Large-Scale Data Protection
What We Do
Enterprise Data Security – Tellaro E-Series
Mid-Market & PoC Security Solutions – Tellaro T-Series
Open Source Declaration
GET MORE INFO
Cryptographic Key Management Considerations for Secure Cloud Computing
The cloud has gained enormous adoption due to significant cost savings, ease of use, and scalability benefits. When it comes to security, however, using the cloud is comparable to leaving your...
Three steps toward stronger data protection
Technology has become more complex. Mobile computing, cloud computing and IoT are adding millions of new devices and users to the internet each year, creating demand for new products, services and...
StrongKey Expands Market Share with Tellaro Line of Data Security Appliances
Company Uniquely Combines Encryption and Strong Authentication to Make Breaches Irrelevant
StrongKey Growing Durham Presence Under CEO Jake Kiser
Having half of your employees in Cupertino, Calif., and the other half in Durham might be a nightmare for some companies, but for StrongKey’s CEO Jake Kiser it’s an opportunity.
Preparing for Stronger Data Privacy Law Based on GDPR and CCPA
The California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) may signal a coming global standard for data protection. Why? Business.
- Nov 15, 2018
Why Mid-Size Businesses Must Have Enterprise-Grade Security
Just because mid-market businesses are smaller doesn’t mean they should act small when it comes to cybersecurity.
- Nov 15, 2018
Your mid-market business needs encryption and authentication
Mid-sized businesses tend to put most of their security eggs in the network-based solutions basket. These solutions are focused on preventative measures, when zero-day attacks—by definition—take advantage of unknown...
- Oct 25, 2018
ACT Quickly to Ensure the Safety of Your Data
Keeping a financial services organization’s data safe can seem like mission impossible, but focusing on the application layer will eliminate the vast majority of data breach risks.
- Oct 16, 2018
ACT Quickly to Ensure Data Security
The dark web maintains a trove of 1.4 billion credentials with unencrypted passwords that are not only accurate, but are stored in a searchable database. LINK TO FULL STORY: ...
- Oct 12, 2018
Software Procurement Plays Favorites With B2B Investors
Cybersecurity is likely to remain a favorite among B2B investors into the foreseeable future, so it’s no surprise that the industry landed on the board more than once this week.
Recent Blog Posts
StrongKey, Others Back NIST Retail Fraud Guide To Improving Mobile Payments Security
Sep 3, 2019
Final NIST Guide on MFA for E-Commerce Released in Collaboration With StrongKey
Aug 27, 2019
Jake Kiser, COO of StrongKey, Honored with 2019 C-Suite Award
Aug 13, 2019
Arshad Noor, CTO of StrongKey, accepted into Forbes Technology Council
Jul 29, 2019
Biometrics Brings Us One Step Closer to Eliminating Passwords for Good
Jun 18, 2019
©2019 StrongKey. All Rights Reserved.