About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Entrust Announces Industry's First Unified Cryptographic Security Platform to Protect the Foundations of Data Security

The new Entrust Cryptographic Security Platform helps enterprises confidently defend against cyber threats and manage operations with the first all-in-one solution for keys, secrets, and certificates.

Entrust, the global leader in identity-centric security solutions, today announced the Entrust Cryptographic Security Platform, the industry’s first unified, end-to-end cryptographic security management solution for keys, secrets, and certificates.

Cyberattacks on data security and identity systems are exploding in scale and sophistication. Traditional approaches to securing data and identities aren't working, and in digital-first environments every connected device, application, and system is at risk without a secure cryptographic foundation. And the fragmented tools for managing cryptographic sprawl – including encryption keys, secrets, and certificates – have made it nearly impossible to confidently manage cryptography at an enterprise scale.

The Entrust Cryptographic Security Platform addresses this challenge by providing comprehensive visibility and manageability across the entire cryptographic estate, including public and private cloud environments, endpoints, applications, and networks. Security, IT, and DevOps now can have both the control and agility they need to simplify deployment of cryptographic solutions and the centralized inventory and visibility to manage increasingly complex operations and to prepare for the shift to post-quantum cryptography.

For the first time, security leaders, IT, and development organizations have a unified platform from which to manage all aspects of cryptographic security. The Entrust Cryptographic Security Platform integrates market-leading capabilities to deliver unified compliance management, PKI deployment and operation, and lifecycle management for keys, secrets, and certificates, secured with Entrust nShield and third-party hardware security modules (HSMs) and interoperable with top security, identity, and IT management systems through extensive integrations, providing for unmatched protection.

"Siloed cybersecurity tools are no longer enough in a world where keys, secrets, and certificates are increasingly being targeted by AI-enhanced attacks. We’re seeing an explosion of data and devices that need to be secured by cryptography, and we’re in the midst of a multi-year transition to quantum-secure cryptography. It’s clear that every organization must place a heightened focus on cryptographic estate management as the foundation of data and identity security,” said Bhagwat Swaroop, President of Digital Security at Entrust. “With our new Cryptographic Security Platform, Entrust and our partners are helping organizations protect their cryptographic foundations.”

"With the inevitable ‘Q-Day’ getting closer and closer — when quantum computers can quickly break traditional encryption — cryptographic management needs to keep pace. Businesses need to have complete cryptographic estate monitoring and observability while also maintaining flexibility to ensure they're keeping pace with the technology landscape," said Jennifer Glenn, IDC Research Director for Information and Data Security. "Organizations are seeking a comprehensive, long-term solution that will adapt to the future of security."

The Entrust Cryptographic Security Platform lets customers take control and mitigate the potential for disruption in these vast and complex transitions, providing:

  • Enterprise-Wide Visibility: Monitor cryptographic assets, audit changes, and receive alerts for enhanced security oversight, all from a centralized dashboard.
  • Cryptographic Risk Management: Automatically assess cryptographic risk posture, enforce policy, and secure keys, secrets, and certificates across distributed functions, divisions, and teams.
  • Scalable Architecture: Deploy high-performance, future-proof cryptographic solutions supporting the latest standards, with on-prem and managed service options.
  • Interoperable: Enable extensive integrations with top security, identity, and IT management systems while enabling customization through open APIs.

The Entrust Cryptographic Security Platform will be available in May 2025. To learn more about the platform and its capabilities, visit: entrust.com/products/cryptographic-security-platform.

About Entrust

Entrust is an innovative leader in identity-centric security solutions, providing an integrated platform of scalable, AI-enabled security offerings. We enable organizations to safeguard their operations, evolve without compromise, and protect their interactions in an interconnected world – so they can transform their businesses with confidence. Entrust supports customers in 150+ countries and works with a global partner network. We are trusted by the world’s most trusted organizations. Learn more at www.entrust.com.

Siloed cybersecurity tools are no longer enough in a world where keys, secrets, and certificates are increasingly being targeted by AI-enhanced attacks.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.