Hi [[ session.user.profile.firstName ]]

Thales eSecurity

  • Date
  • Rating
  • Views
  • Proactive Data Defence for Digital Transformation
    Proactive Data Defence for Digital Transformation
    Brett Bourke Abela, Senior Sales Engineer, UK, Thales eSecurity Recorded: Nov 22 2018 32 mins
    In the third of our #CoffeeBreak webcasts, Chris Ogilvie interviews Brett Abela, Thales eSecurity Sales Consultant on proactive data defence for digital transformation.

    Digital transformation is business enhancing but fraught with danger. With services moving into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, with more and more of your corporate attack surface being exposed.

    The rise of cloud and the Internet of Things (IoT), has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    Join Chris and Brett for the third “coffee break” webcast when they will discuss:
    a) Key security considerations for a digital transformation strategy
    b) Why a proactive data defence strategy is crucial
    c) The benefits of maximising the level of control over data irrespective of where it is created, stored or shared.
    d) How can enterprises regain control of their data security?
  • Trust and responsibility throughout your software distribution chain
    Trust and responsibility throughout your software distribution chain
    Juan Asenjo, Senior Manager for Solutions Marketing, Thales eSecurity & Tomas Gustavsson CTO, PrimeKey Recorded: Nov 14 2018 56 mins
    Harmful code is today a real threat to users and organizations alike. Criminal groups and even governments increasingly use malicious software to steal, manipulate, and monitor data, to export money, or empty bank accounts. An efficient way to prevent this, to protect your intellectual property, and brand equity is through code signing. That is why the solution today has the attention of the business owner and developer community worldwide. However, code signing requires not only signing keys to be robust, but also to be stored securely. With the use of a hardware security module (HSM), you can manage the risk of having critical code signing keys stolen and your security compromised. In this webinar, PrimeKey a leading provider of PKI and signing solutions, together with Thales eSecurity, a leader in HSM technology, will take you through the world of safe code through proper code signing.

    Join this webinar to learn how to:

    • Achieve trusted and secure software distribution using PKI and HSMs
    • Take advantages of server-side signing with central key management
    • Support multiple code signing needs, drivers, firmware, and formats
    (Microsoft, JAR, P#1, P#7, CMS etc.), in one single installation
    • Integrate with existing build and distribution processes for automation
    • Deploy best practices for code signing solutions and improve security
  • Is Your Retail Data at Risk?
    Is Your Retail Data at Risk?
    Tina Stewart, VP of Mktg, Andy Kicklighter, Dr. of Product Mktg, Vikram Ramesh, Sr Dr. of Slns & Ptnr Mktg, Thales eSecurity Recorded: Nov 6 2018 47 mins
    The retail industry, already at intersection of online with brick-and-mortar, is one of the most heavily targeted for cyber-attacks, and encountering record levels of data breaches as a result. With digital transformation an imperative, dealing with concerns over data breaches has become every retailer’s new reality. Research shows 99% of the industry uses digital transformation technologies with sensitive data – Cloud, Big Data, Mobile Payments, IoT, Blockchain and Containers.
    The 2018 Data Threat Report for retail sponsored by Thales explores the depths of these problems, enterprise plans for combating them, and best practice data security recommendations.

    - How does your company compare to the benchmarks in 451 Research’s findings?
    - How do you recognize, track and report data breaches?
    - How do all the existing and new regulations impact your data security strategies? (e.g., CCPA, Vermont Data Broker Law, GDPR, etc.)
    - What are best practices when it comes to protecting and securing your sensitive data? Are they enough?
  • Secure Data Gathering and Analytics: PKI Solutions with Hardware Root of Trust
    Secure Data Gathering and Analytics: PKI Solutions with Hardware Root of Trust
    Juan Asenjo, Sr. Mgr. for Solutions Mktg, Thales eSecurity & Julie Lassabliere, Digital Mktg and Communication PM, Safelayer Recorded: Nov 6 2018 59 mins
    Organizations today gather unprecedented amounts of data from their operations to create new opportunities and to customized marketing, business, and services for their users and customers. Every transactions and exchange within the enterprise is creating more data that when analyzed, can produce valuable insight. Whether the data comes from a person or from a connected device such as a sensor, data collected is becoming essential for decision-making. Therefore, protecting the integrity of connected devices collecting this data is critical to ensure the trustworthiness of the system. Public key infrastructures (PKIs) provide the framework to secure the identity of devices to ensure integrity and confidentiality of data collected and exchanged. Using asymmetric cryptography, PKIs sign all certificates used to identify devices collecting data. Protecting the signing keys used for this purpose is essential to ensure a root of trust. In this webinar, we will examine how PKI-based solution provide a mechanism for secure identification, so you can trust your devices and the data they collect. The session will explain how hardware security modules (HSMs) help establish a root of trust, and provide examples and use cases.

    Join the webinar to learn how you can use connected devices with a PKI and an HSM to:

    • Improve your data gathering capabilities
    • Protect the integrity of your critical data
    • Defend organization from data breaches
    • Secure all analytics and decision making
  • PKI 2018: The IoT and other drivers of next-generation PKI
    PKI 2018: The IoT and other drivers of next-generation PKI
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute and John Grimm, Sr. Dir of IoT Security Strategy, Thales eSecurity Recorded: Oct 24 2018 60 mins
    In recent years, cloud applications and the Internet of Things (IoT) have become the latest disruptors to future PKI planning. This 2018 study, conducted by the Ponemon Institute and sponsored by Thales eSecurity, reveals trends in PKI usage and deployment, security controls, and challenges. Those trends clearly indicate that organizations must not only tend to the ever-changing digital certificate needs of today, but must also simultaneously prepare for the future -- a future with never-before-seen diversity and scale.

