The Next Generation -- Security Today (2024)

The Next Generation

HSM approach delivers unparalleled cost/benefit for organizations

  • By Anand Kashyap
  • Dec 01, 2018

Hardware Security Modules, or HSMs, protectagainst insider and external threats bydelivering confidentiality for encryption keysin a physically hardened appliance. Theywere initially developed by the military forthe military, then were first leveraged commerciallyin the financial services sector. Now HSMs can beseen in a variety of applications ranging from PKI to codesigning to databases.

Despite their strong security benefits, HSMs designed witholder generation technology present significant hurdles to adoption.First, they are built using proprietary hardware that has ahigh initial acquisition cost. Second, they bring significant complexityand cost of operations. In many cases, the personnel coststo manage and operate these HSMs greatly exceed the appliancecost. The total cost and complexity prove to be prohibitive formany organizations, leading to critical gaps in encryption keymanagement for data protection.

However, newer technologies are available today which canenable organizations to reassess their cost/benefit analysis andimplement stronger security controls with low initial investment.Organizations are finding that next-generation HSM and KeyManagement capabilities offered as a subscription-based approachdeliver powerful data protection and TCO benefits.


In the past, organizations had only the CAPEX model topurchase HSMs. The hardware typically cost at least $20,000 todeploy, $40,000 for high availability, and multiple times more fora typical enterprise deployment. Most cases required additionalcomponents and costs for such features as client-side connectors,partitions, KMIP support, Elliptical Curve algorithms, master keyexport, remote administration, and maintenance. Added up, deploymentcosts for real-world use cases often started at $250,000.This cost scenario left most organizations unable to leverage thepower of HSMs and open to data breaches and insider attacks.

Next-generation HSMs today offer a subscription, or OPEX,model with flat, predictable pricing and a low barrier of entry,providing an attractive cost/benefit scenario that is attainable formost organizations. The leading appliances use commercial offthe-shelf (COTS) servers hardened for NIST FIPS 140-2 level-3,significantly reducing the initial acquisition cost. A HSM-as-aservice(HSMaaS) subscription software license combined withan all-inclusive model offers predictable pricing for current andfuture use cases. Additionally, those next-generation HSMs followinga software-defined design can even accommodate organizationsthat prefer to use their own servers for cost or supplychain efficiency purposes.

The CAPEX model bundles software and hardware togetherand often leads to paying for the software several times.

For example, if an organization, after a few years, needs toupgrade their hardware due to growing demands, they must purchaseanother hardware and software bundle, effectively duplicatingtheir software payment. Next-generation HSMs’ approachenables organizations to purchase new servers or appliances andtransfer the software licenses over, thereby lowering long-term acquisitioncosts. The OPEX model gives organizations the flexibilityto more frequently upgrade to the latest Intel x86 processor, asan example. A higher performance processor means they can domore with less, which lowers overall costs.


  • « previous
  • 1
  • 2
  • next »

This article originally appeared in the November/December 2018 issue of Security Today.

Featured

  • Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Live from ISC West: Just One Week Left

    The time is almost here. ISC West 2024 kicks off next week in Las Vegas. This year’s show will take place April 9-12 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from ISC West 2024 page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
    • ISC West
  • Push the Start Button

    Attending ISC West in Las Vegas is an exhilarating experience, blending professional networking with moments of pure enjoyment. Reconnecting with old friends amidst the bustling atmosphere of the convention center infused the event with a sense of familiarity and warmth. Read Now

    • Industry Events
    • ISC West
  • Mobile IDs, MFA and Sustainability Emerge as Top Trends in New HID Report

    HID recently announced its 2024 State of the Security Industry Report, which gathered responses from 2,600 partners, end users, and security and IT personnel worldwide, across a range of job titles and organization sizes representing over 11 industries. Read Now

    • Access Control
The Next Generation -- Security Today (2024)

FAQs

What is next-generation security? ›

In most cases, next-gen security makes use of machine learning and artificial intelligence to help protect the parameters of your business if an attacker does get through your network. It also controls which applications run on your firewall to minimize the avenues of attack and prevent threats effectively.

