Appliance Key Management Advantages for IBM Storage Encryption

Nathan Turajski - Thales e-Security and Gordon Arnold - IBM
How can you be sure you can recover your data, long-term, ensure that keys are protected from theft, and limit access to all but legitimate users? Key management is the foundation to deploying encryption successfully.
During this webinar Thales e-Security and IBM will discuss:
• The importance of key management for effective encryption solutions
• Determining environmental readiness and solution qualifying criteria
• Six critical requirements of a robust key management system
• A best of breed approach: IBM software in a security-hardened appliance

Whether yours is a small enterprise looking for a reliable point solution, or a global organization with a large investment in centralized IT services, this presentation will inform you on how today’s solutions provide the right fit to accelerate adoption and plan for future growth.
Jul 12 2012
39 mins
Appliance Key Management Advantages for IBM Storage Encryption
More from this community:

Application Development

  • Live and recorded (1477)
  • Upcoming (25)
  • Date
  • Rating
  • Views
  • Most IT providers have offers related to big data, cloud, mobility and security, and companies are looking at IT as the way to reduce costs and be competitive during an economic crisis. Investments in IT trends such as cloud computing and big data will rise thanks to a new player in the game: the business departments. This analyst briefing will show why companies are investing in IT, and what will change in 2015.

    Why you should attend:

    - Discover how many companies will adopt big data, cloud, mobility and security in 2015
    - Understand the current scenario of these trends in Latin America
    - Learn what will be different in 2015 regarding each trend
  • HP Propel on-premise was introduced in the summer of 2014, and since then, its set of features is growing at a brisk pace. Join us for this webinar and learn about our newest features from the HP Propel 1.1 release. We will discuss the new Jumpstart module which helps you extend the portal so that you can provide more services to your business users without increasing costs or resources. You will hear about our SDK (Software Development Kit) module for Service Exchange which enables you to modify the existing connectors or create brand new integration.

    This session will include live demos of:
    HP Propel portal and aggregated catalog, including the composite bundling from different catalogs
    Case exchange
  • Mobile is no longer a supplementary channel for the enterprise; It is quickly becoming the primary channel to deliver business critical information and experiences to partners, customers and employees. Join Sarvesh Jagannivas, VP of Product Marketing at MuleSoft, and Uri Sarid, CTO at MuleSoft, as they discuss the mobile enterprise opportunity, and the biggest challenges preventing successful mobile delivery.

    Join this webinar to learn:
    - Why mobile applications are the new imperative for the enterprise
    - The top challenges preventing rapid, scalable and secure mobile application development
    - Three case studies of industry leaders who are building mobile enterprises
  • SaaS-based applications like Salesforce.com are increasingly relevant to companies to compete and grow their business. However, the opportunity of faster time to value and availability offered by Cloud and SaaS comes with an urgent need to automate the application development and release processes. Learn how CA’s internal IT team used CA Release Automation to reduce software release times by simplifying and standardizing the release process and minimizing errors.
    oAn 80% reduction in release errors during deployment
    oSoftware release times reduced by 4-5x times
  • Building your own connector may be a good option to explore whether you need a connector with a specific functionality or want to connect to a system without a pre-built connector. While getting started can seem daunting at first, the challenge often becomes much more manageable when you understand the tools and resources that are available.

    Join this webinar to:
    - Get an introduction to MuleSoft’s SDK, DevKit
    - Watch a demo on how to build a reusable connector in 15 minutes
    - Get tips and advice from experts who’ve successfully built connectors using DevKit
    - Learn what’s coming in the roadmap
  • The ROI numbers don’t lie. Service virtualization technology is critical to the success of a vibrant application economy. That’s the conclusion from voke, Inc. on their research of 500 companies across the globe. Organizations using service virtualization experience reduced defects and software lifecycles, and increased customer satisfaction.

    Specific ROI data from companies surveyed include:
    •46% reported a 41% or greater reduction in TOTAL defects
    •More than one-third reduced test cycle times by 50% or more
    •36% reported a 41% or greater reduction in production defects
    •More than 25% at least doubled test execution rates

    Hear service virtualization should be a cornerstone of testing automation to remove the barrier to releasing software faster and with greater quality.

    voke, Inc., will review the research showing how service virtualization is an essential technology with a strong and proven ROI used to deliver software that drives optimal business outcomes and removes constraints throughout the software delivery lifecycle.
  • The answer is YES! The ‘I’ in team doesn’t represent one single person in the apps development plan, rather it highlights the transformation of the once silo’d teams who support specific functions within the app lifecycle. The straight line of the ‘I’ symbolizes the one team approach that is making DevOps successful. Operations people are showing up in the testing phase of the application and the apps people are doing some measures and monitoring in operations. Recently, TechTarget named DevOps as one of six major data center trends for 2015. DevOps is no longer a new way to think about transformation; it is the ONLY way to bring together the silos that weigh down your business’ bottom line.

    Join our lively panel discussion with DevOps industry experts Paul Muller and Damon Edwards as they discuss:

    Common problems in traditional DevOps teams
    How these teams have changed to truly transform and become innovators
    How you can apply these ideas to your business to boost your bottom line
  • Many organizations have not been able to demonstrate that they have effective compliance management. In this session Stu Henderson describes failed attempts at compliance management, the factors causing the failures, and what you can do to develop effective compliance management. Recommendations will address relevant changes in technology, regulation, and tools, as well as organizational and procedural issues. Stu's practical recommendations are based on over a decade of observing real-life mainframe security practices, and the factors blocking their effectiveness. If you are a CISO, mainframe auditor, or the person responsible for regulatory compliance, you will learn useful steps you can take to improve the quality of your compliance and your ability to demonstrate it!
  • What’s new in ALM and Quality Center 12.2—Enhancing your teams efforts to delivering amazing Apps with confidence

    In March of 2014, HP Software released Apps 12, bringing a new standard of efficiency, ease of use and insight for application teams working to deliver high quality applications fast with confidence. Now, we are doubling-down on this experience and launching HP ALM and HP Quality Center 12.2, continuing to break new ground in ease of use, expanding the web client experience and driving simplified reporting and business rules support to meet your unique organizational needs.

    Join the HP ALM team as we walk through the key newly released capabilities of ALM and Quality Center 12.2 and visually demonstrate the enhanced user experience and web feature set.
  • Channel
  • Channel profile
  • Applications that go bump in the night Mar 12 2015 5:00 pm UTC 60 mins
    The rise of malware and malicious insiders brings application security into clear focus. Well written software, security testing and code obfuscation mitigate risk but the most critical applications in the most risky locations need to go one step further to become tamper resistant. Trusted applications that handle sensitive data, control valuable IP and perform critical processes can be isolated and protected within secure execution environments. Mobile phones, embedded devices and data center servers all adopt physical hardening to secure the applications they host. This webinar focuses on protecting business applications that support high-tech manufacturing, content distribution, online authentication – in fact any situation where you need to know for sure that your application is doing precisely what the developer intended – nothing more, nothing less.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Nov 20 2014 39 mins
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we saw with the Heartbleed OpenSSL vulnerability and more recently with POODLE, encryption is no silver bullet and can’t be taken for granted. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, November 20th, to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • High Assurance Security for Mission Critical Applications Recorded: Oct 22 2014 61 mins
    Downtime of critical networked applications can cost your company lost revenue opportunities in the short term, as well as long term negative impact on your brand. Attacks can interrupt the availability of critical applications or compromise sensitive data traversing your network.
    Securing critical applications to ensure availability is imperative.
    Integrating hardware security modules (HSMs) with intelligent network managers allows you to trust that data traveling across your network is encrypted and secure from unauthorized users.
    Join F5 Networks, Thales e-Security and FishNet for a free webcast to learn how to optimize and secure the delivery of critical applications. You’ll learn how F5’s BIG-IP System integrated with Thales’s nShield HSM can:
    •Deliver high performance processing
    •Provide robust security
    •Meet regulatory compliance standards
    •Secure data while improving data center performance
  • Host Card Emulation (HCE): How to take direct control of mobile payments” Recorded: Oct 22 2014 61 mins
    This webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved.
  • Protecting Your Sensitive Data Does Not Have to Impact Business Operations Recorded: Sep 17 2014 61 mins
    Highly publicized software attacks and data breaches, combined with strict regulatory requirements, reinforce the ongoing risks associated with cardholder data at all points in the payment stream. The risks to data are everywhere, and your organization is ultimately responsible for the security of customers’ personally identifiable information (PII). This means you must protected PII not only during transaction processing, but also through business processes such as charge-backs, loyalty or repeat payments, storage and analytics – including outsourced environments.
    Voltage SecureData™ enables you to ensure sensitive data is de-identified while maintaining logical and referential integrity so it can remain in a protected state while still usable for critical business processes. Integration of Voltage SecureData with Thales nShield® hardware security modules (HSMs) provides enhanced safekeeping and management of critical cryptographic keys that underpin the security of the process. Enforced protection of sensitive data using policy driven data security enables you to protect PII across your entire workflow without disrupting operations and ensuring you can adhere to privacy regulations.
  • Host Card Emulation (HCE): How to take direct control of mobile payments Recorded: Sep 16 2014 60 mins
    For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availability of compatible mobile phones top the list of potential barriers. The incremental cost to support secure elements as well as companion credit/debit cards made the business case questionable for issuers.