    Join this webcast to learn about the top findings of this research, including:

    • The increasing influence of the IoT in PKI planning
    • The increasing security maturity of enterprise PKIs including the use of Hardware Security Modules (HSMs)
    • Identification of enterprise applications that most commonly depend on PKI credentials
    • The most important PKI capabilities for IoT deployments, and projected rates of digital certificate usage by IoT devices
  • Ensuring Data Security in Hybrid and Multi-Cloud Environments
    Ensuring Data Security in Hybrid and Multi-Cloud Environments
    Simon Keates, Business Development Manager, Thales eSecurity Recorded: Oct 18 2018 41 mins
    Chris Ogilvie interviews Simon Keates, Thales eSecurity Business Development Manager, EMEA on “cloud” - the biggest growth area of technology investment this year.

    Companies are increasingly reliant upon multi-cloud or hybrid cloud to meet specific workload and needs. However, these multi-faceted environments come with advanced threats in the form of security gaps which exploits individuals and organisations. In addition, embracing cloud environments brings challenges around data control, complex security policies and compliance reporting.

    Join Chris and Simon for the second in our series of “coffee break” webcasts when they will discuss:

    a) How can enterprises reduce security gaps in the cloud without affecting their business efficiency?
    b) How are organisations maintaining effective security whilst adopting new digital technologies to improve agility, customer engagement and support business growth?
    c) How does BYOE (Bring Your Own Encryption) alleviate the core issues of security, control and compliance and can it be applied to the common public cloud environments cost-effectively?
    d) How can enterprises regain control of their data security?
  • Thales + Palo Alto: Protecting the Interconnected Organization
    Thales + Palo Alto: Protecting the Interconnected Organization
    Mark Royle, Sr. Manager, Solution & Partner Mktg, Thales eSecurity & Vik Davar, Dir,Technical Bus. Dev., Palo Alto Networks Recorded: Oct 9 2018 31 mins
    Organizations today are increasingly interconnected and depend on this interconnectivity and the cloud to conduct business. While this concept of the interconnected enterprise has taken off and improved business acceleration and agility, it has also surfaced increased exposure to data security risks. To alleviate these risks, Palo Alto Networks and Thales eSecurity help enforce security policies that underpin critical components of an enterprise’s network security system, protecting the root of trust of their entire network security system. In this webinar, we will examine the key elements of the joint solution as well as what may be the best options for your organization.

    • Understand next generation firewalls and hardware security modules
    • Learn the critical role and features of best-in-class key management
    • Learn best practices for data security
  • Enabling trusted identities for the Internet of Things
    Enabling trusted identities for the Internet of Things
    Juan Asenjo, Sr. Mgr. for Solutions and Partner Mktg at Thales eSecurity & Daniel Hjort, Dr. of Smart ID Mgmt.at Nexus Group Recorded: Oct 9 2018 61 mins
    With billions of things connecting to the Internet, addressing security, privacy, and safety are becoming significant challenges. Enterprises deploying Internet of Things (IoT) technologies need strong security that is easy to implement, seamless to use, cost-effective, flexible, and scalable. The foundation to establish trust and reliable security for IoT is to use standards-based PKI certificates with the right communication protocols.

    This webcast will examine the challenges that industry faces to ensure safe adoption of IoT technologies, from device manufacturing, to deployment and operation. Join Thales and Nexus to learn how IoT PKI:

    • Controls device identity, from manufacturing bootstrap to lifecycle management
    • Delivers protected operations based on strong authentication and encryption
    • Manages full range of devices from battery-powered sensors to self-driving cars
    • Secure logs and reports to facilitate compliance with data security regulations
    • Establishes a certified root of trust for the security of the entire ecosystem
  • Nutanix and Thales, Hyerconverged & Hypersecure
    Nutanix and Thales, Hyerconverged & Hypersecure
    Stephen O’Connor, Sr. Sales Engineer & Mike Wronski, Principal Product Marketing Manager, Nutanix Recorded: Sep 26 2018 46 mins
    The rapid adoption of hyperconverged infrastructure (HCI) solutions have been due to their proven ability to deliver scalability, agility, reduced costs, storage redundancy, and reliability. While these are great benefits, perhaps one of the elements that is garnering the most attention right now is data security. Nutanix certainly knows this and is working hard with Thales eSecurity to protect the confidentiality and integrity of sensitive data through strong encryption of user and application data. When used with Vormetric Data Security Manager (DSM), the combined solution provides FIPS certified robust key management and role separation to meet the most stringent security requirements.

    In this webinar, we will examine the key elements of the joint solution as well as what may be the best options for your organization.

    • Understand the types of encryption and their characteristics
    • Understand the critical role of best-in-class key management
    • Learn how to go beyond the encryption basics
  • Making PKI the foundation of your digital transformation
    Making PKI the foundation of your digital transformation
    Simon Keates, Business Development Manager, EMEA. Recorded: Sep 20 2018 48 mins
    Chris Ogilvie interviews Simon Keates, Thales eSecurity Business Development Manager, EMEA on one of the hottest security topics in 2018.

    PKI offers organisations the flexibility to create security models, however defining, maintaining and securing PKI is a major risk to enterprises. Key theft, weak controls on keys, and impact on business agility as new applications are on-boarded without due care, are some of the challenges faced by enterprises.

    Join Chris and Simon for the first in our series of “coffee break” webcasts when they will discuss:
    a) The current PKI market, the growth in EMEA and the challenges facing organisations
    b) How enterprises are using PKI to enhance their security posture
    c) How Thales eSecurity is integrating with market leading PKI technology partners to offer a holistic solution for the enterprise

Embed in website or blog