Browse communities
Browse communities
Presenting a webinar?

Appliance Key Management Advantages for IBM Storage Encryption

Nathan Turajski - Thales e-Security and Gordon Arnold - IBM
How can you be sure you can recover your data, long-term, ensure that keys are protected from theft, and limit access to all but legitimate users? Key management is the foundation to deploying encryption successfully.
During this webinar Thales e-Security and IBM will discuss:
• The importance of key management for effective encryption solutions
• Determining environmental readiness and solution qualifying criteria
• Six critical requirements of a robust key management system
• A best of breed approach: IBM software in a security-hardened appliance

Whether yours is a small enterprise looking for a reliable point solution, or a global organization with a large investment in centralized IT services, this presentation will inform you on how today’s solutions provide the right fit to accelerate adoption and plan for future growth.
Jul 12 2012
39 mins
Appliance Key Management Advantages for IBM Storage Encryption
More from this community:

Application Development

  • Live and recorded (1499)
  • Upcoming (16)
  • Date
  • Rating
  • Views
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Modern performance tools and techniques can dramatically improve the user experience, reduce developer and ops frustration, lead to better utilization of infrastructure and allow you to smartly ship products to market faster.

    Working with many companies across all industries, we recognize the pitfalls and barriers to adopting DevOps. The Rackspace DevOps Automation team works with various tools every day to counteract these pitfalls. Join Product Manager @EricBrinkman as he shows you the technologies our DevOps Automation team uses, provide insight as to why they were chosen, and walk through a customer experience demo.

    This webinar will include:
    •Deploying Magento through UI and pushing code
    •A look into the control panel
    •Demo of New Relic and Chef
    •Simulation of Rackspace customer experience
  • Gartner has predicted 18-20% growth in SaaS market, and expects it to hit US $22.1 billion by the year 2015. They have also measured that SaaS adoption rate has increased many fold in the last few years (almost 71% of enterprises use SaaS solutions).

    SaaS has come a long way from “hype” to “norm”. The key to this change is the confidence that has been built by the cloud/SaaS community by providing enterprise class security. Since, SaaS model of delivery has become a defacto standard of delivering products it’s critical for software providers to ensure that their SaaS product meets the required industry security standards. In this webinar, we will address the security aspects related to architecture, deployment and management of SaaS solutions.

    Key Takeaways:
    • Security considerations in each of the architecture layers
    • Data isolation risks and mitigation plans
    • Overview of CWE/SANS and OWASP Security threats
    • Data retention and termination policies
    • Infrastructure and cloud related security risks and solutions
  • Modern software development practices dominated by component-based engineering and short development cycles have largely been a catalyst for rapid advancements in technology. These practices, however, have also resulted in an epidemic of known vulnerabilities baked into third-party software components of IoT applications and devices. These widespread security flaws, many of which are critical in nature, often remain unnoticed or unaddressed throughout the software or device lifecycle, posing significant risks to the people and organizations that rely on them.

    As software continues to permeate the ever-expanding Internet of Things, software vulnerabilities represent a greater and greater threat. IoT devices, like traditional computers, run on software that is susceptible to malicious attacks. As more devices become connected, understanding how to identify and manage security vulnerabilities within widely used third-party software components is critical for all stakeholders, including manufacturers and end-users.

    In this webinar, our diverse panel of security experts will:
    •Propose an expanded definition and understanding of IoT and the stakeholders at risk
    •Present research highlighting the pervasiveness of vulnerabilities in third-party software components of IoT devices
    •Draw some conclusions about the state of software security in IoT today
    •Discuss some simple approaches to addressing these problems
  • The Identity and Access Market (IAM) is undergoing exciting changes. Increased cloud adoption, cyber-threats and the speedy adoption of mobile computing is affecting how enterprises approach access security and authentication.

    Getting insight into these trends can help you prepare your organization for better and more effective Identity and Access policies during the coming year.

    Join us on for a webinar on “IAM and Authentication Trends in 2015”, on March 24, 2015, where you can hear all about Identity and Access trends and developments from an industry expert.
  • L’objectif de ce webcast est de présenter comment la technologie permet d’atteindre les objectifs DevOps en éliminant les contraintes et les goulots d'étranglement qui perturbent la production de valeur pour les clients finaux

    Why DevOps is the answer to Digital Transformation
    The objective of this webcast is to show how technology allows to reach the DevOps objectives by eliminating constraints and bottlenecks that disrupt the production of value for end users
  • A lack of manpower and a dearth of resources are often major obstacles for organizations striving to achieve and maintain HIPAA and/or PCI compliance. Compliance guidelines are complex and difficult to decipher, even for the most experienced IT professionals. Recent headlines regarding unprecedented security and compliance breaches are causing companies to examine compliance-as-a-service (CaaS) solutions offered by cloud providers. But with the myriad of options available, it’s difficult for companies to discern which CaaS best fits their needs.

