Skip Navigation

This white paper looks back at the evolution of encryption and key management systems, and examines the key challenges faced by IT teams around encryption systems, including regulation and compliance, complexity, lack of proper management tools. This is followed by a review of the recent industry initiatives and compliance regulations that are shaping the future of key management.

Download Now

The CipherTrust Data Security Platform from Thales integrates data discovery, classification, and industry-leading data protection solutions across diverse IT environments to provide adaptive data-centric security. The platform provides powerful tools to combat external threats, guard against insider abuse, and establish persistent controls, even when data is stored in the cloud or any external provider’s infrastructure and supports an evolving regulatory landscape. CipherTrust Data Security Platform is available for sale to the U.S. Federal Government exclusively through Thales Trusted Cyber Technologies.

This white paper provides an overview of the deployment architecture of the CipherTrust Platform products and the compelling use-cases that they enable for customers along their data protection journey.

Download Now

This white paper offers a look at the KMIP standard, and it shows how Thales solutions help you maximize the advantages of this standard.

Download Now

Traditionally organizations have focused IT security primarily on perimeter defense, building walls to block external threats from entering the network. While this is still important, it is not enough. Cybercriminals regularly breach perimeter defenses and data frequently lives outside those defenses in the cloud elsewhere, so organizations need to apply a data-centric security strategy that protects data wherever it is. With today’s proliferation of data, evolving global and regional privacy regulations, growth of cloud adoption, and advanced persistent threats, data-centric security enables organizations to be in control of their data regardless of location while rendering it unreadable to data thieves. But, to be effective, this protection must happen automatically without relying on user intervention. This white paper outlines the challenges of data security in this age of data proliferation. It also provides strategies to discover and classify your critical data and apply data-centric security to it.

This white paper outlines the challenges of data security in this age of data proliferation. It also provides strategies to discover and classify your critical data and apply data-centric security to it.

Download Now

Thales TCT assists Department of Defense (DoD) customers in compliance with Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) in order to maintain Authority to Operate (ATO) on the DoDIN. Recent updates to the Windows Server 2019 Security Technical Implementation Guide will require customers in a VMware environment to implement an External Key Manager. To learn more, download our solution brief.

Download Now

The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 provides guidance for the selection of security and privacy controls for federal information systems and organizations. Published by the National Institute of Standard and Technology, the publication details items from the Risk Management Framework that address security controls required to meet requirements in the Federal Information Processing Standard (FIPS) 200. Revision 4 is the most comprehensive update since the initial publication. Revision 4 was motivated principally by the expanding threat space and increasing sophistication of cyber-attacks. Major changes include new security controls and control enhancements to address advanced persistent threats (APTs), insider threats, and system assurance; as well as additions to address technology trends such as mobile and cloud computing. Critical to certification for meeting FIPS, is the implementation of security controls from NIST 800-53, Appendix F. Focusing on the capabilities needed to meet these requirements, this paper provides background about Thales Trusted Cyber Technologies’s (TCT) Data Security Platform and the Transparent Encryption product that is delivered through that platform. It further details a mapping of the Thales TCT product line’s capabilities against these NIST security controls, first with an initial summary for each Family Area (in the form of a table), and then with expanded details of how these controls are delivered.

Download Now

According to the 2020 Thales Data Threat Report – Federal Government Edition, government is ahead of business with cloud adoption, but cybersecurity remains a challenge. Ahead of global organizations, U.S. federal government agencies have more than half (54%) of their data already stored in the cloud. The report also shows digital transformation (DX) is well underway with 68% of U.S. federal government agencies embedding digital capabilities in the enterprise and aggressively disrupting the services they provide, but this adds to security complexity and creates potential vulnerabilities.

Download Now

The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense’s (DoD) newest verification mechanism designed to ensure that cybersecurity controls and processes adequately protect Controlled Unclassified Information (CUI) that resides on Defense Industrial Base (DIB) systems and networks. 

With an extensive data security portfolio and compliance mapping methodology, Thales TCT is a key partner in helping organizations achieve CMMC requirements and cybersecurity maturity levels. Our solutions provide a platform for the implementation of cybersecurity controls and institutionalization of cybersecurity practices and processes.

Thales TCT’s data security portfolio consists of data protection solutions that share a common, extensible implementation infrastructure for delivering data-at-rest encryption, enterprise key management, network encryption, authentication, access control, and security intelligence across an organization’s infrastructure. 
 

Download Now

Encrypting PHI wherever possible and reasonable can be one of the most effective approaches for fine tuning your HIPAA compliance efforts. The essence of HIPAA Security Rule compliance is finding and implementing the most reasonable process or control to minimize risks that have been identified and prevent breaches.

Download Now

Once data is encrypted, the only way to gain access is by decrypting or unlocking secret content using the key. Haphazardly protecting these keys negates the entire process of encryption and creates a false sense of security. This white paper outlines best practices for deploying an effective cryptographic key managment strategy.

Download Now

The term Root of Trust (RoT) is commonly used in information security circles, but what does it mean? Why do we care? How does it apply to cryptographic controls? Modern computer systems are incredibly powerful and flexible. They can be molded to accomplish things that were unimaginable a mere decade ago. This same property makes them almost impossible to control and all too easy for malicious actors to find ways to disrupt them. To counter these threats, security experts have resorted to a wide range of cryptographic tools, and for these tools to function they need a trust worthy beginning.

