About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Entrust Extends Innovative Cryptographic Key Management Platform to the Cloud With KeyControl as a Service

Platform helps enterprises quickly and easily understand the full context of all cryptographic assets through a single pane of glass managed in the cloud

Entrust, a global leader in delivering identity-centric security solutions, today unveiled KeyControl as a Service (KCaaS), providing organizations with control of their cryptographic keys while leveraging the benefits of the cloud.

Existing key management solutions can lack advanced features required to meet evolving compliance mandates and security policy requirements. Moreover, they fail to provide comprehensive contextual information about cryptographic assets, hindering effective management and risk assessment. Entrust KeyControl’s support for geographically distributed vaults enables highly effective management of keys and secrets, while mitigating aggregation risks within a cryptographic ecosystem. This approach enables data protection that aligns with local security policies and helps ensure compliance with regulatory mandates.

“Traditional key management solutions often fall short in tracking and controlling keys and secrets throughout their lifecycles. As enterprises increasingly rely on cryptography to safeguard their applications, workloads, and data, this can lead to compliance and security challenges,” said Bhagwat Swaroop, President, Digital Security Solutions at Entrust. “When it comes to cloud data security, the ability to create, use, and control encryption keys in the cloud is vital. As such, organizations are increasingly turning to cloud-based, as-a-service solutions to fulfill their cryptographic security requirements either in addition to or as a replacement for traditional on-premises solutions. Entrust KeyControl as a Service is designed specifically to help address the challenges of securing data everywhere − including in the cloud − and managing the keys and compliance in a heterogeneous and interoperable way.”

The new KCaaS solution helps address these challenges by offering a unified dashboard for complete visibility, traceability, compliance tracking, and an immutable audit trail of keys and secrets that can be conveniently managed through a cloud platform. Its decentralized vault architecture ensures keys remain secure within authorized endpoints, while also supporting a wide range of cryptographic use cases. Additionally, the platform offers decentralized security with centralized visibility across the enterprise cryptographic ecosystem. This means an organization’s cryptographic assets are not confined to a single, central repository.

“Veeam® recognizes how key management systems can enhance security and compliance,” said Stefan Renner, Technical Director of Product Management, Alliances at Veeam, an Entrust partner. “By running key management solutions as a service, such as Entrust KeyControl, in conjunction with Veeam Backup & Replication™ (part of Veeam Data Platform), we anticipate enterprises will leverage more flexibility in deployment of their workloads – enabling greater cyber resiliency and management.”

Key features and benefits of the KCaaS platform include:

  • Key Lifecycle Management: Automates key storage, backup, distribution, rotation, and revocation, simplifying the management of encrypted workloads.
  • Key Inventory: Provides a centralized dashboard for fine-grained control, compliance, and risk tracking, translating complex requirements into actionable insights.
  • Decentralized Vault Architecture: Ensures keys never leave their designated vaults except to authorized endpoints, enhancing security and control.
  • Flexible Use Cases: Supports a wide range of use cases, catering to diverse needs such as Key Management Interoperability Protocol (KMIP), cloud key management options like Bring Your Own Key (BYOK) and Hold Your Own Key (HYOK) deployments, secrets management, privileged account session management, tokenization, and database protection.
  • Compliance Management: Continuous tracking of keys and secrets against compliance standards or best practices.
  • Scalability: Seamlessly scales to support millions of keys and secrets.
  • Risk Scoring: Provides continuous risk assessment and tracking for keys and secrets, ensuring proactive management and mitigation of potential security threats.

By combining all the key elements of visibility, compliance, risk measurement, documentation, processes, data sovereignty, decentralization, integration, and third-party support, Entrust KeyControl as a Service can help meet the stringent regulatory challenges face by today’s enterprises.

KeyControl as a Service is certified to FIPS 140-2 Level 1. For organizations requiring higher levels of assurance, KeyControl as a Service can be seamlessly integrated with a FIPS 140-3 and Common Criteria EAL4+ certified Entrust nShield Hardware Security Module (HSM). The HSM provides an additional layer of security protecting the keys managed by KeyControl as a Service. It is also used in the process of generating cryptographic keys, ensuring high-quality entropy from the HSM’s random number generator is used in keys created and managed by KeyControl vaults irrespective of which vault type is deployed.

Additional Information

Web page: Entrust KeyControl

About Entrust

Entrust is an innovative leader in identity-centric security solutions, providing an integrated platform of scalable, AI-enabled security offerings. We enable organizations to safeguard their operations, evolve without compromise, and protect their interactions in an interconnected world – so they can transform their businesses with confidence. Entrust supports customers in 150+ countries and works with a global partner network. We are trusted by the world’s most trusted organizations. Learn more at www.entrust.com.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.