PRTODAY / NewswireToday Free press release distribution service network

Written by / Agency / Source: SafeNet, Inc.

Check Ads Availability|e-mail Article


Are you the owner of this article?, Turn it PREMIUM with your LOGO instead - and make it 3rd party Ads-Free! within the next hour!

Latest Breaches Expose PKI’s Greatest Weakness – Encryption Keys - SafeNet’s Experts offer guidelines to re-establishing trust in PKI - SafeNet-Inc.com
Latest Breaches Expose PKI’s Greatest Weakness – Encryption Keys

 

NewswireToday - /newswire/ - Baltimore, MD, United States, 2011/09/22 - SafeNet’s Experts offer guidelines to re-establishing trust in PKI - SafeNet-Inc.com. Euronext NL0000400653 GTO

   
 
Your Banner Ad Here instead - Showing along with ALL Articles covering IT Security/Anti-Spam Announcements

Replace these Affiliate Programs at ANYTIME! Your banner here within the next hour. Learn How!


 

As a direct result of the recent security breaches impacting organizations that rely on Public Key Infrastructure (PKI) to encrypt and authenticate online communications and transactions, SafeNet, Inc., a worldwide leader in data protection, today issued several security guidelines to better secure PKI-based transactions.

For all the infrastructure advantages and business benefits of PKI, recent breaches clearly indicate that the way in which PKI is implemented may not be as inherently secure as most organizations have mistakenly assumed. What hasn’t been clearly understood is that the private key system used by PKI to encrypt and decrypt messages creates a single and significant point of vulnerability. A recent flurry of breaches involving certificate authorities have exposed this weakness, and have shaken the very foundation of trust that organizations have in PKI.

In order to help enterprises build greater integrity and reliability into their PKI deployments, eliminate unwanted exposure and close security gaps, SafeNet’s cryptographic experts advise the following actions:

1. Know your options for securing keys, weigh the risks, and choose wisely. All recent breaches have had a common theme –private keys and certificates were protected in software, and were left vulnerable. Software-based security has many benefits – it’s portable and offers great flexibility. Software can be copied easily and live in multiple locations at the same time, making the very benefits of software the areas of greatest security risk. A hardware-based security module (HSM) creates the trust anchor that locks the private keys and only allows access to vital information from an authorized source. Similarly, hardware based tokens and cards lock the certificates and avoid software based certificate risks.

2. Don’t assume that because you are working with a certificate authority your infrastructure is secure. If you rely on the certificate authority to authenticate, authorize, and secure application services, understand that the certificate itself is the vital piece within PKI. If the certificate private key is compromised, the entire PKI environment is compromised. Utilize layers of secure cryptography and select hardware-based options when securing your critical processing PKI end points.

3. Plan for the next generation of critical applications. Traditional PKI end points have historically included certificate authorities, registration authorities, SSL servers, and applications servers. These have now expanded to include mission-critical business processing applications, such as the smart grid, financial transactions, digital invoices, code signing, and secure device manufacturing. The nature of advanced PKI applications demands greater diligence, given the risk profile of the applications it enables. It is critical to establish a trust anchor for the protection and issuance of keys and certificates within these vital applications, ensuring that keys cannot be stolen, and the operations/transactions performed by those keys are auditable.

“PKI is many beneficial things, but standalone security isn’t one of them,” said Mark Yakabuski, vice president, product management for SafeNet. “It is important to realize the certificate identity itself is the vital piece within PKI – if the certificate identity is compromised, the PKI environment is compromised. The good news is that critical certificate identities can be secured with the proper hardware-based security mechanisms.”

Yakabuski is available for additional commentary. He can also provide examples of HSMs could have mitigated the damage done by recent security events, including APT attacks on certificate authorities, SSL certificate attacks, device code signing, and even the Stuxnet Worm.

About Hardware Security Modules
HSMs are defined as an anchor of trust, providing protection for applications, transactions, authorizations and information assets by safeguarding the cryptographic keys that are at the heart of any digital identity environment. An HSM can ensure the certificate private keys it protects are maintained in physical hardware, throughout the lifecycle of the private key.

With hardware-based protection, an HSM adds multiple layers of security and protects keys against the threats that software-based servers are susceptible to. For example, an HSM:

1. Encrypts the keys themselves;
2. Ensures that the keys remain within the secure hardware device throughout the key management lifecycle;
3. Ensures that only authorized applications and users can access and use the HSM-protected critical private keys; and
4. Ensures the logging and auditing of the certificate private keys.

HSMs only allow for the copying of keys from hardware to hardware. Keys exist solely in the restricted HSMs, and are under the control of defined custodians, allowing for tracking and auditing assurance of the certificate private keys they create.

About SafeNet, Inc.
Founded in 1983, SafeNet, Inc. (safenet-inc.com) is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organizations around the globe. SafeNet’s data-centric approach focuses on the protection of high value information throughout its lifecycle, from the data center to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments.