Download Now

The Luna SA for Government uses a comprehensive three-layer authentication and access control model to achieve extremely strong security between the host application processes and the Luna SA for Government’s HSM partitions.This three-layer authentication and access control model was designed to allow the Luna SA for Government to offer network connectivity to clients without sacrificing the security requirements of HSM operations.

Download Now

For agency leaders and IT administrators responsible for data security—from the most basic statistics to highly sensitive documents—understanding the role of encryption and the management of encryption keys is vital to keeping confidential data just that—confidential. And, for organizations that entrust their data to cloud storage, it is essential that they understand the options available for safeguarding this protected data—even if it’s being managed in the cloud by a third-party vendor. This white paper discusses the importance of data encryption, the vulnerabilities of third-party encryption, the necessity of encryption key ownership, and how all of it affects the security of your organization’s data stored in the cloud.

Download Now

Everyone wants their eyes on the data to reduce costs, improve efficiency, develop new products, optimize offerings, and to make smarter, data-driven decisions. To meet these demands, data will need be produced in more places, stored in more places, processed in more places, and ultimately, shared and distributed to more places. As an IT professional, this isn’t new news. You’re living it – and it’s quite the data protection dilemma. The thought of sharing your organization’s sensitive data outside of your brick and mortar location (and outside of your watchful eye) is a growing concern. So how do you find a way to balance critical business needs and requirements, while protecting your data from malicious threats?

Download Now

This White Paper describes the comparative security and performance benefits of Ethernet WAN data security solutions. We compare the benefits of SafeNet Layer 2 high speed encryption hardware with integrated encryption using MACsec or TrustSec.

Download Now

So, you need to encrypt your sensitive data? Your data is in high demand, and you know it needs data-centric protection. With so many encryption options available, how do you find the right solution to protect your organization's sensitive data?

Download Now

As the old saying goes, “loose lips sink ships”. For today’s enterprises, it is network metadata doing the talking—and a lot of potentially dangerous entities are listening. This paper looks at the risks that metadata can pose to many organizations, and it reveals how transmission security can be used to create a safeguard against nefarious network traffic analysis.

Download Now

There are several challenges impeding adoption across federal agencies of PIV for privileged user access. Primarily, the time and cost required to migrate to PIV-enabled technologies for privileged user accounts can be unmanageable in the intermediate term. Pursuing technologies that support PIV-enablement of privileged user accounts is an evolutionary process and requires significant investment as systems are updated, replaced, or migrated. In many cases, this isn’t practical for legacy systems. Download this White Paper to learn why authenticators are proven and practical alternative to PIV.

Download Now

Acknowledging that cyber security is a monumental task, CDM has taken a structured approach by defining four phases that enable agencies to fold in different aspects of cyber security over time. The program begins with dashboards at both the federal and the agency/department level. The program then deploys sensors throughout the network infrastructure that address different strategic questions associated with network security.

Download Now

The Cloud First initiative is now a reality—civilian and defense agencies are being asked to default to cloud-based solutions when possible. In order to facilitate the transition to the cloud, the Federal Government has implemented the government-wide Federal Risk and Authorization Management Program (FedRAMP) to provide a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

Download Now

For US law enforcement agencies, complying with the Criminal Justice Information Services Security Policy (CJIS-SP) is an imperative requirement. However, it’s also critical to ensure that the security mechanisms employed don’t in any way impede staff in fulfilling the agencies’ chief charter: fighting crime. This paper examines data-in-transit encryption, which is an important component of CJIS-SP requirements. It offers a number of insights into the approaches that can help organizations address data-in-transit encryption policies most efficiently and effectively—while ensuring that investigators and other users always get reliable, timely access to the information they need to do their jobs.

Download Now

From medical records to insurance forms to prescription services, the healthcare industry has become a networked environment— allowing patient information to be shared and managed by a variety of parties and from a number of endpoints, each with their own level of security for protecting that information. 

Download Now

As healthcare stakeholders and systems become better connected, the volume of healthcare data created, processed, analyzed and stored is greater than ever. The increased use of HD video – either for collaboration or patient monitoring – is also changing the nature and format of healthcare data.

Download Now

While HITECH provides ample incentives for healthcare organizations to employ EHR systems, it also builds on HIPAA to provide more stringent security and privacy rules. Therefore, healthcare organizations that leverage EHR systems must also ensure regulated information is consistently and effectively safeguarded—and do so for as long as that data must be retained, which can be decades in many cases. This paper reveals a key vulnerability that is prevalent in many organizations that have adopted EHR: regulated data held in digital storage systems. The paper also reveals how solutions offered by SafeNet Assured Technologies can help secure this critical area in the healthcare organization’s infrastructure.

Download Now

This Industry Insight highlights three best practices for IT to focus on for data security. Incorporating the cloud into your Big Data strategy requires a more comprehensive approach, and the starting point is to recognize the need for IT to adopt a security posture that is aligned with cloud-based technologies. The following three responses will help set that alignment, after which the direction for your longer path will be clearer.

Download Now

Cipher Summit 2019 Replay

Check out the on demand videos and presentations from the event. Download Now

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept