Hi [[ session.user.profile.firstName ]]

Thales e-Security

  • Date
  • Rating
  • Views
  • 2017 Data Threats – The Big Disconnect 2017 Data Threats – The Big Disconnect Andy Kicklighter, Director - Product Strategy, Thales e-Security Recorded: Feb 8 2017 53 mins
    Spending on IT security to protect data is up - sharply in some sectors – yet successful data breaches are also up significantly. Clearly, there’s still a big disconnect.

    In this webinar Andy Kicklighter with Thales e-Security, and four time prime mover behind the Thales Data Threat Report, reviews the detailed findings of the report.

    The 2017 Data Threat Report – Global Edition will be showcased with an emphasis about the data threats that enterprises are experiencing, what they are doing to secure their data and actionable recommendations that can be used today to secure their sensitive data from data threats.

    • IT Security spending is increasing at 73% of enterprises driven by compliance and data security concerns
    • Data breaches at enterprises are also up - with 68% of enterprises experiencing a breach, 26% in the last year
    • What’s behind the big disconnect? And what should you be doing?
  • Secure Web Application Delivery with Real Time Analytics Secure Web Application Delivery with Real Time Analytics Asha Kalyur, Citrix and Juan Asenjo, Thales e-security Recorded: Dec 6 2016 63 mins
    View our webinar with Citrix to learn how to build an end-to-end network architecture that enables you to secure web applications with robust security
  • Is Your PKI Future-Proofed? Is Your PKI Future-Proofed? Larry Ponemon, Chairman & Founder Ponemon Institute, and John Grimm, Senior Director of Security Strategy, Thales e-Security Recorded: Oct 12 2016 60 mins
    Enterprises are dealing with a new and evolving set of challenges and requirements that are driving changes to their core public key infrastructure (PKI). The number of applications that depend on certificate issuance services is increasing dramatically, and ranges from basic SSL and user/device authentication to cloud services and now to the Internet of Things (IoT). So, what are enterprises doing to meet these new challenges?

    Join Larry Ponemon, Chairman & Founder of the Ponemon Institute, and John Grimm, Senior Director of Security Strategy at Thales e-Security, for an overview of the top findings of the 2016 Global PKI Trends Study, including:
    •PKI best practices that enterprises are adopting
    •The latest trends in PKI deployment – from internal to managed to the cloud and more
    •How hardware security modules (HSMs) are being used to improve the trust and assurance level of mission-critical PKIs
  • Protecting Application Delivery without Network Security Blind Spots Protecting Application Delivery without Network Security Blind Spots Don Laursen, Sr. Product Manager, F5 & Juan Asenjo, Sr. Partner Manager, Thales e-Security Recorded: Jul 21 2016 55 mins
    SSL/TLS is extensively used to protect web traffic, but the technology can also be exploited to create security blind spots. SSL/TLS encrypted tunnels can be used to hide malicious codes and other threats from network security and performance monitoring tools. To prevent possible malware propagation across networks requires decrypt/encrypt capabilities that enable careful traffic monitoring and inspection.
    Join Don Laursen, Sr. Product Manager from F5 and Juan Asenjo, Sr. Partner Manager at Thales e-Security, to learn how a security architecture using application delivery controllers (ADCs) and hardware security modules (HSMs) can ensure you can optimizes web services with traffic inspection, while safeguarding and managing the critical cryptographic keys that underpin security.
  • 2016 Encryption Application Trends 2016 Encryption Application Trends Larry Ponemon, Chairman & Founder, the Ponemon Institute & John Grimm, Sr. Director of Security Strategy, Thales e-Security Recorded: Jul 20 2016 61 mins
    Encryption is an increasingly important and prevalent technique to keep data safe. But where should you use it, what are the pitfalls, and how can you ensure you get maximum impact for your investment?

    Join Larry Ponemon, Chairman & Founder of the Ponemon Institute, and John Grimm, Senior Director of Security Strategy at Thales e-Security, for an overview of the top findings in this latest study focused on applications that use encryption, including:
    •A ranked list of what applications encryption is most often deployed with, including vertical industry-level and country-level data splits
    •What features of encryption solutions that users find the most valuable and effective in combatting the challenges associated with increased encryption usage
    •How trends such as cloud computing, big data and the IoT are affecting data protection plans.
  • 2016 Encryption Application Trends 2016 Encryption Application Trends Larry Ponemon, Chairman & Founder - Ponemon Institute and John Grimm, Senior Director of Security Strategy, Thales e-Security Recorded: Jul 20 2016 62 mins
    Encryption is an increasingly important and prevalent technique to keep data safe. But where should you use it, what are the pitfalls, and how can you ensure you get maximum impact for your investment?