 
 
Your Banner Ad Here instead - Showing along with ALL Articles covering IT Security/Anti-Spam Announcements

Replace these Affiliate Programs at ANYTIME! Your banner here within the next hour. Learn How!


 

Written by / Agency / Source: SafeNet, Inc.

 
 

Availability: All Regions (Including Int'l)

 

Traffic Booster: [/] Quick Newswire Today Visibility Checker

 

Distribution / Indexing: [+] / [Company listed above is a registered member of our network. Content made possible by PRZOOM / PRTODAY indexing services]

 
 
# # #
 
IT Security Anti-Spam Computer Security - Purchase keywords tags antivirus software firewall spyware removal virus scan computer security IT Security Anti-Spam malware / Banner Ads!.

 
  Your Banner Ad showing on ALL
IT Security/Anti-Spam articles,
CATCH Visitors via Your Competitors Announcements!


Latest Breaches Expose PKI’s Greatest Weakness – Encryption Keys

Company website links NOT available to basic submissions
It is OK to republish and/or LINK any newswire for any legitimate media purpose as long as you name Newswire Today and LINK as the source.
 
  Is this your article?
Activate ALL web links and social stream by Upgrading to Press Release PREMIUM Plan Now!

SafeNet, Inc. |
Publisher Contact: SafeNet-Inc.com 
410-931-7500 investor[.]safenet-inc.com
 
Newswire Today - PRZOOM / PRTODAY disclaims any content contained in this article. If you need/wish to contact the company who published the current release, you will need to contact them - NOT us. Issuers of articles are solely responsible for the accuracy of their content. Our complete disclaimer appears here.
IMPORTANT INFORMATION: Issuance, publication or distribution of this press release in certain jurisdictions could be subject to restrictions. The recipient of this press release is responsible for using this press release and the information herein in accordance with the applicable rules and regulations in the particular jurisdiction. This press release does not constitute an offer or an offering to acquire or subscribe for any SafeNet, Inc. securities in any jurisdiction including any other companies listed or named in this release.

IT Security/Anti-Spam via RSSAdd NewswireToday - PRZOOM Headline News to FeedBurner
Find who RetweetFollow @NewswireTODAY



Are you the owner of this article?, Turn it PREMIUM with your LOGO instead - and make it 3rd party Ads-Free! within the next hour!


Read Latest Articles From SafeNet, Inc. / Company Profile


Read IT Security/Anti-Spam Most Recent Related Newswires:

Barracuda Simplifies Web Application Security for AWS Customers
Dell Unveils High-Performing, Quad Core Wyse 5060 Thin Client Designed for Knowledge Workers
Check Point vSEC Achieves AWS Security Competency
Gatwick Airport Relies on Splunk Cloud to Enhance Performance and Collaboration
For the Fourth Year, Flexera Software Named a Chicago Tribune 2016 Top 100 Workplace
Barracuda Announces Web Security Gateway Updates to Enhance Advanced Threat Protection, and Network Performance
Portnox Wins Top Honors from Frost & Sullivan for its Software-based Network Access Control Solution, the Portnox NAC
Infinera Powers Cloud Scale Networks with New DTN-X Platforms
ForeScout Named as One of the Fastest Growing Companies in North America on Deloitte’s 2016 Technology Fast 500
Comodo Launches New Full-lifecycle Digital Certificate Management Platform
Privatoria.net Launches An Effective Plugin to Simplify its Users’ Experience
Gigamon to Showcase its Innovative Visibility Fabric Solutions At RSA Conference 2016 Abu Dhabi
CenturyLink and Infinera Deliver 2.5 Tb/s of Super-channel DWDM Capacity at Super Computing 2016
Rising Complex Data-Driven Scenario Creates Growth Opportunities for North American Managed Security Service Providers Finds Frost & Sullivan
Rohde & Schwarz and CELARE Announce Availability of A New SCADA Decoder Protecting M2M Communication from Malicious Code

Boost Your Social Network
& Crowdfunding Campaigns


LIFETIME SOCIAL MEDIA WALL
NewswireToday Celebrates 10 Years in Business


PREMIUM Members


Visit  La Bella Bakery Artisan Bakery Arizona

Visit  Triggr & Bloom





 
  ©2016 Newswire Today — Limelon Advertising, Co.
Home | About | Advertise/Pricing | Contact | Investors | Privacy/TOS | Sitemap | FRANCAIS
newswire, PR free press releases distribution service magazines engine news alert newsroom press room breaking news public relations articles company news alerts newswiredistribution ezine bizentrepreneur biznewstoday digital business report market search pr firms agencies reports distri-bution today investor relation successful internet entrepreneurs newswire distribution prtoday.com freenewswiredistribution asianewstoday bizwiretoday USA pr UK today - NOT affiliated with PRNewswire as we declined their partnership offer in 2013
 
PRTODAY & NewswireTODAY are NOT affiliated with USA TODAY (usatoday.com)