About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Fortanix and Google Partner to Deliver Google Workspace Client-side Encryption (CSE)

In collaboration with Google, Fortanix unveils Client-side encryption for user data in Google Workspace apps such as Google Drive, Docs, Sheets, and Slides

Fortanix® Inc., the data-first multicloud security company, today announced that its Data Security Manager Platform (SaaS/ On-Prem) has been integrated with Google Workspace Client-side encryption (beta is available), a new privacy and confidentiality offering for Google Workspace users. The partnership enables Google Workspace users to retain sole authority and control over the cryptographic keys for encrypting data and documents on Google Workspace with enhanced key management capabilities offered by Fortanix.

In the wake of rising adoption of cloud technologies and digitization, and a renewed focus on data security, the need to adhere to the associated regulatory compliance is increasing across every vertical and sector worldwide. The pressure comes from not only regulatory bodies but also consumers. Moreover, with the surge in the number of workers opting for remote work and the majority of enterprises considering operating fully or partially remotely, businesses need solutions to facilitate seamless collaboration; and need to do so while meeting all regulatory and security requirements.

“In pre-pandemic times, businesses were more focused on managing front-end operations and logistics while remote working capabilities and digitization were considered good-to-have,” said Ambuj Kumar, CEO and co-founder of Fortanix. “Thus, less time, effort and money was spent on threat research, incident analysis and incident response.”

Fortanix Data Security Manager integrates with Google Workspace CSE and enables customers to manage their own keys by acting as an external key manager while moving their data to the cloud. Not only is the data undecipherable to Google, but the encryption keys are also never stored on Google servers. The user has complete control over the authorization of Google Workplace data and keys — backed by FIPS 140-2 Level 3 Hardware Security Modules.

Users also get to define and control policies for Google Workspace Key Encryption Key (KEK) from their Fortanix DSM (On Prem/ SaaS) account. Upon receiving the file, the corresponding data encryption key is decrypted using customer-provided keys only after authenticating the user with customer-controlled authentication.

“HSMs are traditionally looked upon as security boxes that have to sit nicely within the office premises. We’re upping the ante with Fortanix DSM SaaS,” said Kumar. “Through our partnership with Google Workspace Client-side encryption, Fortanix is offering FIPS 140-2 Level 3 hardware-based protection, with complete separation between users and regions as needed, and many more security features to protect your Google Workspace keys and data — on the go, on any device, anywhere in the world.”

Fortanix is hosting a webinar that dives deeper into Google Workspace security best practices and showcases the value and mobility that Fortanix DSM SaaS brings to the table. To reserve your seat, please visit the following link.

About Google Workspace Client-Side Encryption

Google Workspace Client-side encryption (CSE) enables users to use their own encryption keys to encrypt their organization’s data instead of using the encryption that Google Workspace provides. With Google Workspace Client-side encryption, file encryption is handled in the client’s browser before it’s stored in Google Drive’s cloud-based storage. That way, Google servers can’t access user’s encryption keys and, therefore, can’t decrypt their data. To use CSE, users will need to connect Google Workspace to an external encryption key service and an identity provider (IdP).

About Fortanix:

Fortanix® is a data-first multicloud security company solving the challenges of cloud security and privacy. Data is the most precious digital asset of businesses, but this data is spread across clouds, SaaS, applications, storage systems, and data centers. Security teams struggle to track, much less secure it. Fortanix empowers customers to secure all this data with a centralized solution. Its pioneering Confidential Computing technology means data remains protected at-rest, in-motion, and in-use, keeping it secure from even the most sophisticated attacks. For more information, see https://fortanix.com/.

Contacts

More News

View More

Recent Quotes

View More
Symbol Price Change (%)
AMZN  213.04
-1.43 (-0.67%)
AAPL  252.29
+4.84 (1.96%)
AMD  233.08
-1.48 (-0.63%)
BAC  51.28
+0.84 (1.67%)
GOOG  253.79
+1.91 (0.76%)
META  716.91
+4.84 (0.68%)
MSFT  513.58
+1.97 (0.39%)
NVDA  183.16
+1.35 (0.74%)
ORCL  291.31
-21.69 (-6.93%)
TSLA  439.31
+10.56 (2.46%)
Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the Privacy Policy and Terms Of Service.