    Join Johan Hybinette, HOSTING Chief Information Security Officer (CISO), as he discusses the benefits and risks associated with CaaS. Drawing upon his 20+ years’ of experience in information security and compliance, Johan will also offer tips for selecting the right CaaS for your business. Bring your questions and leave with the information you need to confidently invest in a CaaS solution.
  • Greater than 80% of today’s breaches occur with application software, yet many companies continue to invest in ‘over the wire’ solutions that are not solving the problem. Runtime Application Self-Protection, or RASP, is an emerging market that promises to protect applications from the inside. Using the rich context of the application’s logic and associated core libraries, RASP identifies attacks in ‘real-time’ and stops them. Implementation is quick and requires no changes to your application’s code. Join us to learn more about what RASP can do for you.

    Learn:
    •Why context from inside the application matters
    •How easy it can be to use native capabilities of Java and .NET to protect your applications
    •Use cases to get you started.

    Help lead your enterprise to a stronger, more effective security program.
  • Security and Scalability in the Hybrid Cloud: How to get one without losing the other

    Traditionally, you had to design for a focus on scalability or security in the cloud, but not both. Now with services that connect virtual and real computers together, you can achieve cloud scale while satisfying the most stringent security requirements. Join Rackspace’s Matt Shover and Joseph Palumbo Thursday, March 19th to learn:

    •Top reasons why people choose the cloud
    •Top reason why people think the cloud isn’t the best fit for them
    •What is scaling?
    •How do you scale?
    •How does the hybrid cloud help scale your application?
    •How does the hybrid cloud help secure your application?
    •So how do you build a hybrid environment?


    About the Speakers

    Matt Shover:
    Matt Shover is the manager of RackConnect Operations at Rackspace, where he leads a passionate team of Rackers that work to seamlessly connect Rackspace's Dedicated and Cloud offerings -- turning customer challenges into awesome outcomes. He holds an MBA in finance from California State University, Hayward and has been a Racker for over eight years.

    Joseph Palumbo:
    As a founding member and architect of both the Rackspace Cloud’s Managed Operations service level and Launch Team, Joseph has spends half his time teaching customers about the cloud and the other half learning from his customers what the cloud can do. When he’s not writing blog posts, recording podcasts or making videos, he can be found discussing innovation with other Rackers and wishing paper documents had a built-in search function.
  • When a leading bank states that “in online mortgage sales, a simple change in the colour of a Website calculator resulted in a 10% increase in sales”, it is a reminder of the significant impact the smallest updates in a digital presence can have. However, DevOps adoption faces a major barrier in the enterprise in overcoming organisational debt – historical decisions that will constrain transformation and quick release cycles.
    This webinar explores:
    •the value of marginal gains made through incremental improvements
    •the pitfalls of marginal losses that can build into significant organisational debt
    •and highlights ways in which DevOps can overcome challenges to make a positive impact
  • Channel
  • Channel profile
  • Applications that go bump in the night Recorded: Mar 12 2015 52 mins
    Richard Moulds, VP of Strategy at Thales e-Security, and Derek Brink, Vice President- Information Technology, Aberdeen Group
    The rise of malware and malicious insiders brings application security into clear focus. Well written software, security testing and code obfuscation mitigate risk but the most critical applications in the most risky locations need to go one step further to become tamper resistant. Trusted applications that handle sensitive data, control valuable IP and perform critical processes can be isolated and protected within secure execution environments. Mobile phones, embedded devices and data center servers all adopt physical hardening to secure the applications they host. This webinar focuses on protecting business applications that support high-tech manufacturing, content distribution, online authentication – in fact any situation where you need to know for sure that your application is doing precisely what the developer intended – nothing more, nothing less.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Nov 20 2014 39 mins
    John Grimm, Sr Director Product Marketing, Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we saw with the Heartbleed OpenSSL vulnerability and more recently with POODLE, encryption is no silver bullet and can’t be taken for granted. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, November 20th, to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • High Assurance Security for Mission Critical Applications Recorded: Oct 22 2014 61 mins
    Chris Glidden, SE Federal Thales - Bob Smith, SE Manager F5 Networks- Brian Jones, VP Federal & Mid Atlantic FishNet Security
    Downtime of critical networked applications can cost your company lost revenue opportunities in the short term, as well as long term negative impact on your brand. Attacks can interrupt the availability of critical applications or compromise sensitive data traversing your network.
    Securing critical applications to ensure availability is imperative.
    Integrating hardware security modules (HSMs) with intelligent network managers allows you to trust that data traveling across your network is encrypted and secure from unauthorized users.
    Join F5 Networks, Thales e-Security and FishNet for a free webcast to learn how to optimize and secure the delivery of critical applications. You’ll learn how F5’s BIG-IP System integrated with Thales’s nShield HSM can:
    •Deliver high performance processing
    •Provide robust security
    •Meet regulatory compliance standards
    •Secure data while improving data center performance
  • Host Card Emulation (HCE): How to take direct control of mobile payments” Recorded: Oct 22 2014 61 mins
    David Worthington, Principle Consultant Payment at Bell ID, Ian Hermon, Product Marketing Manager Payments, Thales e-Security
    This webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved.
  • Protecting Your Sensitive Data Does Not Have to Impact Business Operations Recorded: Sep 17 2014 61 mins
    Juan Asenjo, Senior Product Marketing Manager, Thales e-Security, Mark Bower, VP Product Management , Voltage Security
    Highly publicized software attacks and data breaches, combined with strict regulatory requirements, reinforce the ongoing risks associated with cardholder data at all points in the payment stream. The risks to data are everywhere, and your organization is ultimately responsible for the security of customers’ personally identifiable information (PII). This means you must protected PII not only during transaction processing, but also through business processes such as charge-backs, loyalty or repeat payments, storage and analytics – including outsourced environments.
    Voltage SecureData™ enables you to ensure sensitive data is de-identified while maintaining logical and referential integrity so it can remain in a protected state while still usable for critical business processes. Integration of Voltage SecureData with Thales nShield® hardware security modules (HSMs) provides enhanced safekeeping and management of critical cryptographic keys that underpin the security of the process. Enforced protection of sensitive data using policy driven data security enables you to protect PII across your entire workflow without disrupting operations and ensuring you can adhere to privacy regulations.
  • Host Card Emulation (HCE): How to take direct control of mobile payments Recorded: Sep 16 2014 60 mins
    Ian Hermon, Product Marketing Manager - Thales e-Security, David Worthington, Principal Consultant - Bell ID
    For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availability of compatible mobile phones top the list of potential barriers. The incremental cost to support secure elements as well as companion credit/debit cards made the business case questionable for issuers.

