Secure Manufacturing with Fortanix

Fortanix offers a comprehensive data security platform for distributed manufacturing that can scale with demand.

Overview

Today, most devices are being manufactured in remote or offshore sites that do not have the same level of security standards as the corporate headquarters. Introduction of IoT into manufacturing has also created serious cybersecurity challenges. Cybercriminals now have an opportunity to hack into sensitive information that is stored on the devices manufactured within unsecured environments and introduce counterfeit units causing financial loss and irrevocable damage to the brand’s reputation. Manufacturing organizations are looking to implement advanced security systems that can ensure smarter, secure factory workflows, protect business critical information, and safeguard IP.

Secure Manufacturing Overview

Fortanix offers a unified data security platform that delivers a scalable cloud-native solution to securely generate, store, and use cryptographic keys and certificates, as well as secrets, such as passwords, API keys, tokens, or any blob of data. Secured with Intel® SGX, Fortanix runs the entire key management inside a FIPS 140-2 certified HSM. No one other than the authorized user has access to the keys. The scale-out distributed design ensures that it can scale to also meet the rising demand for PKI fueled by Internet of Things (IoT).

What we do

Integrated Data Security Platform
Integrated Data Security Platform
Fortanix provides a Data Security as a Service (DSaaS) platform with integrated hardware security module (HSM), key management, encryption, shared secrets, and tokenization capabilities.
FIPS 140-2 level 3 certified HSM
FIPS 140-2 level 3 certified HSM
Fortanix provides a FIPS 140-2 level 3 HSM root of trust that can also manage legacy HSMs spread across remote manufacturing sites.
Key Management
Key Management
Fortanix delivers full key lifecycle management as a service to ensure secure and consistent key management across on-premises and multicloud environments.

Benefits

Highly reliable and resistant to failure

A Fortanix cluster supports high availability and is resistant to a high number of node failures. The cluster remains available even when a node fails, and the tolerance to such faults increases with a greater number of nodes in the cluster.

Highly reliable and resistant to failure

Scalable architecture that scales with surge in demand

Fortanix provides horizontal scalability and can easily respond to a surge in demand. Scale out architecture can handle millions of keys and devices in manufacturing and in the field.

Scalable architecture that scales with surge in demand

Centralized control and visibility into distributed operations

Fortanix provides control of and visibility into your key management operations across multiple sites and distributed operations with centralized management, enterprise level access controls and single sign-on support.

Centralized control and visibility into distributed operations

Securely run sensitive business logic inside the Key Management Service (KMS)

Plugins are a powerful system allowing users and/or applications to securely run sensitive business logic inside the Key Management Service (KMS). Plugins may be used for operations like imposing custom access control policies for keys, get distributed approvals from a quorum, use RSA keys to sign certificates with specific attributes and to even create wrapped keys signed by root CA based certificates.

Securely run sensitive business logic inside the Key Management Service (KMS)

Single pane of glass for management

Corporate manufacturing HQ can standardize on a single source of cryptographic services and security teams can get a single pane of glass for management.

Single pane of glass for management

Quorum based approval policy

A group administrator may enable a quorum approval policy on a group. Doing so mandates that all security-sensitive operations like key deletion, encryption and decryption, key export, key wrapping and unwrapping etc. would require approval by a quorum.

Quorum based approval policy