Product overview with technical features and specifications.
This white paper looks back at the evolution of encryption and key management systems, and examines the key challenges faced by IT teams around encryption systems, including regulation and compliance, complexity, lack of proper management tools. This is followed by a review of the recent industry initiatives and compliance regulations that are shaping the future of key management.
The CipherTrust Data Security Platform from Thales integrates data discovery, classification, and industry-leading data protection solutions across diverse IT environments to provide adaptive data-centric security. The platform provides powerful tools to combat external threats, guard against insider abuse, and establish persistent controls, even when data is stored in the cloud or any external provider’s infrastructure and supports an evolving regulatory landscape. CipherTrust Data Security Platform is available for sale to the U.S. Federal Government exclusively through Thales Trusted Cyber Technologies.
This white paper provides an overview of the deployment architecture of the CipherTrust Platform products and the compelling use-cases that they enable for customers along their data protection journey.
This white paper offers a look at the KMIP standard, and it shows how Thales solutions help you maximize the advantages of this standard.
This brief captures the major reasons for adopting the new CipherTrust Data Security Platform now.
Traditionally organizations have focused IT security primarily on perimeter defense, building walls to block external threats from entering the network. While this is still important, it is not enough. Cybercriminals regularly breach perimeter defenses and data frequently lives outside those defenses in the cloud elsewhere, so organizations need to apply a data-centric security strategy that protects data wherever it is. With today’s proliferation of data, evolving global and regional privacy regulations, growth of cloud adoption, and advanced persistent threats, data-centric security enables organizations to be in control of their data regardless of location while rendering it unreadable to data thieves. But, to be effective, this protection must happen automatically without relying on user intervention. This white paper outlines the challenges of data security in this age of data proliferation. It also provides strategies to discover and classify your critical data and apply data-centric security to it.
This white paper outlines the challenges of data security in this age of data proliferation. It also provides strategies to discover and classify your critical data and apply data-centric security to it.
This infographic concentrates on data security complexity caused by multi-cloud adoption, evolving privacy regulations, as well as the risk of data breaches from external and internal threats.
No matter where or how the people in your organization work, there is always the need to share and sync files - both internally and externally. While you want to enable collaboration, data security should always be the first priority. If it’s not, the risk of non-compliance and data breaches become a serious problem.
Attend Thales TCT’s upcoming webinar to learn about Thales SureDrop, the most secure file sharing tool with 100% control over data sovereignty. We will discuss how SureDrop allows people to store, share and sync all their files in the Cloud or on premises with an enterprise-class solution and defense-grade security.Watch Now
In this video, Jermaine from Thales TCT demonstrates protecting AWS S3 buckets with AWS KMS vs Transparent Encryption Cloud Object Storage S3 from Thales.
File-borne attacks are on the rise, and 80% of successful breaches are new, unknown, or zero-day attacks that are not recognized by traditional signature-based detection solutions, such as antivirus. An example of this is an April 2020 attack that delivered Dridex ransomware to FedEx, UPS, and DHL customers. Sophisticated phishing emails—cleverly disguised to appear to be from company email accounts were sent with legitimate-looking attachments that delivered the payload. This threat's signature was not recognized in antivirus databases for 2 entire days, leaving the business' vulnerable.
In the past, detection and alert-based security tools were best-in-class. But in a world of zero-days and an overwhelming amount of attacks, these solutions miss massive quantities of threats—as much as 40%—leaving security teams fighting both alert fatigue and new threats from all fronts.
In this talk, Brent Hansen, Thales TCT's CTO, and Richard Hosgood, white hat hacker and North American Director of Engineering at file security company, Votiro, dissects the April 2020 phishing attack, the gaps that antivirus and next-generation antivirus leave for unknown and zero-day threats, and how an emerging technology called Positive Selection technology can prevent these types of attacks.
