About Us

Ntrinsec Launches Groundbreaking Key Security Automation Platform

Ntrinsec Launches Groundbreaking Key Security Automation Platform
A VPN is an essential component of IT security, whether you’re just starting a business or are already up and running. Most business interactions and transactions happen online and VPN

Ntrinsec launched a groundbreaking new key security automation platform. The platform reduces security issues related to improper key management and misuse of encryption keys. Ntrinsec delivers complete automation around all key lifecycle operations by integrating with third-party key management systems (KMS), hard security modules (HSMs), certificate authorities, and significant cloud providers. This will guarantee that all keys follow the best procedures and put an end to key compromises. 

Ntrinsec CEO, Michael Leidesdorff said, “With a potent combination of technology and a team with decades of expertise, Ntrinsec is in a prime position to solve today’s data protection challenges. We are excited to introduce the world’s first key security automation platform from Ntrinsec. Our goal is to protect organizations from data breaches, and this tool has the strength to do just that. Ntrinsec’s moving target defense approach is making sure that digital secrets are kept safe in perpetuity. Bad actors are increasingly exploiting key hygiene issues like key reuse and local wallets. With this attack vector quickly growing and industry standards calling only for annual key rotation, which is hopelessly out-of-date, a platform like Ntrinsec is needed now more than ever.” 

Ntrinsec has developed a moving-target protection method that outwits hackers in today’s more complicated situations by automating machine identification secrets at scale. To maintain good key hygiene and spot exploitable key reuse, users can automatically and safely map all keys and host computers within the platform. In order to successfully prevent data breaches before they ever start, Ntrinsec powers intelligent crypto-reduction strategies to develop anomaly detection and automate speedy remediation. 

Recent News

Newsletter

SUBSCRIBE TO OUR NEWSLETTER!!