IR Selects Cryptsoft's KMIP Technologies
- 15.11.2016 08:45 am
Cryptsoft's Key Management Interoperability Protocol (KMIP) technology has been chosen by IR (Integrated Research Limited) to strengthen and extend the security capability of their flagship Prognosis® product. Increasing security and flexibility without adding cost or complexity was a key demand from IR's existing customers and a prerequisite to succeed with new customers that utilize emerging technology platforms.
Servicing over 1000 customers globally with their proactive performance management software for critical IT infrastructure, payments and communications ecosystems, including a quarter of the Fortune 500 companies, nine out of the top ten US banks, and seven out of the ten biggest telcos, security is a key concern for IR. Security technology was needed that would strengthen their security offering for their existing customers while also giving IR the interoperability, flexibility, and ease-of-use that prospective customers in their key growth and emerging markets were demanding.
"Cryptsoft is the clear market leader in KMIP technologies and their extensive experience in managing security objects within all infrastructure and service models was critical for us," said Bryce Dunn, Head of Product Management, IR. "By implementing KMIP in Prognosis ®, we can provided enhanced security for our existing customers, we can meet the stringent security requirements coming out of the regulated sectors, and we can also provide the flexibility and ease of use that our customers providing cloud based solutions are demanding."
"Working with leading global vendors like IR is always rewarding, especially when demand for KMIP technology is accelerating in their target ecosystems," said Justin Corlett, Business Development Manager, Cryptsoft. "Enabling our customers to access best-of breed enterprise key management server solutions using the same technology that underpins many of these products, is one of our key differentiators. IR's current and future customers will now know that their secured data resources will be available quickly, reliably, and at scale, with the whole process underpinned by an extensively supported, open-standards based technology."