Secure Manufacturing with Fortanix

Fortanix offers a comprehensive data security platform for distributed manufacturing that can scale with demand.

Overview

Today, most devices are being manufactured in remote or offshore sites that do not have the same level of security standards as the corporate headquarters. Introduction of IoT into manufacturing has also created serious cybersecurity challenges. Cybercriminals now have an opportunity to hack into sensitive information that is stored on the devices manufactured within unsecured environments and introduce counterfeit units causing financial loss and irrevocable damage to the brand’s reputation. Manufacturing organizations are looking to implement advanced security systems that can ensure smarter, secure factory workflows, protect business critical information, and safeguard IP.

Secure Manufacturing Overview

Fortanix offers a unified data security platform that delivers a scalable cloud-native solution to securely generate, store, and use cryptographic keys and certificates, as well as secrets, such as passwords, API keys, tokens, or any blob of data. Secured with Intel® SGX, Fortanix runs the entire key management inside a FIPS 140-2 certified HSM. No one other than the authorized user has access to the keys. The scale-out distributed design ensures that it can scale to also meet the rising demand for PKI fueled by Internet of Things (IoT).

Benefits

Highly reliable and resistant to failure

A Fortanix cluster supports high availability and is resistant to a high number of node failures. The cluster remains available even when a node fails, and the tolerance to such faults increases with a greater number of nodes in the cluster.

Highly reliable and resistant to failure

Scalable architecture that scales with surge in demand

Fortanix provides horizontal scalability and can easily respond to a surge in demand. Scale out architecture can handle millions of keys and devices in manufacturing and in the field.

Scalable architecture that scales with surge in demand

Centralized control and visibility into distributed operations

Fortanix provides control of and visibility into your key management operations across multiple sites and distributed operations with centralized management, enterprise level access controls and single sign-on support.

Centralized control and visibility into distributed operations

Securely run sensitive business logic inside the Key Management Service (KMS)

Plugins are a powerful system allowing users and/or applications to securely run sensitive business logic inside the Key Management Service (KMS). Plugins may be used for operations like imposing custom access control policies for keys, get distributed approvals from a quorum, use RSA keys to sign certificates with specific attributes and to even create wrapped keys signed by root CA based certificates.

Securely run sensitive business logic inside the Key Management Service (KMS)

Single pane of glass for management

Corporate manufacturing HQ can standardize on a single source of cryptographic services and security teams can get a single pane of glass for management.

Single pane of glass for management

Quorum based approval policy

A group administrator may enable a quorum approval policy on a group. Doing so mandates that all security-sensitive operations like key deletion, encryption and decryption, key export, key wrapping and unwrapping etc. would require approval by a quorum.

Quorum based approval policy
Fortanix-logo

4.6

star-ratingsgartner-logo

As of August 2023

SOC-2 Type-2ISO 27001FIPSGartner LogoPCI DSS Compliant

US

Europe

India

Singapore

3910 Freedom Circle, Suite 104,
Santa Clara CA 95054

+1 408-214 - 4760|[email protected]

High Tech Campus 5,
5656 AE Eindhoven, The Netherlands

+31850608282

UrbanVault 460,First Floor,C S TOWERS,17th Cross Rd, 4th Sector,HSR Layout, Bengaluru,Karnataka 560102

+91 080-41749241

T30 Cecil St. #19-08 Prudential Tower,Singapore 049712