Skip Navigation

D'Nan from Thales TCT demonstrates how to integrate Thales TCT's Luna Credential System with UiPath to provide hardware-protected PKI credentials for the software robots in UiPath's enterprise RPA solution.

 

Traditional multi-factor authentication introduces roadblocks to technologies like Robotic Process Automation (RPA). The OMB Memo M-19-17 outlines a policy that requires management of digital identities of non-person entities such as software robots. This means that all software robots are required to have individual digital identities and credentials that are managed in the same fashion as traditional user identities. Although software robots cannot be issued a physical token, they can utilize multi-factor login capabilities through the use of a centralized, hardware security module-based authentication system. This video demonstrates how Thales TCT’s Luna Credential System integrates with UiPath’s RPA platform to provide hardware-protected PKI credentials for software robots.

 

The Luna Credential System (LCS) introduces a new, patent pending,  approach to multi-factor authentication by maintaining user credentials in a centralized hardware device that is securely accessible by endpoints in a distributed network. Download our video to learn more about LCS.

 

Rob from Thales TCT demonstrates how to configure Apache web server to use Thales TCT's Luna Network HSM to protect the private key for the certificate used by the web server.

 

True data protection extends beyond the core. Agencies need to apply the same level of protection deployed at the core to the cloud and to remote or disconnected environments in the field.

Thales Trusted Cyber Technologies serves as a trusted, U.S. based source for cyber security solutions. We offer a broad selection of security solutions that secure, manage, distribute, and control access to your data and cryptographic keys.

 

Jane from Thales TCT demonstrated how to integrate HPE ESL G3 Tape Library with Thales TCT's KeySecure for Government KMIP compliant key manager.

 

Jane from Thales TCT demonstrates how to integrate Red Hat Certificate Authority, part of the Red Hat Certificate System 9.4, with Thales TCT's Luna Network HSM.

 

Thales TCT's CTO, Brent Hansen, shares his insight into taking a data-centric approach to security to enhance an agency's overall security posture and address CDM compliance requirements in his presentation at FCW's CDM Summit. Brent breaks down his decision tree methodology to help agencies validate the points of weakness and the tools available to achieve not only compliance but to provide the highest-level security posture.

 

Learn how to integrate HPE MSL3040 with KeySecure for Government.

 

Learn how to integrateHPE Primera Storage Platform Library with KeySecure for Government.

 

Learn how to integrate HPE StoreEver MSL G3 Series Tape Library with KeySecure for Government.

 

Learn how to integrate HyTrust KeyControl with SafeNet AT Luna SA HSM for Government.

 

Learn how to integrate HyTrust KeyControl with SafeNet AT Luna SA HSM for Government.

 

 

Learn how to integrate F5 Big-IP with SafeNet AT Luna SA HSM for Government.

 

Learn how to integrate KeySecure for Government with a Rubrik cluster.

 

Learn how to integrate Thales TCT’s KeySecure for Government with VMware vSphere.

 

Learn how to integrate Thales TCT’s Luna SA HSM for Government with ISC CertAgent.

 

Learn how to integrate Thales TCTs Luna SA HSM for Government with Axway VA validation authority.

 

Learn how to configure a Luna Client to work with a Luna SA HSM for Government appliance.

 

Learn how to integrate HPE iLO with KeySecure for Government in this video. It provides a quick walk through of the KeySecure for Government and HPE iLO integration. The elements that need to be configured on KeySecure outlined, and how to configure remote key managers on iLO is shown. The video concludes when iLO and KeySecure are successfully communicating.

 

Learn how to integrate SafeNet AT's Luna SA for Government HSM with PrimeKey's CA, EJBCA.

 

Learn how how to use the HSM to create a column master key used to encrypt column encryption keys used by SQL. This will ensure that information entered by the client side is encrypted before it's sent to the SQL database on the SQL server. This means that the client will be able to see decrypted information but on SQLserver, the database adminstrator and anyone who has assess to that server will only see encrypted information.

 

Learn how how to integrate Microsoft Active Directory Certificate Services with Thales TCT's Luna SA for Government HSM.

 

Learn how to integrate Venafi Trust Protection Platform with  Luna SA for Government HSM.

 

Learn how to integrate a Cohesit cluster with  KeySecure for Government. KeySecure for Government generates and securely stores the Key Encrypting Keys (KEKs) used to encrypt each storage domain in the cluster.

 

Learn how to integrate Microsoft Azure Bring Your Own Key with  Luna SA for Government HSM. Using this feature, users will be able to generate their own key, store and mange their key themselves, and import it to Azure for use in other services.

 

Learn how to integrate Microsoft ISS with Luna SA HSM for Government.

 

Learn how to manage AWS CMKs with KeySecure for Government.

 

Learn how to integrate AppViewX with Luna SA HSM for Government.

 

Kirk Spring, President of Thales TCT, addresses the security challenges that federal agencies face when moving sensitive data to the cloud. He shares his insight into how data owners can ensure that their data is secure in any cloud environment by controlling their encryption and owning their encryption keys.

 

Kirk Spring, President and Board Member, Thales TCT, shares his insight with SIGNAL Media Editor in Chief Bob Ackerman about the hybrid cloud.

 

Learn how to integrate Luna SA for Government with Entrust Authority Security Manager.

 

Learn the steps necessary for creating a KMIP server on KeySecure for Government.

 

In today’s environment it is essential to know the origin of not only the finished product but the components that make up that product whether it be a piece of hardware or a software component. Watch our video to learn more.

 

Securing data properly requires that customers own—and can prove that they own—their data, from inception to deletion. That means that customers—not their cloud provider—must own their encryption and encryption keys. Watch our video to learn more.

 

Bill from SafeNet AT brings life to our products and demonstrates how they can be used in a widespread theoretical environment.

 

Learn how to integrate HashiCorp Vault Enterprise Plus HSM with Luna SA HSM for Government.

 

Learn how to enable data at rest encryption on a Nutanix cluster.

 

Learn how to create a KeySecure for Government cluster for the purpose of redundancy and high availability.

 

Learn how to use a local certificate authority on KeySecure for Government to sign an SSL certificate for a key server.

 

Learn how to deploy KeySecure G350v using vSphere web client.

 

Learn how to create a trusted, local certificate authority on KeySecure for Government.

 

Learn how to install a Luna Client to establish connection between a Windows PC and a Luna SA HSM for Government.

 

Learn how to integrate ProtectSED with Klas Telecom Government's Voyager to securely manage and deliver the cryptographic keys used for locking and unlocking Opal 1.0 and 2.0 compliant self-encrypting drives.

 

Agencies need to apply the same level of security deployed in the core to the tactical field. Our tactical cyber security solutions protect data in:

  • Harsh environments
  • Bandwidth-limited or disconnected environments
  • Overrun or hostile scenarios
  • SWaP-constrained environments
 

Cipher Summit 2019 Replay

Check out the on demand videos and presentations from the event. Download Now

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept