infoTECH Feature

October 16, 2013

Townsend Security Announces 'Hosted in the Cloud' Option for its Alliance Key Manager HSM

Townsend Security, a provider of data privacy solutions, integrated a ‘hosted in the cloud’ option into its Alliance Key Manager hardware security module (HSM).

More companies are now deploying public and private cloud storage options which mean they are putting their sensitive data like customer names, email addresses and other personally identifiable information (PII) into the cloud. They have to follow regulations to protect that information and data encryption over the cloud is a tedious process. But with Townsend Security’s Alliance Key Manager, they can easily achieve their security and efficiency goals in a cloud environment.

The Alliance Key Manager easily integrates with one’s databases/applications and enables them to address audit requirements for encryption and key management as found in PCI (News - Alert)-DSS, HIPAA, HITECH, and other privacy regulations. The new upgrade should help users to leverage the HSM to ensure encryption and key management compliance for data security in cloud environments.

Patrick Townsend, founder and chief executive officer at Townsend Security, stated, “The top concern of enterprises moving to the cloud is data protection, and encryption key management is the cornerstone of a data protection strategy. Cloud users and cloud providers now have an option for affordable encryption key management that is NIST FIPS 140-2 compliant and fully under their control.”

Townsend exclaimed that the hosted HSM delivers fully redundant, FIPS 140-2 compliant encryption key management for cloud applications running in Amazon Web Services, Microsoft (News - Alert) Azure, Rackspace, Hosting.com, and many other cloud environments. It removes the need for enterprises to install encryption key management in their data centers for moving applications to the cloud securely.

The symmetric encryption key management solution is also capable of creating, managing, and distributing 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system including Windows, Linux, Unix and IBM (News - Alert).




Edited by Ryan Sartor
FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter

infoTECH Whitepapers