Hi [[ session.user.profile.firstName ]]

Thales e-Security

  • Date
  • Rating
  • Views
  • Deploying a cloud payment (HCE) solution can be a daunting and complex task. Cryptographic and key management requirements don’t have to be something to slow down your project. At Thales e-Security we have been at the forefront of designing solutions to reduce the complexity of cryptographic security and implementation, helping organisations rapidly bring solutions to market.

    This webinar will explain the key management requirements of the various schemes’ specifications, and explain how using Thales HSMs can shorten your development cycle and allow you to rapidly bring your product to market.
  • Digital Certificates are a critical line of defense against cybercrime. From authenticating traditional user endpoints to enabling trusted e-commerce purchases, digital certificates and the public key infrastructure (PKI) that issues them create a high assurance foundation for digital security when implemented correctly.

    Partnering to provide best-in-class PKI solutions, Certified Security Solutions and Thales e-Security invite you to a live webinar to discuss digital certificate use cases, the security threat landscape and resolutions to dangerous enterprise problems putting your company at risk for costly outages and data breaches.

    Join John Grimm, Sr. Director, Product Marketing - Thales e-Security and Ted Shorter, CTO at Certified Security Solutions (CSS) as they discuss:

    • "Newest" security technology
    • Why it's different today
    • Digital certificate use cases
    • Security threat landscape
  • In this webcast, you will learn about the Top 10 ten trends in Global PKI based on our 2015 Global Trends Study from the Ponemon Institute. Industry expert Peter DiToro, and independent researcher, Larry Ponemon, discuss the increased reliance on public key infrastructures (PKIs) in today’s enterprise environment, and how they are supporting a growing number of applications. Other discussion topics include:

    •Issues around the general lack of clear PKI ownership
    •Issues around lack of resources and skills to properly support PKIs
    •How current approaches to PKI are fragmented and do not always incorporate best practices
    •The need for many organizations to apply increased effort to secure their PKI as an important part of creating a foundation of trust
  • In this webcast, you will learn about the Top 10 ten trends in Global PKI based on our 2015 Global Trends Study from the Ponemon Institute. Industry expert Peter DiToro, and independent researcher, Larry Ponemon, discuss the increased reliance on public key infrastructures (PKIs) in today’s enterprise environment, and how they are supporting a growing number of applications. Other discussion topics include:

    • Issues around the general lack of clear PKI ownership
    • Issues around lack of resources and skills to properly support PKIs
    • How current approaches to PKI are fragmented and do not always incorporate best practices
    • The need for many organizations to apply increased effort to secure their PKI as an important part of creating a foundation of trust
  • The dangers posed by advanced targeted attacks are real. Enterprises have come up against the limitations of approaches such as intrusion detection and signature-based malware detection. One promising avenue to explore is trusted crypto, which can help ensure that an application, for example, is doing just what its developers intended and has not been tampered with. Things can be taken a step further with trusted execution environments.

    In this webcast, John Grimm of Thales e-Security and John Pescatore of the SANS Institute will discuss the gaps in current best-practice defenses and the ways that trusted crypto and trusted execution environments can help fill those gaps.
  • Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary HCE specifications released by the major card schemes. Today, HCE enables contactless mobile payments on Android phones to take place at an NFC-capable POS terminal without the need for a Secure Element (SE) inside the phone. It is evident that HCE support is an important consideration for any issuer wanting to launch payment support on Android phones since the current rollouts of Apple Pay are restricted to Apple iOS devices.

    Thales would like to invite you to attend a webinar covering how Thales can help you generate new revenue by getting your HCE solution to market quickly and securely.

    Ian Hermon, Product Marketing Manager for Payment Security Solutions at Thales e-Security is the presenter and will be covering the following topics:
    •How HCE apps deliver new transactions and new revenue
    •What you need to support the new security and risk models required by HCE
    •How to maximize use of your existing back office security infrastructure
    •The flexibility of the Thales HSM offerings
  • Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary HCE specifications released by the major card schemes. Today, HCE enables contactless mobile payments on Android phones to take place at an NFC-capable POS terminal without the need for a Secure Element (SE) inside the phone. It is evident that HCE support is an important consideration for any issuer wanting to launch payment support on Android phones since the current rollouts of Apple Pay are restricted to Apple iOS devices.

    Thales would like to invite you to attend a webinar covering how Thales can help you generate new revenue by getting your HCE solution to market quickly and securely.

    Ian Hermon, Product Marketing Manager for Payment Security Solutions at Thales e-Security is the presenter and will be covering the following topics:
    •How HCE apps deliver new transactions and new revenue
    •What you need to support the new security and risk models required by HCE
    •How to maximize use of your existing back office security infrastructure
    •The flexibility of the Thales HSM offerings
  • The rise of malware and malicious insiders brings application security into clear focus. Well written software, security testing and code obfuscation mitigate risk but the most critical applications in the most risky locations need to go one step further to become tamper resistant. Trusted applications that handle sensitive data, control valuable IP and perform critical processes can be isolated and protected within secure execution environments. Mobile phones, embedded devices and data center servers all adopt physical hardening to secure the applications they host. This webinar focuses on protecting business applications that support high-tech manufacturing, content distribution, online authentication – in fact any situation where you need to know for sure that your application is doing precisely what the developer intended – nothing more, nothing less.
  • Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we saw with the Heartbleed OpenSSL vulnerability and more recently with POODLE, encryption is no silver bullet and can’t be taken for granted. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, November 20th, to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Downtime of critical networked applications can cost your company lost revenue opportunities in the short term, as well as long term negative impact on your brand. Attacks can interrupt the availability of critical applications or compromise sensitive data traversing your network.
    Securing critical applications to ensure availability is imperative.
    Integrating hardware security modules (HSMs) with intelligent network managers allows you to trust that data traveling across your network is encrypted and secure from unauthorized users.
    Join F5 Networks, Thales e-Security and FishNet for a free webcast to learn how to optimize and secure the delivery of critical applications. You’ll learn how F5’s BIG-IP System integrated with Thales’s nShield HSM can:
    •Deliver high performance processing
    •Provide robust security
    •Meet regulatory compliance standards
    •Secure data while improving data center performance

Embed in website or blog