Hi [[ session.user.profile.firstName ]]

IOT & Blockchain: (Hype + Hyperbole)²

IOT & Blockchain are two technologies that have the potential to transform the future of connectivity and the way we manage transactions. This webinar will help you cut through the hype of IOT and Blockchain and will reveal what’s really important within these technologies and the opportunities they present for business.
Recorded Sep 15 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joe Pindar, Director of Strategy in CTO Office, Gemalto; Adrian Davis, Managing Director (ISC)² EMEA;
Presentation preview: IOT & Blockchain: (Hype + Hyperbole)²
  • Channel
  • Channel profile
  • Customer Needs: Increasingly Cloudy - Six ways to accelerate your XaaS Revenue Nov 5 2020 11:00 am UTC 60 mins
    Gary Marsden: Cloud Services Director, Thales Cloud Protection & Licensing (CPL)
    Today’s new normal has changed the market for data consumption and accelerated the need to protect data at multiple levels. With a feature-rich and comprehensive portfolio, partnering with an industry leader like Thales will help your business flourish. Our technologies enable you to cross-sell to existing customers, retain higher revenues per partner contract and increase stickiness for customer retention. It helps open doors to new markets, obtain new customers and enables you to wrap value add services as a competitive differentiator.

    Join Gary Marsden, Cloud Services Director to learn more about how the Thales New Normal provides unrivalled growth opportunities with zero investment, through data protection on demand, that can help accelerate your client revenues
  • Increase VMware Encryption Security with Thales Key Manager Oct 28 2020 11:00 am UTC 60 mins
    Axel Debray - PreSales Consultant UKI, Thales
    The Industry leading virtualisation platform VMware vSphere® protects virtual machine files, virtual disk files, and core dump files with VMware vSphere VM Encryption introduced in vSphere 6.5. The solution leverages the Key Management Interoperability Protocol (KMIP) for encryption key management and key vaulting. vSphere can be used with the CipherTrust Manager from Thales to provide the full range of protection for key management and role separation.

    The combined solution delivers non-disruptive encryption, ensuring the security of VMs, the applications they run and the sensitive data they process. The combination provides a cost-effective and comprehensive solution that meets the most stringent security requirements. Leveraging hardware-based data encryption ensures no adverse impact to system performance.

    During this webinar you will learn

    • Why encrypting VMWare is important for your organisation
    • How to integrate Key Management with VMWare
    • What the different VMware encryption methodologies are
    • Benefits of using an external Key Manager with VMware
    • How to meet compliance and security requirements with FIPS compliant solutions
  • Securing today’s modern High Speed Networks Oct 15 2020 10:00 am UTC 60 mins
    Peter Smith, Senior Sales Engineer, Thales
    Still using yesteryear’s technology to secure today’s modern High Speed Networks?

    Networks have developed incredibly quickly over the last 25 years, from low speed public and private network access to the high speed fibre and Software Defined Networks seen today. However, most of the sensitive data being transferred across modern networks still rely on the performance sapping, bandwidth hungry security technologies introduced decades ago.

    Join Thales on 15th October to learn how ultra-efficient certified network independent encryption can be deployed to secure today’s networks whether private layer 2 or public layer 3 networks with end points located on premise and in the Cloud.
  • payShield 10K – the future of payment protection Oct 13 2020 12:00 pm UTC 60 mins
    Simon Keates, Head of Strategy, Payment Security at Thales and Cas Liddle, Sr. Solutions Architect at Thales
    You can rely on payShield 10K payment HSM to deliver the protection, performance, and operational efficiency needed to confidently secure digital payments.

    This informative webinar will cover:

    payShield 10K new product features and its benefits 
    Roadmap and what's new to come
    How to be compliant in the payment industry
    Six steps to migrate to payShield 10K
  • Trends, Technologies and Challenges of Payments Industry the Irish Market Oct 8 2020 10:00 am UTC 60 mins
    Simon Keates, Head of Payment Strategy
    The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.

    Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry and how Thales can help meet these challenges.
  • 金融業界のDXを取り巻くデータ脅威の動向、各組織の取り組みを解説 Oct 1 2020 3:00 am UTC 45 mins
    タレスジャパン株式会社、クラウドプロテクション&ライセンシング、シニアテクニカル スペシャリスト 畑瀬 宏一
    タレスでは、3回に渡りウェビナーを開催して参ります。

    第1回のウェビナーは、「2019年タレス データ脅威レポート 金融サービス版」から、100の米国金融サービス組織の回答者からの調査結果をまとめた具体的なデータ結果に基づき解説してまいります。金融業界におけるDXが、金融サービスの機密データにどのような影響を与え、各組織はその保護にどう取り組んでいるのか、マルチクラウド利用が増加する中で、法規制に対応しながら効果的に機密データを保護することの重要性について考察していきます。

    また、451リサーチ社による「決済のグローバル動向」やアバディーン社のレポートから、年間の運用コストの削減、データプライバシー、データセキュリティやコンプライアンスや法制度の遵守など、昨今のDXにおける複雑な環境の中で求められる機密データの保護や暗号化の重要性などにも触れながら、業界動向をご紹介いたします。
  • Empower Users with Secure Remote Access to Maintain Business Continuity Sep 29 2020 7:00 am UTC 60 mins
    Leo Ng, Technical Director, Amidas Hong Kong
    In a competitive environment empowering users with secure access to corporate applications wherever they are is crucial to gaining and maintaining competitive advantage. Thales SafeNet Trusted Access, a strong authentication and access management service, enables employees to access corporate networks and log onto enterprise applications easily and securely.
  • アクセス管理でOffice 365を保護するベストプラクティス Sep 29 2020 5:00 am UTC 60 mins
    タレスDIS CPLジャパン株式会社、IAM事業本部 担当部長、 芳賀 悟
    多くの組織でOffice365への移行が急速に進んでいます。そして多くの従業員がOffice365に保管されている個人情報や重要(機密)情報に自宅(社外)からアクセスをしています。
    あなたの会社では全ての社員のOffice365へのアクセスが、安全なパスワードによって保護され、成りすましによる不正アクセスが無いと証明できますか?
    タレスのSafeNet Trusted Accessを利用すると、この質問に「はい」と答えることができます。
    今回のウェビナーでは、Office365の認証強化、多要素認証導入のベストプラクティスをご紹介いたします。
  • Securing Cloud Apps with Next Gen Access Management Solutions (Live Demo) Recorded: Sep 25 2020 60 mins
    Umesh Arya, Regional Sales Engineer, Identity & Access Management, Thales
    Simplifying and securing access to the cloud is becoming more complex for IT security teams. Today's enterprises use, on average, 29 different cloud applications and services. In fact, 10% of organizations use more than 100 cloud services. In addition, cloud services are seen as one of the leading source of data breaches.

    This session will discuss how IT security teams can simplify secure access to the cloud while providing a more simple and seamless way for employees to access cloud services without having to worry about password fatigue. This session will also include a live demonstration of SafeNet Trusted Access, Thales' cloud-based access management solution.
  • How to Think Ahead of the Attacker: Taking Control of Security in the Cloud Recorded: Sep 25 2020 55 mins
    Welland Chu, Director of Business Development for APAC Region at Thales; Harry Pun, Cybersecurity Executive, Microsoft
    There is an old Chinse saying, where there is opportunity there is also risk. This applies to the digital transformation journey many businesses are undertaking today. Businesses are driving significant digital transformation initiatives in order to accelerate performance and create new opportunities. Much of this transformation is being powered by the cloud. This means that more data and information is being stored in the cloud, creating significant risk especially for cyberattacks and data breaches. This interactive Tech Talk will discuss the challenges of maintaining a strong security posture in the cloud and how to think ahead of attacks before placing sensitive data in the cloud. This session will also present a playbook of practical steps organizations should follow for cloud security.
  • Putting Continuous Security First in Your Cloud-first Strategy Recorded: Sep 24 2020 48 mins
    Sundaram Lakshmanan, CTO, CipherCloud; Danna Bethlehem, Dir. of IAM Prod. Mktg., Thales; Haider Iqbal, Dir. Bus Dev., Thales
    Cloud adoption is the stepping stone for any organization’s digital transformation initiative. As digital-native businesses emerge, and incumbent businesses embark on their journey to transform their internal and external processes; IaaS and SaaS become the very fabric of the business. But as the adoption of cloud services evolves, so does the threat landscape. Often, IT teams find themselves scrambling to keep pace with business needs because their age-old perimeter-based security controls were not built to scale in today’s digital world.