    A recent update to the Android operating system has changed things forever – no longer does an issuer need a secure element in the mobile phone or a third party to provision the application to offer a secure mobile payment solution compatible with all NFC contactless point-of-sale (POS) terminals. A technology known as host card emulation (HCE) enables issuers to take direct control and fast track time to market.

    A webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved, including:
    •An HCE technology overview
    •How the payments are secured
    •Benefits achieved by early adopters
    •Insight into how HCE is likely to evolve

    Please register using the appropriate button below for the time slot suitable to you on Tuesday 16th September 2014. We look forward to your participation and questions.
  • Host Card Emulation (HCE): How to take direct control of mobile payments Recorded: Sep 16 2014 60 mins
    For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availability of compatible mobile phones top the list of potential barriers. The incremental cost to support secure elements as well as companion credit/debit cards made the business case questionable for issuers.

    A recent update to the Android operating system has changed things forever – no longer does an issuer need a secure element in the mobile phone or a third party to provision the application to offer a secure mobile payment solution compatible with all NFC contactless point-of-sale (POS) terminals. A technology known as host card emulation (HCE) enables issuers to take direct control and fast track time to market.

    A webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved, including:
    •An HCE technology overview
    •How the payments are secured
    •Benefits achieved by early adopters
    •Insight into how HCE is likely to evolve

    Please register using the appropriate button below for the time slot suitable to you on Tuesday 16th September 2014. We look forward to your participation and questions.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Aug 21 2014 39 mins
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we have seen recently with the Heartbleed OpenSSL bug, encryption is no silver bullet. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, July 17 to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Jul 17 2014 35 mins
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we have seen recently with the Heartbleed OpenSSL bug, encryption is no silver bullet. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, July 17 to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jul 3 2014 46 mins
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jun 26 2014 61 mins
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jun 26 2014 60 mins
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: May 22 2014 36 mins
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Future Proof Your Network: EMV, Mobile and the Cloud are Here Recorded: Apr 30 2014 60 mins
    The EMV liability shift is fast approaching in the United States. Along with the emerging trend towards innovative mobile payment solutions, this means that core infrastructures need to be enhanced to support new payment methods and channels – often with additional security, risk and lifecycle requirements. Now is the time for financial issuers to develop a future payments strategy that will enable you to migrate efficiently and quickly to EMV chip based technology, and adapt to stay competitive in this period of high disruption.
    Attendees will learn:
    •Facts vs. myths about EMV and how it reduces fraud
    •How the top 5 short-term challenges of EMV migration can be solved
    •The versatility of EMV and real-world examples of how it facilitates so much more than fraud reduction
    •EMV uses beyond cards – mobile (NFC) payments & host card emulation (HCE)
    •Examples of Bell ID and Thales e-Security deployments for EMV card and mobile payments
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Apr 24 2014 32 mins
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Persistent Information Protection, Deploying Microsoft RMS with Thales HSMs Recorded: Feb 12 2014 87 mins
    Want to have a deeper understanding of how to deploy Microsoft Rights Management Services (RMS) with the added capability of generating and controlling your own key that secure your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how to deploy Microsoft RMS with the unique bring your own key (BYOK) capability across multiple operational scenarios including:

