hot wallets for trading or gaming, since the latency of popular MPC-based solutions is orders of magnitude too slow.
  • Other teams opt for convenient in-browser signing at the risk of revealing their keys to remote attackers.
  • Users can’t accidentally leak their keys and attackers can’t steal keys because key material stays locked in secure hardware, during both generation and signing.

CHANGING Revolutionizes Digital Authentication with Cutting-Edge Solutions and Zero Trust Architecture Certification

Retrieved on: 
Monday, October 2, 2023

CHANGING 's holistic approach to digital authentication extends beyond identity verification, encompassing dedicated device authentication solutions designed to fortify IoT security.

Key Points: 
  • CHANGING 's holistic approach to digital authentication extends beyond identity verification, encompassing dedicated device authentication solutions designed to fortify IoT security.
  • The key features of CHANGING 's digital authentication solutions include:
    IoT Device Lifecycle Management: CHANGING provides end-to-end security for IoT devices throughout their lifecycle, ensuring the integrity of data and communications.
  • With a strong focus on Zero Trust Architecture and dedicated solutions for IoT security, CHANGING is poised to continue its trajectory as an industry leader.
  • To learn more about CHANGING and its innovative digital authentication solutions, please visit www.changing.com .

Infisign Launches Groundbreaking Identity and Access Management Solution

Retrieved on: 
Thursday, July 6, 2023

BRANCHBURG, N.J. and CHENNAI, India , July 6, 2023 /PRNewswire/ -- Infisign today announced the launch of its Identity and Access Management(IAM) platform, a unique solution to offer passwordless authentication using the ground-breaking Zero Trust approach.

Key Points: 
  • BRANCHBURG, N.J. and CHENNAI, India , July 6, 2023 /PRNewswire/ -- Infisign today announced the launch of its Identity and Access Management(IAM) platform, a unique solution to offer passwordless authentication using the ground-breaking Zero Trust approach.
  • With Infisign, users can securely access their accounts and resources without the need for cumbersome passwords, significantly reducing the risk of data breaches and unauthorized access.
  • In addition to its Zero Trust IAM capabilities, Infisign offers advanced features for Privileged Access Security, providing organizations with comprehensive solutions to protect their most sensitive assets.
  • With the combined market for Zero Trust and IAM expected to reach $100B+ by 2028, the founders envision Infisign to disrupt this market with its unique solution.

Fortanix Launches Industry-First Confidential Data Search for Regulated Encrypted Data

Retrieved on: 
Tuesday, June 27, 2023

SANTA CLARA, Calif., June 27, 2023 — Fortanix® Inc. , the innovative multi-cloud data security company and the pioneer of Confidential Computing, today announced the release of Fortanix Confidential Data Search , an industry-first, high-performance solution that supports highly scalable searches in encrypted databases with sensitive data, without compromising data security or privacy regulations.

Key Points: 
  • SANTA CLARA, Calif., June 27, 2023 — Fortanix® Inc. , the innovative multi-cloud data security company and the pioneer of Confidential Computing, today announced the release of Fortanix Confidential Data Search , an industry-first, high-performance solution that supports highly scalable searches in encrypted databases with sensitive data, without compromising data security or privacy regulations.
  • Available now as a private preview, the fully featured general availability of Fortanix Confidential Data Search is targeted to roll out in the second half of 2023.
  • Fortanix's new Confidential Data Search solution addresses data security requirements while maintaining full support for streamlined business operations.
  • Fortanix Confidential Data Search provides confidentiality for the query issuer and the data owner, and any arbitrary SQL query can be performed without a loss of fidelity or prohibitive system latency.