Intelligent CISO Issue 05 | Page 79

decrypting myths storage, encryption and tokenisation required to only allow access to authorised users. By including geographically distributed locations, direct and secure interconnection and multicloud HSM-as-a-Service solutions in your data backup and recovery plans, you’ll have a more comprehensive and integrated business continuity and disaster recovery solution. u New digital technologies and transactions that rely on the public Internet have created a whole new cyberattack entryway into many organisations. Jeroen Schlosser, Managing Director, Equinix MENA services, hardware security module (HSM) capabilities need to match the cloud’s elasticity and scalability, while still ensuring the high-performance key www.intelligentciso.com | Issue 05 79