Browse communities
Browse communities
Presenting a webinar?

Appliance Key Management Advantages for IBM Storage Encryption

Nathan Turajski - Thales e-Security and Gordon Arnold - IBM
How can you be sure you can recover your data, long-term, ensure that keys are protected from theft, and limit access to all but legitimate users? Key management is the foundation to deploying encryption successfully.
During this webinar Thales e-Security and IBM will discuss:
• The importance of key management for effective encryption solutions
• Determining environmental readiness and solution qualifying criteria
• Six critical requirements of a robust key management system
• A best of breed approach: IBM software in a security-hardened appliance

Whether yours is a small enterprise looking for a reliable point solution, or a global organization with a large investment in centralized IT services, this presentation will inform you on how today’s solutions provide the right fit to accelerate adoption and plan for future growth.
Jul 12 2012
39 mins
Appliance Key Management Advantages for IBM Storage Encryption
  • Channel
  • Channel profile
  • An Easy Step to Host Card Emulation (HCE) Solutions with Thales HSMs Apr 29 2015 4:00 pm UTC 105 mins
    Ian Hermon
    Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary HCE specifications released by the major card schemes. Today, HCE enables contactless mobile payments on Android phones to take place at an NFC-capable POS terminal without the need for a Secure Element (SE) inside the phone. It is evident that HCE support is an important consideration for any issuer wanting to launch payment support on Android phones since the current rollouts of Apple Pay are restricted to Apple iOS devices.

    Thales would like to invite you to attend a webinar covering how Thales can help you generate new revenue by getting your HCE solution to market quickly and securely.

    Ian Hermon, Product Marketing Manager for Payment Security Solutions at Thales e-Security is the presenter and will be covering the following topics:
    •How HCE apps deliver new transactions and new revenue
    •What you need to support the new security and risk models required by HCE
    •How to maximize use of your existing back office security infrastructure
    •The flexibility of the Thales HSM offerings
  • An Easy Step to Host Card Emulation (HCE) Solutions with Thales HSMs Apr 29 2015 9:00 am UTC 105 mins
    Ian Hermon
    Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary HCE specifications released by the major card schemes. Today, HCE enables contactless mobile payments on Android phones to take place at an NFC-capable POS terminal without the need for a Secure Element (SE) inside the phone. It is evident that HCE support is an important consideration for any issuer wanting to launch payment support on Android phones since the current rollouts of Apple Pay are restricted to Apple iOS devices.

    Thales would like to invite you to attend a webinar covering how Thales can help you generate new revenue by getting your HCE solution to market quickly and securely.

