IE11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.
strongkey-vert-logo-140rgb.jpg

StrongKey is focused on securing data in cloud computing, e-commerce, healthcare, finance and other sectors mandating protection of sensitive data. The StrongKey Tellaro is a “crypto swiss-army knife” server that performs cryptographic functions through webservices, while freeing up application developers to focus on business functionality. Ideal for compliance driven data protection, the Tellaro bundles encryption, tokenization, key management, and strong authentication in an affordable, easy to deploy, easy to use, and easy to manage appliance—available to deploy on premises or as a hosted appliance.

California’s Government Operations Agency (GovOps) took the unique initiative of creating the California Blockchain Working Group.
StrongKey's Technical Writer, A. Khedron de Leon explains why creating a secure home for sensitive data is fast becoming a business requirement.
Join StrongKey's Solutions Architect Norman Field for an interactive webinar on FIDO, an easier and more secure open source authentication option.
Here are some considerations for your company culture and your most important assets—your people—while doing your parts in practicing social distancing.
Join StrongKey's Solutions Architect Norman Field for an interactive webinar on FIDO, an easier and more secure open source authentication option.
Here are 9 actions you can take to help reduce the risk that your computer or data gets compromised.
Join StrongKey’s COO, Jake Kiser, as he walks through the top preventative measures to ensure that internal breaches aren’t a factor during COVID-19.
In this first-of-its-kind role with StrongKey, you will have the opportunity to help define the strategy for large parts of our IT infrastructure.
RSA Conference is security’s biggest event of the year, and there’s 45,000 techies landing in San Francisco to prove it. You can expect five full days of educational trainings with hundreds of expert-led sessions, over 700 exhibitors, and tons of high-level networking opportunities. In short, it is the place to be! However, navigating all of that can be a bit overwhelming. That’s why here at StrongKey, we’ve compiled a few best practices from our staff who are tried and true RSA veterans. With this insider knowledge, you’ll be sure to make the most of your RSA experience!
The “data breach of the year” involved more than 100M files containing sensitive information of consumer credit-card applications at Capital One. The story hit headlines for months, and with much reason—after all, it’s not every day that the social security numbers, bank account numbers, credit scores, and plenty more other sensitive information of millions get exposed.
Combination of Identity Management Solutions and Trusted Platform Modules Offers Secure Device Identity and Management