Thales TCT assists Department of Defense (DoD) customers in compliance with Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) in order to maintain Authority to Operate (ATO) on the DoDIN. Recent updates to the Windows Server 2019 Security Technical Implementation Guide will require customers in a VMware environment to implement an External Key Manager. To learn more, download our solution brief.
In this video, D'Nan from Thales TCT demonstrates how to integrate MarkLogic with KeySecure for Government for data-at-rest encryption.
Secure all file uploads and receive documents completely risk-free.
Completely secure every email that enters your organization.
Certificate-based, multi-factor authentication is a mainstay security technique used by the U.S. Federal Government to secure access to agency networks, protect the identities of users, and ensure that a user is who they claim to be.
Evolving needs around cloud applications and mobile devices, combined with rising threats, and the need to reduce costs, require entirely new considerations for access control.
View this on-demand recording to hear from Thales TCT, and their partner Intercede, where you will have the opportunity to learn how to strengthen your authentication and address topics such as:
We are at digital war and data is the target. No organization is immune from data security threats and the US Federal government is no exception. More than half of federal data is now stored in the cloud, and a significant portion is sensitive. Yet, despite this exposure, in the 2020 Thales Data Threat Report 99% of federal government respondents say at least some of their sensitive data in the cloud is not encrypted. IT security departments must now, more than ever, embrace and own their portion of the cloud shared responsibility model and implement data security best practices, as the cloud provider does not guarantee security at the data level. This digital event highlighted results from the 2020 Thales Data Threat Report and explored best practices for securing data in cloud and multi-cloud environments.
The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 provides guidance for the selection of security and privacy controls for federal information systems and organizations. Published by the National Institute of Standard and Technology, the publication details items from the Risk Management Framework that address security controls required to meet requirements in the Federal Information Processing Standard (FIPS) 200. Revision 4 is the most comprehensive update since the initial publication. Revision 4 was motivated principally by the expanding threat space and increasing sophistication of cyber-attacks. Major changes include new security controls and control enhancements to address advanced persistent threats (APTs), insider threats, and system assurance; as well as additions to address technology trends such as mobile and cloud computing. Critical to certification for meeting FIPS, is the implementation of security controls from NIST 800-53, Appendix F. Focusing on the capabilities needed to meet these requirements, this paper provides background about Thales Trusted Cyber Technologies’s (TCT) Data Security Platform and the Transparent Encryption product that is delivered through that platform. It further details a mapping of the Thales TCT product line’s capabilities against these NIST security controls, first with an initial summary for each Family Area (in the form of a table), and then with expanded details of how these controls are delivered.
D'Nan from Thales TCT demonstrates how to integrate Thales TCT's Luna Credential System with UiPath to provide hardware-protected PKI credentials for the software robots in UiPath's enterprise RPA solution.
U.S. Federal agencies often require PKI certificate-based authentication to perform Windows Logon and to access public key enabled systems. This requires use of a multi-factor authentication token that performs a cryptographic operation using the certificate and keys residing within the token.
Traditional multi-factor authentication introduces roadblocks to technologies like Robotic Process Automation (RPA). The OMB Memo M-19-17 outlines a policy that requires management of digital identities of non-person entities such as software robots. This means that all software robots are required to have individual digital identities and credentials that are managed in the same fashion as traditional user identities. Although software robots cannot be issued a physical token, they can utilize multi-factor login capabilities through the use of a centralized, hardware security module-based authentication system.
View this webinar to learn how Thales TCT’s Luna Credential System integrates with UiPath’s RPA platform to provide hardware-protected PKI credentials for software robots. The session will discuss topics including:
Historically, organizations have taken a perimeter based approach to cyber security, with the belief that a strong perimeter protected the IT infrastructure behind it. But, as agencies modernize legacy systems and move apps, systems and workloads to the cloud – and more employees, contractors and citizens connect remotely and from multiple devices – something is happening across federal networks; the perimeter is dissolving. Data is the new perimeter. Therefore, identifying and protecting data wherever it is created, shared, or stored, through its entire lifecycle becomes the priority. This digital briefing unveiled the survey results in the 2020 Thales Data Threat Report – Federal and shared best practices in creating a cohesive data security strategy in a perimeterless world.