    Ian Hermon, Product Marketing Manager for Payment Security Solutions at Thales e-Security is the presenter and will be covering the following topics:
    •How HCE apps deliver new transactions and new revenue
    •What you need to support the new security and risk models required by HCE
    •How to maximize use of your existing back office security infrastructure
    •The flexibility of the Thales HSM offerings
  • Applications that go bump in the night Recorded: Mar 12 2015 52 mins
    Richard Moulds, VP of Strategy at Thales e-Security, and Derek Brink, Vice President- Information Technology, Aberdeen Group
    The rise of malware and malicious insiders brings application security into clear focus. Well written software, security testing and code obfuscation mitigate risk but the most critical applications in the most risky locations need to go one step further to become tamper resistant. Trusted applications that handle sensitive data, control valuable IP and perform critical processes can be isolated and protected within secure execution environments. Mobile phones, embedded devices and data center servers all adopt physical hardening to secure the applications they host. This webinar focuses on protecting business applications that support high-tech manufacturing, content distribution, online authentication – in fact any situation where you need to know for sure that your application is doing precisely what the developer intended – nothing more, nothing less.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Nov 20 2014 39 mins
    John Grimm, Sr Director Product Marketing, Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we saw with the Heartbleed OpenSSL vulnerability and more recently with POODLE, encryption is no silver bullet and can’t be taken for granted. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, November 20th, to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • High Assurance Security for Mission Critical Applications Recorded: Oct 22 2014 61 mins
    Chris Glidden, SE Federal Thales - Bob Smith, SE Manager F5 Networks- Brian Jones, VP Federal & Mid Atlantic FishNet Security
    Downtime of critical networked applications can cost your company lost revenue opportunities in the short term, as well as long term negative impact on your brand. Attacks can interrupt the availability of critical applications or compromise sensitive data traversing your network.
    Securing critical applications to ensure availability is imperative.
    Integrating hardware security modules (HSMs) with intelligent network managers allows you to trust that data traveling across your network is encrypted and secure from unauthorized users.
    Join F5 Networks, Thales e-Security and FishNet for a free webcast to learn how to optimize and secure the delivery of critical applications. You’ll learn how F5’s BIG-IP System integrated with Thales’s nShield HSM can:
    •Deliver high performance processing
    •Provide robust security
    •Meet regulatory compliance standards
    •Secure data while improving data center performance
  • Host Card Emulation (HCE): How to take direct control of mobile payments” Recorded: Oct 22 2014 61 mins
    David Worthington, Principle Consultant Payment at Bell ID, Ian Hermon, Product Marketing Manager Payments, Thales e-Security
    This webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved.
  • Protecting Your Sensitive Data Does Not Have to Impact Business Operations Recorded: Sep 17 2014 61 mins
    Juan Asenjo, Senior Product Marketing Manager, Thales e-Security, Mark Bower, VP Product Management , Voltage Security
    Highly publicized software attacks and data breaches, combined with strict regulatory requirements, reinforce the ongoing risks associated with cardholder data at all points in the payment stream. The risks to data are everywhere, and your organization is ultimately responsible for the security of customers’ personally identifiable information (PII). This means you must protected PII not only during transaction processing, but also through business processes such as charge-backs, loyalty or repeat payments, storage and analytics – including outsourced environments.
    Voltage SecureData™ enables you to ensure sensitive data is de-identified while maintaining logical and referential integrity so it can remain in a protected state while still usable for critical business processes. Integration of Voltage SecureData with Thales nShield® hardware security modules (HSMs) provides enhanced safekeeping and management of critical cryptographic keys that underpin the security of the process. Enforced protection of sensitive data using policy driven data security enables you to protect PII across your entire workflow without disrupting operations and ensuring you can adhere to privacy regulations.
  • Host Card Emulation (HCE): How to take direct control of mobile payments Recorded: Sep 16 2014 60 mins
    Ian Hermon, Product Marketing Manager - Thales e-Security, David Worthington, Principal Consultant - Bell ID
    For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availability of compatible mobile phones top the list of potential barriers. The incremental cost to support secure elements as well as companion credit/debit cards made the business case questionable for issuers.

    A recent update to the Android operating system has changed things forever – no longer does an issuer need a secure element in the mobile phone or a third party to provision the application to offer a secure mobile payment solution compatible with all NFC contactless point-of-sale (POS) terminals. A technology known as host card emulation (HCE) enables issuers to take direct control and fast track time to market.

    A webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved, including:
    •An HCE technology overview
    •How the payments are secured
    •Benefits achieved by early adopters
    •Insight into how HCE is likely to evolve

    Please register using the appropriate button below for the time slot suitable to you on Tuesday 16th September 2014. We look forward to your participation and questions.
  • Host Card Emulation (HCE): How to take direct control of mobile payments Recorded: Sep 16 2014 60 mins
    Ian Hermon, Product Marketing Manager - Thales e-Security, David Worthington, Principal Consultant - Bell ID
    For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availability of compatible mobile phones top the list of potential barriers. The incremental cost to support secure elements as well as companion credit/debit cards made the business case questionable for issuers.

    A recent update to the Android operating system has changed things forever – no longer does an issuer need a secure element in the mobile phone or a third party to provision the application to offer a secure mobile payment solution compatible with all NFC contactless point-of-sale (POS) terminals. A technology known as host card emulation (HCE) enables issuers to take direct control and fast track time to market.