    Join Thales and CipherCloud experts to learn how to navigate this very fluid threat landscape with solutions that scale up with your business needs, and help you achieve the true potential of your digital transformation objectives.
  • Securing the Application Development Lifecycle at the Speed of DevOps Recorded: Sep 24 2020 57 mins
    David Zendzian Exec. Tech Advisor, VMware Tanzu; Steve White, Exec. Tech Advisor, VMware Tanzu; Rohini Deepak, Thales
    Organizations making the digital transformation have a lot of considerations to make with compliance being one of the most important. In navigating security for digital transformation, it is easy for organizations to fall into the trap of addressing just the most basic compliance obligations first before fully grasping more complex issues that have implications in the software development lifecycle.

    In this session, Thales and VMware Tanzu will discuss how they work together so security serves as a tool that facilitates the transition to the ‘cloud-native’, DevOps world. Attendees will also learn how the collaboration between VMware Tanzu and Thales eases the friction business leaders face in digitally transforming their organizations.
  • Securing Cloud Access with Continuous Access Evaluation Protocol (CAEP) Recorded: Sep 24 2020 51 mins
    Asad Ali, Senior Technologist, Thales; Atul Tulshibagwale, Software Eng., Google; Haider Iqbal, Dir. of Biz Dev, Thales
    Seamless authentication and continuous access to online resources has been an elusive target. While many have tried, few have been able to achieve it. The ones who claim success have built it on proprietary protocols and niche implementations that only address a small spectrum of digital security industry. In this talk we describe Continuous Access and Evaluation Protocol (CAEP), a new approach to cybersecurity using a user’s complete online footprint collected through a collaborative exchange of events and signals between multiple parties. CAEP was started by Google, and now has support of many key players in identity and security industry including Microsoft, Cisco, SailPoint, Amazon, Ping and Thales. We will explain how CAEP can help deliver Zero Trust by providing signals and events as input to machine learning capabilities, and thereby address current challenges around continuous access to online resources.
  • Managing Keys in the Google Cloud Platform Recorded: Sep 24 2020 57 mins
    Sol Cates, Principal Technologist, CTO Office at Thales and Il-Sung Lee, Senior Product Manager at Google
    In this Tech Talk, you will hear about approaches and be able to ask questions about how to manage and secure the keys to encrypted data in the Google Cloud.
  • Network Data Encryption: The Key to Cloud Security Recorded: Sep 24 2020 70 mins
    Julian Fay, CTO, Senetas; Stan Mesceda, Senior Product Manager, Network Encryption, Thales
    Ensuring secure access into cloud infrastructure is the best defence for cloud computing. Modern cloud services must accommodate any-any connectivity amongst a wide range of devices, applications and third parties across the Internet and other communication channels.

    Network encryption provides essential intrinsic protection for cloud services and is mandated in many laws and regulations.

    Today’s network encryption devices must handle intensive encryption algorithms, operate across a diverse range of cloud architectures and connectivity and be future proof against emerging threats.

