Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

Bring Your Own Key: What is the Difference Between BYOK, CYOK & HYOK?

Her we look at what it means to “bring your own key”, “control your own key” and “hold your own key” and what the differences are between these three methods for protecting business-critical cryptographic keys used to encrypt data in the cloud.

Read more
Manage, Handle and Control Your Own Key in the MS Azure Key Vault

Manage, Handle and Control Your Own Key in the MS Azure Key Vault

Microsoft’s Azure Key Vault Managed HSM allows customers to safeguard their cryptographic keys for their cloud applications and be standards-compliant. It is a highly available, fully managed, single-tenant cloud service that uses FIPS 140-2 Level 3 validated hardware security modules (HSMs). Here we will discuss the reasons why customers who have a centrally managed key management system on-premises in their data center should use a hosted HSM for managing their keys in the MS Azure Key Vault.

Read more
Understanding the Concepts of Bring Your Own Key

Understanding the Concepts of Bring Your Own Key

Bring your own key (BYOK) is a popular term relating to key management for cloud applications. However, a lack of standardization makes it confusing to understand the various meanings that exist under bring your own key. To help understand this, the Cloud Security Alliance (CSA) in its document “Key Management in Cloud Services” has been helpful in describing the various meanings and concepts surrounding “Bring Your Own Key.”

Read more
BYOK for MS Azure KEY Vault - Helping Banks Take Control of Their Keys for MS Azure, Dynamics, and Office 365

BYOK for MS Azure KEY Vault - Helping Banks Take Control of Their Keys for MS Azure, Dynamics, and Office 365

This article explores how Cryptomathic CKMS combines BYOK for the MS Azure Key Vault with banking-grade key lifecycle management; to address the concerns banks have regarding key management in the public cloud.

Read more
Bring Your Own Key (BYOK) to AWS Enlarges Scope of Manoeuvre for Financial Institutions

Bring Your Own Key (BYOK) to AWS Enlarges Scope of Manoeuvre for Financial Institutions

This article discusses how Cryptomathic CKMS addresses concerns that financial institutions may have regarding key management in the cloud - by bringing banking-grade lifecycle key management and BYOK to Amazon Web Services (AWS) as a hybrid-cloud banking architecture.

Read more
Bring Your Own Key (BYOK) to the Google Cloud Brings New Opportunities to Financial Institutions

Bring Your Own Key (BYOK) to the Google Cloud Brings New Opportunities to Financial Institutions

This article discusses the concerns surrounding key management for cloud environments and how Cryptomathic addresses them by bringing banking-grade cryptographic key management to the Google Cloud - in the context of a hybrid-cloud banking architecture.

Read more
Key Management: New Digital Models for Banks and New Security Models, Too

Key Management: New Digital Models for Banks and New Security Models, Too

In rethinking their strategies, traditional banks have eight digital business model options to consider in order to remain competitive against untraditional newcomers to the industry.

Read more
Retail Banking - A Stacked Platform Future with Next Generation Security

Retail Banking - A Stacked Platform Future with Next Generation Security

Consumer behavior have shown a dramatic shift toward a preference for seamless digital banking solutions. Many banking customers now want simple and reliable products and services from their banks and other financial institutions.

Read more
BYOK is Essential for Data Security and Privacy as Business-Critical Applications Move to the Cloud

BYOK is Essential for Data Security and Privacy as Business-Critical Applications Move to the Cloud

The 2020 Oracle and KPMG Cloud Threat Report focuses on the key risks and challenges organizations face as they implement and maintain cloud solutions. This article highlights some of the report's findings around the growing trust in the security of cloud offerings and asserts why maintaining control of your own critical keys should be considered best-practice when considering migrating to the cloud.

Read more