Skip Navigation

Part 6 of this video series based on a recent Thales TCT webinar discusses Zero Trust.

Implementing a zero trust approach to data security is one of the best ways for agencies to protect their data. Agencies must act under the assumption that their networks have already been compromised. A good plan starts with taking a data-centric approach to security. This means focusing on what needs to be protected—the files containing sensitive information—and applying the appropriate form of protection no matter where the data happens to reside. To be effective, this must happen automatically; sensitive information should be identified as soon as it enters an organization’s IT ecosystem and should be secured with policy-based protection that lasts throughout the data lifecycle.

 

Part 5 of this video series based on a recent Thales TCT webinar discusses how to secure cloud deployments.

Government agencies should focus on implementing solutions that can simplify the data security landscape and reduce complexity across multiple clouds and legacy environments, as well as modern, cloud-based digital transformation technologies. Agencies should consider data security solutions that enable protection of data moving between clouds and out of the cloud to on-premises environments and should leverage centralized security solutions that orchestrate data security across multiple cloud platforms.

 

Protecting network transmitted data against cyber-attacks and data breaches is imperative. High-assurance network encryption features secure, dedicated encryption devices that protect data in transit. In order to be truly high assurance, these devices must use embedded, zero-touch encryption key management; provide end-to-end, authenticated encryption and use standards-based algorithms.

Part 4 of this video series based on a recent Thales TCT webinar discusses data in transit encryption. Thales TCT offers network encryption solutions that provide a single platform to encrypt everywhere— from network traffic between data centers and the headquarters to backup and disaster recovery sites, whether on premises or in the cloud. Rigorously tested and certified, our network encryption solutions have been vetted by such organizations as the Defense Information Systems Agency (DoDIN APL) and NATO. Only through Thales TCT’s high-assurance network data encryption can you be assured your data is rendered useless in unauthorized hands and that it will remain secure beyond the data’s useful life.

 

Part 3 of this video series, based on a recent Thales TCT webinar, discusses Section 3.d of the Executive Order which requires the implementation of encryption for data at rest. Data at rest encryption with privileged user access controls significantly improves security posture and not only protects data at rest, but also encrypted workloads in the cloud. Role-based access policies enable a zero trust architecture by controlling who, what, where, when and how data can be accessed. Granular access controls enable administrative users to perform their duties while restricting access to encrypted data.

Thales TCT offers data at rest encryption solutions that deliver granular encryption and role-based access control for structured and unstructured data residing in file servers, databases, applications, and storage containers. With centralized key management and a hardened root of trust with a full U.S. supply chain, agencies can ensure their master keys are protected and data remains secure.

 

The White House issued an Executive Order on improving the Nation's Cybersecurity on May 12, 2021. The Executive Order gives agencies 180 days to "adopt multi-factor authentication and encryption for data at rest and in transit". Thales TCT, a U.S. based provider of government high-assurance data security solutions, offers multi-factor authentication, data at rest encryption, and data in transit encryption solutions that address the requirements outlined in the Executive Order.

Part 1 of this video series based on a recent Thales TCT webinar discusses the U.S. Federal cybersecurity landscape and provides a primer on the EO.

 

Part 2 of this video series based on a recent Thales TCT webinar discusses section 3.d of the Executive Order which requires the implementation of multi-factor authentication. Multi-factor authentication ensures that a user is who they claim to be. The more factors used to determine a person’s identity, the greater the trust of authenticity. Because multi-factor authentication requires multiple means of identification at login, it is widely recognized as the most secure method for authenticating access to data and applications.

Thales TCT offers the broadest range of authentication methods and form factors. Our solutions address numerous use cases, assurance levels, and threat vectors with unified, centrally managed policies—managed from a central platform delivered in the cloud or on-premises.

 

Video published by Thales CPandL

 

Video published by Thales CPL

Video provided by Thales CP&L

Video provided by Thales CP&L

In this video, Jermaine from Thales TCT demonstrates protecting AWS S3 buckets with AWS KMS vs Transparent Encryption Cloud Object Storage S3 from Thales.

 

In this video, D'Nan from Thales TCT demonstrates how to integrate MarkLogic with KeySecure for Government for data-at-rest encryption.

 

D'Nan from Thales TCT demonstrates how to integrate Thales TCT's Luna Credential System with UiPath to provide hardware-protected PKI credentials for the software robots in UiPath's enterprise RPA solution.

 

Traditional multi-factor authentication introduces roadblocks to technologies like Robotic Process Automation (RPA). The OMB Memo M-19-17 outlines a policy that requires management of digital identities of non-person entities such as software robots. This means that all software robots are required to have individual digital identities and credentials that are managed in the same fashion as traditional user identities. Although software robots cannot be issued a physical token, they can utilize multi-factor login capabilities through the use of a centralized, hardware security module-based authentication system. This video demonstrates how Thales TCT’s Luna Credential System integrates with UiPath’s RPA platform to provide hardware-protected PKI credentials for software robots.