    In this session Stan Mesceda and Julian Fay will discuss the importance of providing encrypted network access into cloud environments and give strategies for managing the security of cloud environments today and into the future using the Thales HSE product family.
  • Rethinking Cloud Marketplaces Recorded: Sep 24 2020 39 mins
    Tarik Faouzi, VP Cloud Solutions at CloudBlue; Gary Marsden, Senior Director, Cloud Services, Thales
    There is no shortage of cloud services. While most organizations think of AWS, Azure and Google as the go-to destinations for software, infrastructure and platform as a services offerings, there are also other emerging marketplaces for cloud services. These marketplaces aggregate cloud services from multiple other providers and so give end users the same ability to consume services on-demand with simple pricing and billing but across multiple vendor offerings. In this session you learn more about these types of marketplaces, how they deliver and deploy services and how we are right at the tip of the iceberg in terms of changes in the cloud marketplace world. Tarik Faouzi from CloudBlue and Gary Marsden from Thales will provide an overview of the market changes, how to best leverage cloud based marketplaces and the associated processes to maximum benefit for your organization.
  • Smart Data Security - Reducing noise on your network Recorded: Sep 24 2020 39 mins
    Manoj Bhati - Pre-Sales Consultant, Thales
    Organisations are receive hundreds if not thousands of alerts and reports every single day. Not only that, but organisations are using a many different security solutions from multiple vendors. All of these solutions are creating and sending alerts. This is their window to know if they are under attack. The resulting data means it is difficult for organisations to look into and respond, not to mention the false positives and the red herrings. Companies are becoming Cyber Fatigued.

    Thales provide solutions that allow customers to encrypt data at a given layer. With encryption in place any alert below this layer can be handled at a lower priority. We help organisations in prioritising the logs they are receiving and reducing the noise in the network by using encryption.
  • Driving Access Management Adoption in Large Enterprises - APAC Edition Recorded: Sep 24 2020 58 mins
    Eric Avigdor, Director of Product Management, IAM, Thales; Asaf Lerner, Business Development Manager, Thales
    Strategic IT initiatives such as O365 adoption, MFA consolidation, SSO for All alongside compelling events such as COVID 19 – often drive enterprise IT modernization. At no time is this more relevant than the present, when cloud adoption, accelerated by the need to support work from home, has exposed many weaknesses in existing on-premises legacy schemes.

    This session will discuss why Access Management and Authentication is at the heart of enterprise security and how drives a Zero Trust architecture and creates synergies across IT modernization programs and present a technical demonstration of how a cloud-based access management can simplify user access to cloud services and enterprise apps.
  • Identity-Centric Zero Trust Models for a Multi-Cloud World - APAC Edition Recorded: Sep 24 2020 40 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    The need to enable mass work from home has exposed weaknesses in existing on-premises security solutions. As traditional security perimeters disintegrate, the login point becomes the front line of enterprise security.

    Now is the time to rethink how identity-centric Zero Trust models can offer an effective strategic framework for transforming security schemes in order to accommodate our users’ need for anywhere, anytime access to cloud applications and services.

    During this session we’ll discuss:
    • The Benefits of ID-centric Zero Trust
    • How ID-centric zero trust concepts can address the fast moving needs related to COVID-19
    • The advantages of identity-centric zero trust for modernizing IAM schemes
  • How to Leverage Cloud Transformation to Improve Security Profile and Compliance Recorded: Sep 24 2020 57 mins
    Shaun Chen, Director of Sales Engineering, APAC Region at Thales
    While numerous business transformation and technology modernization initiatives are focused on moving significant workloads to cloud infrastructures and platforms, most organizations will continue to operate a combination of data centers, private-cloud and public-cloud resources for the foreseeable future.
    During this session we will discuss the strategic shifts in the threat landscape, how access security can help mitigate those risks by securing cloud apps at the access point, and how access management solutions can help you comply in an agile way with ever evolving regulations.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: IOT & Blockchain: (Hype + Hyperbole)²
  • Live at: Sep 15 2016 11:00 am
  • Presented by: Joe Pindar, Director of Strategy in CTO Office, Gemalto; Adrian Davis, Managing Director (ISC)² EMEA;
  • From:
Your email has been sent.
or close