Skip Navigation

During this webinar, attendees learned how to develop a three-point strategy for protecting sensitive data in their organization. Attendees also learned about:

  • Data security challenges in the age of data proliferation
  • Strategies to discover and classify critical data
  • Data-centric security best practices

Watch Now

Video published by Thales CPandL

 

Video published by Thales CPL

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for information protection. CSPs own the responsibility to secure the infrastructure that runs their cloud services. Data owners are responsible for protecting the confidentiality, integrity, and availability of their data in the cloud. Making sure that this data is safe from unauthorized access requires organizations to consider not only the physical and logical security of the CSP but also who is encrypting the data; when and where the data is being encrypted; and who is creating, managing, and accessing the encryption keys.

In this session, attendees learned how to reduce the risks associated with storing sensitive data in the cloud. The speaker will address topics such as:

  • Meeting compliance and regulatory mandates
  • Applying customer-owned encryption and key management
  • Deploying a hybrid cloud for increased security
  • Utilizing multiple cloud providers effectively

Download Now

Ransomware is a vicious type of malware that cybercriminals use to block organizations and individuals from accessing their critical files, databases, or entire computer systems, until the victim pays a ransom. It is a form of cyber extortion.

This white paper helps you understand the anatomy of ransomware attacks and explores the solutions available in the market today to defend against such attacks. It illustrates how security policies in CipherTrust Transparent Encryption from Thales enable you to prevent rogue processes and unauthorized users from encrypting your most sensitive data and thereby protects you from ransomware attacks. CipherTrust Transparent Encryption is part of the CipherTrust Data Security Platform. The CipherTrust Platform unifies data discovery, classification, data protection, and provides unprecedented granular access controls, all with centralized key management. The products and solutions available on the CipherTrust Platform mitigate the business risks associated with data breaches and ransomware attacks.

Download Now

To recap, during this webinar attendees learned how to develop a data classification strategy that enables you to get a clear understanding of what sensitive data you have, where it is located, and its risk exposure. The speakers also discussed topics including:

  • Providing guidance on orchestrating the data discovery and classification planning in your organization
  • Identifying what sensitive data your organization has, where it is, and how it relates to data privacy regulations
  • Understanding and defining data sensitivity levels as part of an impact analysis exercise
  • Providing guidance on the remediation process
  • Identifying the main roles and responsibilities related with this process

Watch Now

The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-57, Recommendations for Key Management Part 1 (Rev 5) provides guidance for cryptographic key management for U.S. Federal Government agencies. Part 1 of the publication outlines best practices for the management of cryptographic keys and discusses key management issues that must be addressed with using cryptography.

This white paper details how Thales TCT's CipherTrust Platform address NIST SP 800-57 requirements.

Download Now

CipherTrust Transparent Encryption enables quick, effective and transparent protection of data at the system level without derailing processes,
user tasks, and administrative workflows. With a single set of data security controls, information stored within physical and virtual systems, big
data environments, containers, and linked cloud storage are protected at the file system or volume level across data centers and cloud
environments. The result is greatly reduced risk, and an enhanced capability to meet compliance and regulatory data security requirements.

Download Now

Product overview with technical features and specifications.

Download Now

Detailed platform overview with technical features and specifications.

Download Now

Teradata databases and big data analytics enable agencies to leverage information to fuel improved decisions, services, and results. However, Teradata-powered environments can bring together a wide range of data repositories—including those that contain sensitive assets. Without proper protections, these sensitive assets can inadvertently be exposed by privileged administrators, or be the target of theft by malicious insiders and external attackers.

Download a replay to learn how to secure your agency's Teradata databases and big data environments. The session will discuss how to:

  • Centrally manage encryption across your Teradata environments—including the Teradata database and Teradata Appliance for Hadoop
  • Enforce granular controls to enable administrators to perform operational tasks, without accessing sensitive data
  • Centrally manage encryption keys and policies
  • Boost security without compromising the value of big data analytics
  • Establish protections against cyberattacks and abuse by privileged users
  • Reduce costs and administrative overhead relative to other data protection solutions for Teradata

Watch Now

Product overview with technical features and specifications.

Download Now

Product overview with technical features and specifications.

Download Now

This white paper looks back at the evolution of encryption and key management systems, and examines the key challenges faced by IT teams around encryption systems, including regulation and compliance, complexity, lack of proper management tools. This is followed by a review of the recent industry initiatives and compliance regulations that are shaping the future of key management.

Download Now

The CipherTrust Data Security Platform from Thales integrates data discovery, classification, and industry-leading data protection solutions across diverse IT environments to provide adaptive data-centric security. The platform provides powerful tools to combat external threats, guard against insider abuse, and establish persistent controls, even when data is stored in the cloud or any external provider’s infrastructure and supports an evolving regulatory landscape. CipherTrust Data Security Platform is available for sale to the U.S. Federal Government exclusively through Thales Trusted Cyber Technologies.

This white paper provides an overview of the deployment architecture of the CipherTrust Platform products and the compelling use-cases that they enable for customers along their data protection journey.

Download Now

This white paper offers a look at the KMIP standard, and it shows how Thales solutions help you maximize the advantages of this standard.

Download Now

This brief captures the major reasons for adopting the new CipherTrust Data Security Platform now.

Download Now

Traditionally organizations have focused IT security primarily on perimeter defense, building walls to block external threats from entering the network. While this is still important, it is not enough. Cybercriminals regularly breach perimeter defenses and data frequently lives outside those defenses in the cloud elsewhere, so organizations need to apply a data-centric security strategy that protects data wherever it is. With today’s proliferation of data, evolving global and regional privacy regulations, growth of cloud adoption, and advanced persistent threats, data-centric security enables organizations to be in control of their data regardless of location while rendering it unreadable to data thieves. But, to be effective, this protection must happen automatically without relying on user intervention. This white paper outlines the challenges of data security in this age of data proliferation. It also provides strategies to discover and classify your critical data and apply data-centric security to it.

This white paper outlines the challenges of data security in this age of data proliferation. It also provides strategies to discover and classify your critical data and apply data-centric security to it.

Download Now

This infographic concentrates on data security complexity caused by multi-cloud adoption, evolving privacy regulations, as well as the risk of data breaches from external and internal threats.

Download Now

Product overview with technical features and specifications.

Download Now

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept