Fortanix secures data at rest, in motion and in use across datacenter and cloud.
- Big data
- Cloud (computing) security
- Compliance/GRC (products and services)
- Trust center (products and services)
- Trusted computing
- Application security
- Data leakage/loss prevention
- Data protection (products and services)
- APT protection
- Banking (IT security solutions)
- Hardware security
- Public key infrastructure
- Industrial IT security
- CIP – Critical Infrastracture Protection (security solutions)
- Secure software development
- Managed security services
- Storage solutions/security
Fortanix Runtime Encryption technology solves the biggest challenge in cloud security today, namely protecting sensitive applications and data at run-time when they are held in system memory and are vulnerable to any system compromise. By enabling applications to be executed within a trusted execution environment or "secure enclave", the attack surface is dramatically reduced - confidentiality and integrity are preserved, even if an attacker has full root privileges.
Fortanix employs Runtime Encryption technology to provide pervasive data security solutions, unlocking the power of our customers’ most valuable data by securing it throughout its life cycle, both on-premises and in the cloud. Fortanix is one of the first companies to build commercial confidential computing solutions and deploy them in production environments at scale in Fortune Global 500 corporations, winning numerous industry awards along the way. We are also a founding member of the Linux Foundation’s Confidential Computing Consortium, along with Intel, Microsoft, Google, Red Hat, Facebook, and others.
Built with Runtime Encryption technology, Fortanix Self-Defending Key Management Service (KMS) provides an enterprise-scale key management system with integrated hardware security module (HSM) functionality for encryption and digital signing, as well as support for tokenization and secrets management. Self-Defending KMS is a modern, flexible, and highly scalable solution that enables enterprise-wide key management and cryptographic services to be managed through a single dashboard, integrating easily with third-party applications via standard APIs such as KMIP, PKCS#11, and JCE as well as providing a comprehensive REST API for application developers and DevOps teams. Self-Defending KMS can be deployed in the cloud, using on-premise hardware appliances, or a SaaS service, with security certification up to FIPS 140-2 Level 3.