    • Subscription-based service in Azure
    • On-premises in Windows Server
    • Cross-premises in mixed environments

    You will also learn how to take advantage of the BYOK offering to secure your RMS private key within a Thales hardware security module (HSM) to maintain control of the critical keys securing your most sensitive data and intellectual property.
  • Persistent Information Protection, Extending the Use of HSM Within Microsoft RMS Recorded: Feb 11 2014 58 mins
    Want to take advantage of the cloud for collaboration but feel you will lose control of your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how you can deploy a unique solution that enforces strict security policies on your data assets and achieves persistent information protection. Learn how to:

    • Deploy new features and capabilities of Microsoft Rights Management Services (RMS)
    • Protect your sensitive files in any format and in any device, including iOS and Android
    • Share protected information with anyone, inside and outside your own organization

    You will also learn how the unique bring your own key (BYOK) capability enables you to generate and safeguard your own RMS private key within a Thales hardware security module (HSM), ensuring you that Microsoft operators cannot see or leak the keys during import or use.
  • Identity as a Service – Strong Enough for Government? Recorded: Nov 13 2013 59 mins
    For many companies thinking about moving sensitive data to the cloud, security issues remain a significant concern. But Operational Research Consultants Inc. (ORC) and Thales e-Security are proving that the cloud really can be made as safe or even safer than on-premise deployments even for organizations as security-focused as the U.S. Federal Government.
    Join Daniel Turissini, CTO, WidePoint Corp. and Founder of ORC, Inc., a WidePoint company, and Richard Moulds, VP Product Marketing & Strategy at Thales e-Security
  • The cryptographic landscape is shifting – how do you stay safe? Recorded: Oct 30 2013 59 mins
    The recent Snowden disclosures regarding the NSA’s alleged activity, as well as its influence on NIST and other organizations, put existing industry standard cryptographic algorithms and key lengths under renewed scrutiny. Equally, academic analysis of the same algorithms may indicate their useful lifecycle to be shorter than previously predicted. This combination may precipitate the need for rapid shifts from outdated algorithms and key strengths, to different ones less susceptible to attack or collisions.

    In this webinar, analyst Securosis will discuss these important landscape changes and you’ll hear strategies for managing the cryptographic algorithm and key length elements necessary for data protection, separate from core application functions so that algorithms can be replaced quickly and administratively - without requiring changes to application code. You’ll leave knowing how Prime Factor’s EncryptRIGHT makes encryption easy and Thales HSMs make encryption even stronger!
  • Proteção de Dados: Como as Empresas Brasileiras utilizam a Criptografia Recorded: Oct 23 2013 61 mins
    Veja como as organizações brasileiras estão aumentando o uso da criptografia para atender aos novos regulamentos e aos ataques cibernéticos. Pesquisa multi-nacional da Thales conclui que a criptografia e o uso de chaves criptográficas tem se tornado questões estratégicas de negócios para abordar os regulamentos de segurança e gerenciar os riscos
Encryption and Key Management Solutions
Data protection and security solutions to help companies meet compliance and protect the security of your most sensitive data leveraging encryption and key management.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Appliance Key Management Advantages for IBM Storage Encryption
  • Live at: Jul 12 2012 3:00 pm
  • Presented by: Nathan Turajski - Thales e-Security and Gordon Arnold - IBM
  • From:
Your email has been sent.
or close
You must be logged in to email this