    A webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved, including:
    •An HCE technology overview
    •How the payments are secured
    •Benefits achieved by early adopters
    •Insight into how HCE is likely to evolve

    Please register using the appropriate button below for the time slot suitable to you on Tuesday 16th September 2014. We look forward to your participation and questions.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Aug 21 2014 39 mins
    John Grimm, Senior Director of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we have seen recently with the Heartbleed OpenSSL bug, encryption is no silver bullet. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, July 17 to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Jul 17 2014 35 mins
    John Grimm, Senior Director of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we have seen recently with the Heartbleed OpenSSL bug, encryption is no silver bullet. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, July 17 to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jul 3 2014 46 mins
    Mark Cooper, President of PKI Solutions and Peter DiToro, Vice President Services at Thales e-Security
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jun 26 2014 61 mins
    Mark Cooper, President of PKI Solutions and Peter DiToro, Vice President Services at Thales e-Security
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jun 26 2014 60 mins
    Mark Cooper, President of PKI Solutions and Peter DiToro, Vice President Services at Thales e-Security
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: May 22 2014 36 mins
    John Grimm, Senior DIrector of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Future Proof Your Network: EMV, Mobile and the Cloud are Here Recorded: Apr 30 2014 60 mins
    David Worthington, Principal Consultant at Bell ID, Ian Hermon, Product Mktg Manager Thales
    The EMV liability shift is fast approaching in the United States. Along with the emerging trend towards innovative mobile payment solutions, this means that core infrastructures need to be enhanced to support new payment methods and channels – often with additional security, risk and lifecycle requirements. Now is the time for financial issuers to develop a future payments strategy that will enable you to migrate efficiently and quickly to EMV chip based technology, and adapt to stay competitive in this period of high disruption.
    Attendees will learn:
    •Facts vs. myths about EMV and how it reduces fraud
    •How the top 5 short-term challenges of EMV migration can be solved
    •The versatility of EMV and real-world examples of how it facilitates so much more than fraud reduction
    •EMV uses beyond cards – mobile (NFC) payments & host card emulation (HCE)
    •Examples of Bell ID and Thales e-Security deployments for EMV card and mobile payments
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Apr 24 2014 32 mins
    John Grimm, Senior DIrector of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Persistent Information Protection, Deploying Microsoft RMS with Thales HSMs Recorded: Feb 12 2014 87 mins
    Microsoft, Synergy and Thales
    Want to have a deeper understanding of how to deploy Microsoft Rights Management Services (RMS) with the added capability of generating and controlling your own key that secure your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how to deploy Microsoft RMS with the unique bring your own key (BYOK) capability across multiple operational scenarios including:

    • Subscription-based service in Azure
    • On-premises in Windows Server
    • Cross-premises in mixed environments

    You will also learn how to take advantage of the BYOK offering to secure your RMS private key within a Thales hardware security module (HSM) to maintain control of the critical keys securing your most sensitive data and intellectual property.
  • Persistent Information Protection, Extending the Use of HSM Within Microsoft RMS Recorded: Feb 11 2014 58 mins
    Microsoft, Synergy Advisors, Thales
    Want to take advantage of the cloud for collaboration but feel you will lose control of your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how you can deploy a unique solution that enforces strict security policies on your data assets and achieves persistent information protection. Learn how to:

    • Deploy new features and capabilities of Microsoft Rights Management Services (RMS)
    • Protect your sensitive files in any format and in any device, including iOS and Android
    • Share protected information with anyone, inside and outside your own organization

    You will also learn how the unique bring your own key (BYOK) capability enables you to generate and safeguard your own RMS private key within a Thales hardware security module (HSM), ensuring you that Microsoft operators cannot see or leak the keys during import or use.
  • Identity as a Service – Strong Enough for Government? Recorded: Nov 13 2013 59 mins
    Richard Moulds, Thales e-Security, and Daniel Turissini, ORC Inc.
    For many companies thinking about moving sensitive data to the cloud, security issues remain a significant concern. But Operational Research Consultants Inc. (ORC) and Thales e-Security are proving that the cloud really can be made as safe or even safer than on-premise deployments even for organizations as security-focused as the U.S. Federal Government.
    Join Daniel Turissini, CTO, WidePoint Corp. and Founder of ORC, Inc., a WidePoint company, and Richard Moulds, VP Product Marketing & Strategy at Thales e-Security
Encryption and Key Management Solutions
Data protection and security solutions to help companies meet compliance and protect the security of your most sensitive data leveraging encryption and key management.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Appliance Key Management Advantages for IBM Storage Encryption
  • Live at: Jul 12 2012 3:00 pm
  • Presented by: Nathan Turajski - Thales e-Security and Gordon Arnold - IBM
  • From:
Your email has been sent.
or close
You must be logged in to email this