 

The Luna Credential System (LCS) introduces a new, patent pending,  approach to multi-factor authentication by maintaining user credentials in a centralized hardware device that is securely accessible by endpoints in a distributed network. Download our video to learn more about LCS.

 

Rob from Thales TCT demonstrates how to configure Apache web server to use Thales TCT's Luna Network HSM to protect the private key for the certificate used by the web server.

 

True data protection extends beyond the core. Agencies need to apply the same level of protection deployed at the core to the cloud and to remote or disconnected environments in the field.

Thales Trusted Cyber Technologies serves as a trusted, U.S. based source for cyber security solutions. We offer a broad selection of security solutions that secure, manage, distribute, and control access to your data and cryptographic keys.

 

Jane from Thales TCT demonstrated how to integrate HPE ESL G3 Tape Library with Thales TCT's KeySecure for Government KMIP compliant key manager.

 

Jane from Thales TCT demonstrates how to integrate Red Hat Certificate Authority, part of the Red Hat Certificate System 9.4, with Thales TCT's Luna Network HSM.

 

Thales TCT's CTO, Brent Hansen, shares his insight into taking a data-centric approach to security to enhance an agency's overall security posture and address CDM compliance requirements in his presentation at FCW's CDM Summit. Brent breaks down his decision tree methodology to help agencies validate the points of weakness and the tools available to achieve not only compliance but to provide the highest-level security posture.

 

Learn how to integrate HPE MSL3040 with KeySecure for Government.

 

Learn how to integrateHPE Primera Storage Platform Library with KeySecure for Government.

 

Learn how to integrate HPE StoreEver MSL G3 Series Tape Library with KeySecure for Government.

 

Learn how to integrate KeySecure for Government with a Rubrik cluster.

 

Learn how to integrate Thales TCT’s KeySecure for Government with VMware vSphere.

 

Learn how to integrate Thales TCT’s Luna SA HSM for Government with ISC CertAgent.

 

Learn how to integrate Thales TCTs Luna SA HSM for Government with Axway VA validation authority.

 

Learn how to configure a Luna Client to work with a Luna SA HSM for Government appliance.

 

Learn how to integrate HPE iLO with KeySecure for Government in this video. It provides a quick walk through of the KeySecure for Government and HPE iLO integration. The elements that need to be configured on KeySecure outlined, and how to configure remote key managers on iLO is shown. The video concludes when iLO and KeySecure are successfully communicating.

 

Learn how to integrate SafeNet AT's Luna SA for Government HSM with PrimeKey's CA, EJBCA.

 

Learn how how to use the HSM to create a column master key used to encrypt column encryption keys used by SQL. This will ensure that information entered by the client side is encrypted before it's sent to the SQL database on the SQL server. This means that the client will be able to see decrypted information but on SQLserver, the database adminstrator and anyone who has assess to that server will only see encrypted information.

 

Learn how how to integrate Microsoft Active Directory Certificate Services with Thales TCT's Luna SA for Government HSM.

 

Learn how to integrate Venafi Trust Protection Platform with  Luna SA for Government HSM.

 

Learn how to integrate a Cohesit cluster with  KeySecure for Government. KeySecure for Government generates and securely stores the Key Encrypting Keys (KEKs) used to encrypt each storage domain in the cluster.

 

Learn how to integrate Microsoft Azure Bring Your Own Key with  Luna SA for Government HSM. Using this feature, users will be able to generate their own key, store and mange their key themselves, and import it to Azure for use in other services.

 

Learn how to integrate Microsoft ISS with Luna SA HSM for Government.

 

Learn how to manage AWS CMKs with KeySecure for Government.

 

Learn how to integrate AppViewX with Luna SA HSM for Government.

 

Kirk Spring, President of Thales TCT, addresses the security challenges that federal agencies face when moving sensitive data to the cloud. He shares his insight into how data owners can ensure that their data is secure in any cloud environment by controlling their encryption and owning their encryption keys.

 

Kirk Spring, President and Board Member, Thales TCT, shares his insight with SIGNAL Media Editor in Chief Bob Ackerman about the hybrid cloud.

 

Learn how to integrate Luna SA for Government with Entrust Authority Security Manager.

 

Learn the steps necessary for creating a KMIP server on KeySecure for Government.

 

In today’s environment it is essential to know the origin of not only the finished product but the components that make up that product whether it be a piece of hardware or a software component. Watch our video to learn more.

 

Securing data properly requires that customers own—and can prove that they own—their data, from inception to deletion. That means that customers—not their cloud provider—must own their encryption and encryption keys. Watch our video to learn more.

 

Bill from SafeNet AT brings life to our products and demonstrates how they can be used in a widespread theoretical environment.

 

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept