Fortanix offers a unified data security platform that delivers a scalable cloud-native solution to securely generate, store, and use cryptographic keys and certificates, as well as secrets, such as passwords, API keys, tokens, or any blob of data. Secured with Intel® SGX, Fortanix runs the entire key management inside a FIPS 140-2 certified HSM. No one other than the authorized user has access to the keys. The scale-out distributed design ensures that it can scale to also meet the rising demand for PKI fueled by Internet of Things (IoT).
What we do
Read the step by step guide for a practical path to using Fortanix with your existing HSMs to improving on-premises, public cloud, and hybrid cloud data security.Read Now
Highly reliable and resistant to failure
A Fortanix cluster supports high availability and is resistant to a high number of node failures. The cluster remains available even when a node fails, and the tolerance to such faults increases with a greater number of nodes in the cluster.
Scalable architecture that scales with surge in demand
Fortanix provides horizontal scalability and can easily respond to a surge in demand. Scale out architecture can handle millions of keys and devices in manufacturing and in the field.
Centralized control and visibility into distributed operations
Fortanix provides control of and visibility into your key management operations across multiple sites and distributed operations with centralized management, enterprise level access controls and single sign-on support.
Securely run sensitive business logic inside the Key Management Service (KMS)
Plugins are a powerful system allowing users and/or applications to securely run sensitive business logic inside the Key Management Service (KMS). Plugins may be used for operations like imposing custom access control policies for keys, get distributed approvals from a quorum, use RSA keys to sign certificates with specific attributes and to even create wrapped keys signed by root CA based certificates.
Single pane of glass for management
Corporate manufacturing HQ can standardize on a single source of cryptographic services and security teams can get a single pane of glass for management.
Quorum based approval policy
A group administrator may enable a quorum approval policy on a group. Doing so mandates that all security-sensitive operations like key deletion, encryption and decryption, key export, key wrapping and unwrapping etc. would require approval by a quorum.