The joint solution will provide security for organizations hesitant to store keys in the public cloud.
F5 Networks has arrived at a joint solution with Equinix, a data Center Company which provides automated HSM (hardware security module) capabilities as-a-service. The solution introduced at F5’s global Agility Conference 2018, combines F5 BIG-IP and Equinix SmartKey technologies to simplify encryption key lifecycle management and provide security for organizations hesitant to store their ever-increasing number of keys in the public cloud.
Today’s enterprises seek to embrace the cost and efficiency benefits of cloud but find securely managing data and encryption capabilities across private, public, hybrid, or multi-cloud environments challenging. Many organizations have found that third-party cloud service provider offerings around KMS (key management services) can quickly add complexity — with each provider maintaining a different set of security keys—and fall short of protecting on -premises components.
“Our focus is on applications—front and center,” said Calvin Rowland, SVP of Business Development at F5.
“Building on a longstanding and fruitful collaboration, this new solution integrates Equinix SmartKey into a joint cloud gateway solution, giving customers the ability to automate the configuration and management of encryption keys within the F5 BIG-IP platform to better support today’s growing portfolios of distributed applications,” he added.
The joint Equinix and F5 solution brings together HSM and KMS capabilities into a cloud-agnostic HSM as a Service offering to deliver the security and simplicity required for both hybrid and multi-cloud environments.Specifically, the integration of SmartKey and BIG-IP provides a network-based solution that preserves the ability to perform a full suite of key lifecycle management functions as a service in the cloud. This approach promotes valuable use cases, including SSL termination, acceleration and offloading, as well as data encryption and decryption, without prohibitive trade-offs around complexity or security.