    A recent update to the Android operating system has changed things forever – no longer does an issuer need a secure element in the mobile phone or a third party to provision the application to offer a secure mobile payment solution compatible with all NFC contactless point-of-sale (POS) terminals. A technology known as host card emulation (HCE) enables issuers to take direct control and fast track time to market.

    A webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved, including:
    •An HCE technology overview
    •How the payments are secured
    •Benefits achieved by early adopters
    •Insight into how HCE is likely to evolve

    Please register using the appropriate button below for the time slot suitable to you on Tuesday 16th September 2014. We look forward to your participation and questions.
  • Host Card Emulation (HCE): How to take direct control of mobile payments Recorded: Sep 16 2014 60 mins
    Ian Hermon, Product Marketing Manager - Thales e-Security, David Worthington, Principal Consultant - Bell ID
    For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availability of compatible mobile phones top the list of potential barriers. The incremental cost to support secure elements as well as companion credit/debit cards made the business case questionable for issuers.

    A recent update to the Android operating system has changed things forever – no longer does an issuer need a secure element in the mobile phone or a third party to provision the application to offer a secure mobile payment solution compatible with all NFC contactless point-of-sale (POS) terminals. A technology known as host card emulation (HCE) enables issuers to take direct control and fast track time to market.

    A webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved, including:
    •An HCE technology overview
    •How the payments are secured
    •Benefits achieved by early adopters
    •Insight into how HCE is likely to evolve

    Please register using the appropriate button below for the time slot suitable to you on Tuesday 16th September 2014. We look forward to your participation and questions.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Aug 21 2014 39 mins
    John Grimm, Senior Director of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we have seen recently with the Heartbleed OpenSSL bug, encryption is no silver bullet. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, July 17 to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Jul 17 2014 35 mins
    John Grimm, Senior Director of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we have seen recently with the Heartbleed OpenSSL bug, encryption is no silver bullet. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, July 17 to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jul 3 2014 46 mins
    Mark Cooper, President of PKI Solutions and Peter DiToro, Vice President Services at Thales e-Security
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jun 26 2014 61 mins
    Mark Cooper, President of PKI Solutions and Peter DiToro, Vice President Services at Thales e-Security
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jun 26 2014 60 mins
    Mark Cooper, President of PKI Solutions and Peter DiToro, Vice President Services at Thales e-Security
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: May 22 2014 36 mins
    John Grimm, Senior DIrector of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Future Proof Your Network: EMV, Mobile and the Cloud are Here Recorded: Apr 30 2014 60 mins
    David Worthington, Principal Consultant at Bell ID, Ian Hermon, Product Mktg Manager Thales
    The EMV liability shift is fast approaching in the United States. Along with the emerging trend towards innovative mobile payment solutions, this means that core infrastructures need to be enhanced to support new payment methods and channels – often with additional security, risk and lifecycle requirements. Now is the time for financial issuers to develop a future payments strategy that will enable you to migrate efficiently and quickly to EMV chip based technology, and adapt to stay competitive in this period of high disruption.
    Attendees will learn:
    •Facts vs. myths about EMV and how it reduces fraud
    •How the top 5 short-term challenges of EMV migration can be solved
    •The versatility of EMV and real-world examples of how it facilitates so much more than fraud reduction
    •EMV uses beyond cards – mobile (NFC) payments & host card emulation (HCE)
    •Examples of Bell ID and Thales e-Security deployments for EMV card and mobile payments
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Apr 24 2014 32 mins
    John Grimm, Senior DIrector of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Persistent Information Protection, Deploying Microsoft RMS with Thales HSMs Recorded: Feb 12 2014 87 mins
    Microsoft, Synergy and Thales
    Want to have a deeper understanding of how to deploy Microsoft Rights Management Services (RMS) with the added capability of generating and controlling your own key that secure your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how to deploy Microsoft RMS with the unique bring your own key (BYOK) capability across multiple operational scenarios including:

    • Subscription-based service in Azure
    • On-premises in Windows Server
    • Cross-premises in mixed environments

    You will also learn how to take advantage of the BYOK offering to secure your RMS private key within a Thales hardware security module (HSM) to maintain control of the critical keys securing your most sensitive data and intellectual property.
  • Persistent Information Protection, Extending the Use of HSM Within Microsoft RMS Recorded: Feb 11 2014 58 mins
    Microsoft, Synergy Advisors, Thales
    Want to take advantage of the cloud for collaboration but feel you will lose control of your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how you can deploy a unique solution that enforces strict security policies on your data assets and achieves persistent information protection. Learn how to:

    • Deploy new features and capabilities of Microsoft Rights Management Services (RMS)
    • Protect your sensitive files in any format and in any device, including iOS and Android
    • Share protected information with anyone, inside and outside your own organization

    You will also learn how the unique bring your own key (BYOK) capability enables you to generate and safeguard your own RMS private key within a Thales hardware security module (HSM), ensuring you that Microsoft operators cannot see or leak the keys during import or use.
  • Identity as a Service – Strong Enough for Government? Recorded: Nov 13 2013 59 mins
    Richard Moulds, Thales e-Security, and Daniel Turissini, ORC Inc.
    For many companies thinking about moving sensitive data to the cloud, security issues remain a significant concern. But Operational Research Consultants Inc. (ORC) and Thales e-Security are proving that the cloud really can be made as safe or even safer than on-premise deployments even for organizations as security-focused as the U.S. Federal Government.
    Join Daniel Turissini, CTO, WidePoint Corp. and Founder of ORC, Inc., a WidePoint company, and Richard Moulds, VP Product Marketing & Strategy at Thales e-Security
  • The cryptographic landscape is shifting – how do you stay safe? Recorded: Oct 30 2013 59 mins
    Rich Mogull, Securosis, Jeff Cherrington, Prime Factors, Richard Moulds, Thales e-Security
    The recent Snowden disclosures regarding the NSA’s alleged activity, as well as its influence on NIST and other organizations, put existing industry standard cryptographic algorithms and key lengths under renewed scrutiny. Equally, academic analysis of the same algorithms may indicate their useful lifecycle to be shorter than previously predicted. This combination may precipitate the need for rapid shifts from outdated algorithms and key strengths, to different ones less susceptible to attack or collisions.

    In this webinar, analyst Securosis will discuss these important landscape changes and you’ll hear strategies for managing the cryptographic algorithm and key length elements necessary for data protection, separate from core application functions so that algorithms can be replaced quickly and administratively - without requiring changes to application code. You’ll leave knowing how Prime Factor’s EncryptRIGHT makes encryption easy and Thales HSMs make encryption even stronger!
  • Proteção de Dados: Como as Empresas Brasileiras utilizam a Criptografia Recorded: Oct 23 2013 61 mins
    Paulo Veloso,Thales e-Security Country Manager, Brazil
    Veja como as organizações brasileiras estão aumentando o uso da criptografia para atender aos novos regulamentos e aos ataques cibernéticos. Pesquisa multi-nacional da Thales conclui que a criptografia e o uso de chaves criptográficas tem se tornado questões estratégicas de negócios para abordar os regulamentos de segurança e gerenciar os riscos
Encryption and Key Management Solutions
Data protection and security solutions to help companies meet compliance and protect the security of your most sensitive data leveraging encryption and key management.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Appliance Key Management Advantages for IBM Storage Encryption
  • Live at: Jul 12 2012 3:00 pm
  • Presented by: Nathan Turajski - Thales e-Security and Gordon Arnold - IBM
  • From:
Your email has been sent.
or close
You must be logged in to email this