In this paper, we will examine how CipherTrust Transparent Encryption from Thales secures the Splunk log repositories and databases. Then, we will sho...
Read MoreIn today’s environment of exponential growth in the volumes of data in motion over networks, increasingly sophisticated and state sponsored cybercrime...
Read MoreIT networks are growing larger and becoming more widely dispersed. With endpoints stretching across multiple sites, national borders and remote locati...
Read MoreIn the security world, the phrase ‘secure network’ is often viewed as an oxymoron; experience has demonstrated that once a device is connected to a ne...
Read MoreThe term Root of Trust (RoT) is commonly used in information security circles, but what does it mean? Why do we care? How does it apply to cryptograph...
Read MoreThis white paper helps you understand the anatomy of ransomware attacks and explores the solutions available in the market today to defend against suc...
Read MoreFor agency leaders and IT administrators responsible for data security—from the most basic statistics to highly sensitive documents— understanding the...
Read MoreThe National Institute of Standards and Technology (NIST) Special Publication (SP) 800-57, Recommendations for Key Management Part 1 (Rev 5) provides ...
Read MoreThales TCT is a key partner in helping organizations to meet the standard. Focusing on protecting data-at-rest, Thales TCT delivers critical data prot...
Read MoreThe introduction of TIM to the CN Series hardware encryptors will help customers meet the increasing demand to protect data flows across multiple netw...
Read More