Traditional multi-factor authentication introduces roadblocks to technologies like Robotic Process Automation (RPA). The OMB Memo M-19-17 outlines a policy that requires management of digital identities of non-person entities such as software robots. This means that all software robots are required to have individual digital identities and credentials that are managed in the same fashion as traditional user identities. Although software robots cannot be issued a physical token, they can utilize multi-factor login capabilities through the use of a centralized, hardware security module-based authentication system. This video demonstrates how Thales TCT’s Luna Credential System integrates with UiPath’s RPA platform to provide hardware-protected PKI credentials for software robots.
CDM overview mapping Thales TCT solutions to specific CDM requirements.
HSM-Secured Identity Credentials
The Luna Credential System (LCS) introduces a new, patent pending, approach to multi-factor authentication by maintaining user credentials in a centralized hardware device that is securely accessible by endpoints in a distributed network. Download our video to learn more about LCS.
The Luna Credential System (LCS) introduces a new, patent pending, approach to multi-factor authentication by maintaining user credentials in a centralized hardware device that is securely accessible by endpoints in a distributed network. Download our infographic to learn more about LCS and how the solution solves identity management challenges.
Rob from Thales TCT demonstrates how to configure Apache web server to use Thales TCT's Luna Network HSM to protect the private key for the certificate used by the web server.
With cloud and digital initiatives underway throughout U.S. Federal agencies, new attacks occurring daily, and traditional threats, many agencies are struggling to protect critical citizen data, financial information and government secrets. This is especially true as more agencies move applications and sensitive data to the cloud. In this session we’ll address the state of data security in U.S. Federal agencies today, the changing landscape of risks to data, and agency IT security pros priorities for data security today.
Based on the results from the 2020 Thales Data Threat Report – Federal Edition (now in its eighth year), expect to learn about:
• How the adoption of digital transformation technologies, and especially cloud, are putting sensitive data at greater risk
• The data security challenges facing agencies today
• Critical analyst recommendations for how agencies can be most effective when investing in protecting their crown jewels – their sensitive data
According to the 2020 Thales Data Threat Report – Federal Government Edition, government is ahead of business with cloud adoption, but cybersecurity remains a challenge. Ahead of global organizations, U.S. federal government agencies have more than half (54%) of their data already stored in the cloud. The report also shows digital transformation (DX) is well underway with 68% of U.S. federal government agencies embedding digital capabilities in the enterprise and aggressively disrupting the services they provide, but this adds to security complexity and creates potential vulnerabilities.
Offering the broadest range of multi-factor authentication methods and form factors, Thales TCT facilitates and empowers enterprise-wide security initiatives for maintaining and improving secure access to enterprise resources.
Thales Trusted Cyber Technologies’ (TCT) Luna HSMs are the choice for
government agencies when storing, protecting and managing cryptographic
keys used to secure sensitive data and critical applications. Meeting government
mandates for U.S. Supply Chain, the high-assurance, tamper-resistant Thales
TCT’s Luna HSMs are designed, developed, manufactured, sold, and supported
in the United States.
The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense’s (DoD) newest verification mechanism designed to ensure that cybersecurity controls and processes adequately protect Controlled Unclassified Information (CUI) that resides on Defense Industrial Base (DIB) systems and networks.
With an extensive data security portfolio and compliance mapping methodology, Thales TCT is a key partner in helping organizations achieve CMMC requirements and cybersecurity maturity levels. Our solutions provide a platform for the implementation of cybersecurity controls and institutionalization of cybersecurity practices and processes.
Thales TCT’s data security portfolio consists of data protection solutions that share a common, extensible implementation infrastructure for delivering data-at-rest encryption, enterprise key management, network encryption, authentication, access control, and security intelligence across an organization’s infrastructure.