What is the next-generation of cyber security? ›

The next-generation of cybersecurity solutions are built on a scalable cloud data platform that supports fast search, generative AI (gen AI), machine learning (ML), embedded analytics, and more, and it's delivered where security teams already work.

What is next-generation security artificial intelligence and machine learning? ›

Next-generation endpoint protection software, using artificial intelligence (AI) and machine learning, can deliver the following protections that traditional endpoint protection cannot provide: Detecting unauthorized behaviors of users, applications, or network services. Blocking suspicious actions before execution.

What is next-generation end point? ›

Next-generation endpoint security (NGES) is a class of technology made for protecting endpoints from compromise and/or notifying system managers of a compromise. Next-generation endpoint security solutions are targeted to detect unknown malware, which other non-next-generation solutions might fail to detect.

Who owns next gen security? ›

Frank Brewer and Ryan Loughin are the founders of NextGen Security.

What is the difference between antivirus and Ngav? ›

Another key difference is that NGAV is typically cloud-based. This means it can be rapidly deployed to a large number of endpoints, and is more frequently updated with new threat data. Legacy antivirus often has to be installed, manually or via scripts, on each individual endpoint device.

What is the next big thing in cybersecurity? ›

In 2024, AI and Machine Learning (ML) are set to play a more critical role in cybersecurity. AI's advanced data analysis capabilities are increasingly used for identifying and predicting cyber threats, enhancing early detection systems.

What will replace cybersecurity? ›

AI-powered systems can automate the detection and response, enabling organizations to react swiftly to cyber-attacks and mitigate their effects. By supervising and analyzing data sets in real-time, AI models can identify and respond to cyber threats faster than traditional methods.

What will cybersecurity look like in 5 years? ›

In the next five to ten years, prevention and preparedness will be more vital than ever. If 2023 taught the cybersecurity industry anything, it's that proactively planning for a cybersecurity incident or data breach is critical.

Is AI going to replace cyber security? ›

The short answer is no, AI is not expected to replace cybersecurity or take cybersecurity jobs.

How AI is changing cyber security? ›

Automating threat detection and response

With AI, cybersecurity systems can not only identify but also respond to threats automatically. AI-powered systems automate threat detection processes, providing real-time monitoring and rapid response times.

Why AI is the future of home security? ›

We can expect the refinement of facial recognition and identification capabilities. AI algorithms will become more adept at recognizing faces, objects, and even emotional states, resulting in more accurate and reliable home security systems.

How long did next generation last? ›

Star Trek: The Next Generation aired for seven seasons beginning on September 28, 1987, and ending on May 23, 1994. The series begins with the crew of the Enterprise-D put on trial by an omnipotent being known as Q, who became a recurring character.

What is next generation connectivity? ›

Next-generation connectivity refers to advanced technologies that provide faster, more reliable, and more secure data transfer between devices and systems. These technologies include 5G networks, the Internet of Things (IoT), and artificial intelligence (AI) and machine learning (ML).

How long did next generation run? ›

Star Trek: The Next Generation is an American science fiction television series which aired in syndication from September 1987 through May 1994. It is the second live-action series of the Star Trek franchise and comprises a total of 176 (DVD and original broadcast) or 178 (syndicated) episodes over 7 seasons.

What is the difference between standard and next-generation antivirus? ›

This is the main difference between traditional versus next-generation antivirus. NGAV identifies threats that traditional antivirus misses, either because they are signature-based attacks that have not yet been identified, or because they are file-less attacks that legacy antivirus is not designed to catch.

Is Webroot considered a next gen antivirus? ›

Webroot's suite of next-generation cybersecurity solutions can help you eliminate the security gaps your business or clients face. Our integrated security portfolio covers endpoint and DNS protection, as well as phishing simulations and cybersecurity awareness training for end users.

What is next-generation networking with example? ›

A next-generation network (NGN) is a packet-based network which can provide services including Telecommunication Services and is able to make use of multiple broadband, quality of service-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies ...

Top Articles
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 5335

Rating: 4 / 5 (61 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.