Skip Navigation

The White House issued an Executive Order on improving the Nation’s Cybersecurity on May 12, 2021. The Executive order gives agencies 180 days to “adopt multi-factor authentication and encryption for data at rest and in transit, to the maximum extent consistent with Federal records laws and other applicable laws.”

Download Now

Thales TCT offers authentication, data at rest encryption, and data in transit encryption solutions that address the requirements outlined in the Executive Order.

Download Now

Part 6 of this video series based on a recent Thales TCT webinar discusses Zero Trust.

Implementing a zero trust approach to data security is one of the best ways for agencies to protect their data. Agencies must act under the assumption that their networks have already been compromised. A good plan starts with taking a data-centric approach to security. This means focusing on what needs to be protected—the files containing sensitive information—and applying the appropriate form of protection no matter where the data happens to reside. To be effective, this must happen automatically; sensitive information should be identified as soon as it enters an organization’s IT ecosystem and should be secured with policy-based protection that lasts throughout the data lifecycle.

 

Part 5 of this video series based on a recent Thales TCT webinar discusses how to secure cloud deployments.

Government agencies should focus on implementing solutions that can simplify the data security landscape and reduce complexity across multiple clouds and legacy environments, as well as modern, cloud-based digital transformation technologies. Agencies should consider data security solutions that enable protection of data moving between clouds and out of the cloud to on-premises environments and should leverage centralized security solutions that orchestrate data security across multiple cloud platforms.

 

Protecting network transmitted data against cyber-attacks and data breaches is imperative. High-assurance network encryption features secure, dedicated encryption devices that protect data in transit. In order to be truly high assurance, these devices must use embedded, zero-touch encryption key management; provide end-to-end, authenticated encryption and use standards-based algorithms.

Part 4 of this video series based on a recent Thales TCT webinar discusses data in transit encryption. Thales TCT offers network encryption solutions that provide a single platform to encrypt everywhere— from network traffic between data centers and the headquarters to backup and disaster recovery sites, whether on premises or in the cloud. Rigorously tested and certified, our network encryption solutions have been vetted by such organizations as the Defense Information Systems Agency (DoDIN APL) and NATO. Only through Thales TCT’s high-assurance network data encryption can you be assured your data is rendered useless in unauthorized hands and that it will remain secure beyond the data’s useful life.

 

Part 3 of this video series, based on a recent Thales TCT webinar, discusses Section 3.d of the Executive Order which requires the implementation of encryption for data at rest. Data at rest encryption with privileged user access controls significantly improves security posture and not only protects data at rest, but also encrypted workloads in the cloud. Role-based access policies enable a zero trust architecture by controlling who, what, where, when and how data can be accessed. Granular access controls enable administrative users to perform their duties while restricting access to encrypted data.

Thales TCT offers data at rest encryption solutions that deliver granular encryption and role-based access control for structured and unstructured data residing in file servers, databases, applications, and storage containers. With centralized key management and a hardened root of trust with a full U.S. supply chain, agencies can ensure their master keys are protected and data remains secure.

 

The White House issued an Executive Order on improving the Nation's Cybersecurity on May 12, 2021. The Executive Order gives agencies 180 days to "adopt multi-factor authentication and encryption for data at rest and in transit". Thales TCT, a U.S. based provider of government high-assurance data security solutions, offers multi-factor authentication, data at rest encryption, and data in transit encryption solutions that address the requirements outlined in the Executive Order.

Part 1 of this video series based on a recent Thales TCT webinar discusses the U.S. Federal cybersecurity landscape and provides a primer on the EO.

 

Part 2 of this video series based on a recent Thales TCT webinar discusses section 3.d of the Executive Order which requires the implementation of multi-factor authentication. Multi-factor authentication ensures that a user is who they claim to be. The more factors used to determine a person’s identity, the greater the trust of authenticity. Because multi-factor authentication requires multiple means of identification at login, it is widely recognized as the most secure method for authenticating access to data and applications.

Thales TCT offers the broadest range of authentication methods and form factors. Our solutions address numerous use cases, assurance levels, and threat vectors with unified, centrally managed policies—managed from a central platform delivered in the cloud or on-premises.

 

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept