fu­turex reg­u­lates the se­cu­rity stan­dards Ganesh Karri, from Fu­turex talks about how his prod­ucts are com­pli­ant with dif­fer­ent reg­u­lated se­cu­rity stan­dards Fu­tureX se­cure their cus­tomers from at­tacks

PCQuest - - TECH TRENDS - – Ankit Parashar ankitp@cy­ber­me­dia.co.in

Fu­tureX of­fers sev­eral se­cu­rity ap­pli­ances; Please high­light the back-end tech­nol­ogy that se­cures your clients? Fu­turex’s Har­dened En­ter­prise Se­cu­rity Plat

form pro­tects the data of some of the largest or­ga­ni­za­tions in the world. One of the keys to the plat­form’s con­tin­ued suc­cess is the com­mon in­fras­truc­tural foun­da­tion across all Fu­turex de­vices and Vir­tuCrypt ser­vices known as the Base Ar­chi­tec­ture Model. Through the Base Ar­chi­tec­ture Model, Fu­turex is able to add new fea­tures across all prod­ucts; ex­pe­dite cod­ing, de­vel­op­ment, and qual­ity as­sur­ance test­ing; and de­velop new prod­ucts faster, pro­vid­ing our cus­tomers with quicker ac­cess to the tech­nol­ogy they need to suc­cess­fully pro­tect their most crit­i­cal data. What lev­els of se­cu­rity do you use? Please ex­plain about the lay­ers. In ad­di­tion to the ad­vanced en­cryp­tion al­go­rithms that Fu­turex de­vices uti­lize to en­crypt the data it­self, there are a va­ri­ety of other phys­i­cal and log­i­cal se­cu­rity mea­sures that en­sure sen­si­tive data is pro­tected. Fu­turex prod­ucts are fully com­pli­ant with a va­ri­ety of reg­u­lated se­cu­rity stan­dards in­clud­ing FIPS 140-2 Level 3 and PCI HSM. Re­in­forced phys­i­cal bar­ri­ers of the de­vice make it

ex­tremely dif­fi­cult for an unau­tho­rized user to break into the de­vice. In ad­di­tion, Fu­turex’s prod­ucts are equipped with mea­sures to make any unau­tho­rized ac­cess at­tempt ev­i­dent to sys­tem ad­min­is­tra­tors. Should a tam­per at­tempt oc­cur, the de­vice will au­to­mat­i­cally ze­roize it­self, delet­ing any sen­si­tive data con­tained within it.

As you serve to var­i­ous ver­ti­cals, what type of tech­ni­cal chal­lenges you face?

Fu­turex prod­ucts are used by or­ga­ni­za­tions across a wide range of in­dus­tries, each with unique re­quire­ments and types of data to pro­tect. One of the big­gest ini­tial chal­lenges for any or­ga­ni­za­tion op­er­at­ing across mul­ti­ple in­dus­try ver­ti­cals is keep­ing abreast of reg­u­la­tory com­pli­ance man­dates. De­pend­ing on the sec­tor, dif­fer­ent reg­u­la­tory bod­ies are in place to en­sure that en­cryp­tion de­vices ad­here to their stan­dards. This is why Fu­turex’s own team mem­bers sit on mul­ti­ple reg­u­la­tory bod­ies and stan­dards com­mit­tees to in­clude the Pay­ment Card In­dus­try Se­cu­rity Stan­dards Coun­cil, ANSI/ISO, OASIS, and oth­ers. This al­lows us to en­sure all prod­ucts and ser­vices are fully com­pli­ant to­day, while

“We have de­signed our tech­nol­ogy to op­er­ate in a turnkey man­ner in the most com­plex of en­vi­ron­ments, in­clud­ing zero-down­time mi­gra­tions from legacy prod­ucts to our Har­dened En­ter­prise Se­cu­rity Plat­form.”

also al­low­ing us to be suc­cess­fully pos­tured for in­dus­try com­pli­ance trends in the fu­ture and ad­vo­cate for the best in­ter­ests of our cus­tomers and part­ners.

How eas­ily can adapt to ex­ist­ing en­vi­ron­ments?

With the as­sis­tance of Fu­turex’s in­dus­try-cer­ti­fied So­lu­tions Ar­chi­tects, in­te­grat­ing our har­dened en­cryp­tion tech­nol­ogy into ex­ist­ing en­vi­ron­ments is sim­ple. We have de­signed our tech­nol­ogy to op­er­ate in a turnkey man­ner in the most com­plex of en­vi­ron­ments, in­clud­ing zero-down­time mi­gra­tions from legacy prod­ucts to our Har­dened En­ter­prise Se­cu­rity Plat­form. Not all data se­cu­rity en­vi­ron­ments are alike, and Fu­turex spe­cial­izes in cus­tom de­vel­op­ment projects, fre­quently de­sign­ing new fea­tures to meet the unique needs of cus­tomers all over the world. Fu­turex’s So­lu­tions Ar­chi­tects meet with the cus­tomer to eval­u­ate their in­fra­struc­ture in or­der to de­sign a new so­lu­tion that sat­is­fies their re­quire­ments. Once the so­lu­tion has been built and tested, the So­lu­tions Ar­chi­tect will go on-site with the cus­tomer to im­ple­ment the so­lu­tion, train the staff on its use, and pro­vide any ad­di­tional as­sis­tance needed along the way.

Con­sid­er­ing the lat­est at­tacks, how are you tack­ling with them?

As the vol­ume and so­phis­ti­ca­tion of at­tack vec­tors tar­get­ing en­ter­prise data grows, se­cu­rity tech­nol­ogy must keep pace. We are al­ready see­ing an in­creased in­ter­est in hard­ware- based, FIPS 140- 2 Level 3 val­i­dated cryp­to­graphic tech­nol­ogy from in­dus­tries that pre­vi­ously would have re­lied solely on soft­ware- based en­cryp­tion. In ad­di­tion to that, the ex­pand­ing role of har­dened cryp­to­graphic mod­ules housed in the cloud through Vir­tuCrypt is en­abling new ef­fi­cien­cies, in­creas­ing scal­a­bil­ity, and pro­mot­ing greater se­cu­rity than ever be­fore seen.

Ganesh Karri Chief So­lu­tions Ar­chi­tect and Re­gional Busi­ness Man­ager, South Asia, Fu­turex

Newspapers in English

Newspapers from India

© PressReader. All rights reserved.