    Join Larry Ponemon, Chairman & Founder of the Ponemon Institute, and John Grimm, Senior Director of Security Strategy at Thales e-Security, for an overview of the top findings in this latest study focused on applications that use encryption, including:
    •A ranked list of what applications encryption is most often deployed with, including vertical industry-level and country-level data splits
    •What features of encryption solutions that users find the most valuable and effective in combatting the challenges associated with increased encryption usage
    •How trends such as cloud computing, big data and the IoT are affecting data protection plans.
  • Scalability & Security – Will we always be playing catch-up? Scalability & Security – Will we always be playing catch-up? Michael Rothschild - Vormetric & Rohit Goyal - Nutanix Recorded: Jun 9 2016 42 mins
    With more organizations operating anywhere and everywhere, the question plaguing both business and IT titles alike is, how do I scale my infrastructure AND my security to keep up with the demands of my business. A more heterogeneous user base in more locations using more cloud based applications – both public and private - and transferring huge amounts of data. Is it even possible to ensure always-on capabilities while also being secure?
    Join us for this exciting webcast where we will talk about the security and scalability challenges that organizations face as well as the enterprise cloud concept – the new approach many organizations are turning to in order to ensure secure “any-to-any service”. Any app, anywhere, anytime, always secured.
  • Cloud Based Payments: the future of Mobile Payments? Cloud Based Payments: the future of Mobile Payments? Simon Keates, Business Development Manager, Thales e-Security & Rob MacMillan, VP Marketing – Digital Payments, Proxama Recorded: May 19 2016 46 mins
    In this webcast Simon Keates, Business Development Manager, Thales and Rob Macmillan, VP Marketing, Proxama will present and discuss the history, scope and current status of mobile payments based on Cloud Based Payment (CBP) and Host Card Emulation (HCE) technology. Since HCE first became available in Android handsets, card issuers have been using it to deliver mobile payment solutions to the customers. With scheme specifications and the arrival of tokenisation there has been an increasing rate of adoption. Now, with an increasing number of payment options becoming available from the 'X-Pays' and a growing convergence between on-line, in-store and in-app transactions, what is the future for CBP?
  • Innovation and security in the digital payments world Innovation and security in the digital payments world Ian Hermon, Payment Security Product Marketing Mgr. & Jose Diaz, Director, Payment Strategy Recorded: Apr 20 2016 59 mins
    Digital commerce is growing rapidly with new ways to make payments more streamlined (e.g., in-app payments). The drive towards improving the overall purchasing experience and ‘frictionless payments’ is forcing new security and trust models to evolve to meet new challenges and threats. Cards are no longer adequate to fulfill the continuing evolution of new purchasing methods. New trust models are necessary to secure transactions when the consumer uses an off-the-shelf PC browser, tablet application, mobile phone app, or wearable to initiate a purchase and resulting payment.


    Please join Ian Hermon and Jose Diaz from Thales e-Security for a webinar to learn more about the latest innovative payment trends as well as the demand for security and trust behind the scenes

    •Hear about the latest trends in digital commerce and payment methods
    •Gain a better understanding of the security behind the diverse solutions
    •Learn about EMVCo plans for improving the 3D Secure user experience while making it easier for merchant adoption
    •Benefit from the sharing of use cases to help determine the best approach for your business
  • Innovation and security in the digital payments world Innovation and security in the digital payments world Ian Hermon, Payment Security Product Marketing Mgr. & Jose Diaz, Director, Payment Strategy Recorded: Apr 20 2016 59 mins
    Digital commerce is growing rapidly with new ways to make payments more streamlined (e.g., in-app payments). The drive towards improving the overall purchasing experience and ‘frictionless payments’ is forcing new security and trust models to evolve to meet new challenges and threats. Cards are no longer adequate to fulfill the continuing evolution of new purchasing methods. New trust models are necessary to secure transactions when the consumer uses an off-the-shelf PC browser, tablet application, mobile phone app, or wearable to initiate a purchase and resulting payment.

    Please join Ian Hermon and Jose Diaz from Thales e-Security for a webinar to learn more about the latest innovative payment trends as well as the demand for security and trust behind the scenes.


    • Hear about the latest trends in digital commerce and payment methods
    • Gain a better understanding of the security behind the diverse solutions
    • Learn about EMVCo plans for improving the 3D Secure user experience while making it easier for merchant adoption
    • Benefit from the sharing of use cases to help determine the best approach for your business

Embed in website or blog