Encrypting PHI wherever possible and reasonable can be one of the most effective approaches for fine tuning your HIPAA compliance efforts. The essence of HIPAA Security Rule compliance is finding and implementing the most reasonable process or control to minimize risks that have been identified and prevent breaches.
Federal agencies require a simple way to correlate all security-relevant data so they can manage their security posture. Instead of merely watching events after they occur, agencies should anticipate their occurrence and implement measures to limit vulnerabilities in real time. For that, agencies need an analytics-driven SIEM platform such as Splunk.
However, once data is correlated by SEIM tools, it becomes extremely valuable. By integrating an encryption and key management solution such as Vormetric Data Security Platform with Splunk, agencies can ensure that their operational intelligence is protected from surreptitious attacks.
View this on-demand recording with Thales TCT to learn how to protect Splunk indexes and provide enhanced visibility on the processes and users who are accessing protected data.
True data protection extends beyond the core. Agencies need to apply the same level of protection deployed at the core to the cloud and to remote or disconnected environments in the field.
Thales Trusted Cyber Technologies serves as a trusted, U.S. based source for cyber security solutions. We offer a broad selection of security solutions that secure, manage, distribute, and control access to your data and cryptographic keys.
Thales Trusted Cyber Technologies, offers a network security solution that provides high-assurance data protection; dedicated encryption devices from 100Mbps to 100Gbps, support for multiple network and protocol configurations, secure key management, and authenticated end-to-end encryption.
During this on-demand webinar, you will have the opportunity to learn about:
Jane from Thales TCT demonstrated how to integrate HPE ESL G3 Tape Library with Thales TCT's KeySecure for Government KMIP compliant key manager.
Jane from Thales TCT demonstrates how to integrate Red Hat Certificate Authority, part of the Red Hat Certificate System 9.4, with Thales TCT's Luna Network HSM.
Thales TCT's CTO, Brent Hansen, shares his insight into taking a data-centric approach to security to enhance an agency's overall security posture and address CDM compliance requirements in his presentation at FCW's CDM Summit. Brent breaks down his decision tree methodology to help agencies validate the points of weakness and the tools available to achieve not only compliance but to provide the highest-level security posture.
As technology has evolved, the array of devices, applications and infrastructure have exploded, each providing a specialized type of data, protection or service. Distributed systems handle transactions; security/monitoring infrastructure monitors for breaches and slowdowns; a myriad of applications make the best use of Web technologies. Each of these elements generate machine data that can be used to provide competitive advantages, gain insights into customer behavior and avoid security or compliance issues.
This paper examines the use of Splunk as the platform to collect and index machine data from virtually any source, regardless of its location. Then, we will consider how Vormetric can interact seamlessly with the Splunk system to ensure compliance with security policies and regulatory mandates.
Learn how to integrate HPE MSL3040 with KeySecure for Government.
Learn how to integrate Microsoft OCSP with Luna HSM for Government.
Learn how to integrateHPE Primera Storage Platform Library with KeySecure for Government.
Learn how to integrate HPE StoreEver MSL G3 Series Tape Library with KeySecure for Government.
As healthcare stakeholders and systems become better connected, the volume of healthcare data created, processed, analyzed and stored is greater than ever. The increased use of HD video – either for collaboration or patient monitoring – is also changing the nature and format of healthcare data.
This Insight is designed to help IT decision-makers understand what quantum computing represents for the future of cryptography and how data security practices will need to respond.
The cloud provides new capabilities to develop more flexible offerings that are on par with premises-based versions – but at a lower cost and faster time to market. This, in turn, presents new models for government agencies to consider, either to augment or replace their existing data security infrastructure.
Supply chain risk management (SCRM) has long been a key element of the manufacturing process, but as technology advances, the risk management challenges go well beyond the world of producing physical products such as hardware. ISO-based standards provide clear guidance on supply chain management, especially for conventional manufacturing, but U.S. Federal Government suppliers need to think more broadly in today’s digital economy.