Hi [[ session.user.profile.firstName ]]

DIY PKI

Public Key Infrastructure (PKI) is a well-known security protocol used by some of the world’s largest governments and top enterprises, but it’s a technology that also affords many possibilities in new and growing industries. Even small to medium sized businesses can greatly benefit from PKI. However, PKI is also often mistakenly perceived as being difficult to deploy. Gemalto is addressing this common misconception. The next webinar in our PKI series, DIY PKI, will walk attendees through the entire process of setting up a PKI environment and how to manage it. We have developed a five step process to make it easy for security professionals to get their PKI system up and running with minimal time spent. The five step implementation method will give you an idea of how to set up a two tier Microsoft PKI infrastructure with Gemalto SafeNet Authentication Manager and SafeNet Luna HSM to perform smart card log on for small to medium sized enterprises.

Attendees of the DIY PKI webinar will learn:

-Challenges of PKI deployment
-Overall PKI integration ecosystem
-Common use cases deployed in enterprises: Smart card logon – What happens in the backgrounnd, email encryption/signing

Step by step implementation steps
oInstall and configure a Hardware Security Module (HSM)
oInstall the root CA and configure it with the HSM
oInstall and configure the issuing CA
oConfigure the permissions of users and create certificate templates
oInstall and configure an authentication manager



For the purpose of this webinar and using Gemalto’s five step propriety approach, we will use our SafeNet line of technologies to demonstrate the implementation of the PKI solution.
Recorded Apr 17 2017 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rae Barton, PKI expert at Gemalto
Presentation preview: DIY PKI
  • Channel
  • Channel profile
  • Where is my Data? Let’s find out... Mar 23 2021 11:00 am UTC 60 mins
    Romi Hamplova - Pre-Sales Consultant, Thales
    The number 1 barrier to a successful data protection strategy is the ability to discover where sensitive data resides. Still over 60% companies are unable to analyze all the data they collect. Thales brought to the market the industry first Next Generation Solution: Data discovery, classification, and protection in a single, integrated Data Security Platform.

    This webinar will discuss one of the first steps to protect your data - find and know what your sensitive data is.

    Join Romi Hamplova, Pre-Sales Manager for Data Protection at Thales UKI, to learn:
    - What do Data Privacy regulations demand with implications on Data Security strategy
    - How can companies streamline the path to compliancy
    - Can you effectively discover both structured and unstructured data?
    - Gain visibility into data classification and risk analysis
    - What is next in the data security life cycle?
    - How can you Discover, Protect and Control with Thales CipherTrust Data Security Platform
  • Beyond Zero Trust: The Future of Continuous and Granular Access Mar 18 2021 6:00 pm UTC 60 mins
    Asad Ali, Senior Technologist, CTO Office, Thales
    The concept of Zero Trust security is not new. The term itself was coined more than a decade ago at Forrester with a general premise that all network traffic should be considered untrusted. Over the years we have seen refinements to this idea by Google in their BeyondCorp publication, Gartner in their definition of CARTA framework, and to complete the circle by Forrester again in Zero Trust eXtended report that explained Zero Trust in the light of current cybersecurity challenges. One of these challenges is fine grained and continuous access to resources and data.

    This Talk will review the history of Zero Trust and then explore how Zero Trust applies to continuous authentication and access. We will discuss the historical trends that have shaped our authentication evolution, and then look at Continuous Access Evaluation Protocol (CAEP) a nascent but promising technology that can fundamentally change how we define and implement Zero Trust in web applications. The role of major players in this effort, such as Thales and Google will be explained.
  • Four steps to modernizing your IAM environment and moving to cloud-based AM Mar 18 2021 2:00 pm UTC 60 mins
    Cas Liddle Senior Solution Architect Africa
    Before the onset of COVID-19, enterprises already had Identity Access Management (IAM) controls in place for company stakeholders working remotely. Enterprises secured applications and digital assets through Single Sign On (SSO), Virtual Private Networks (VPN) or Web Access Management (WAM). But this architecture was designed for only a small number of employees to work outside of company headquarters — with limited access to applications beyond the on-premises network perimeter. However, the pandemic forced enterprises to adapt quickly as most of the workforce shifted to working at home. This posed new challenges for IT teams and CIOs who had not planned on such a massive change.

    Join this webinar, Danna Bethlehem, Product Marketing Director for Authentication, will discuss why Access Management and Authentication is at the heart of enterprise security, how drives a Zero Trust architecture and creates synergies across IT modernisation programs.
  • Make Authentication easy to implement with SafeNet Authentication Service (PCE) Mar 18 2021 7:00 am UTC 60 mins
    Halimjon Sultanov, Pre-Sales Consultant META for Access Management
    SafeNet Authentication Service Private Cloud Edition is an on premises authentication platform making authentication easy and cost effective to implement and manage.

    Our approach has been to design a solution, which takes away many of the traditional pain points in authentication. SafeNet Authentication Service Private Cloud Edition (PCE) can be used to protect access to a variety of access points within your global infrastructure and supports for more than 200 out of the box pre-tested configurations with the leading VPN, SSL VPN, IAM, SaaS, PaaS and VDI solutions.

    The advantages of this solution is that secure any enterprise use cases: network logon, Cloud (SaaS), VDI, VPN, web portals and custom applications.

    Join this webinar in order to learn the benefits and features of this secure on premises authentication platform.
  • Four steps to modernizing your IAM environment and moving to cloud-based AM Mar 17 2021 12:00 pm UTC 60 mins
    Danna Bethlehem, Product Marketing Director for Authentication
    Before the onset of COVID-19, enterprises already had Identity Access Management (IAM) controls in place for company stakeholders working remotely. Enterprises secured applications and digital assets through Single Sign On (SSO), Virtual Private Networks (VPN) or Web Access Management (WAM). But this architecture was designed for only a small number of employees to work outside of company headquarters — with limited access to applications beyond the on-premises network perimeter. However, the pandemic forced enterprises to adapt quickly as most of the workforce shifted to working at home. This posed new challenges for IT teams and CIOs who hadn’t planned on such a massive change.

    Join this webinar, Danna Bethlehem, Product Marketing Director for Authentication, will discuss why Access Management and Authentication is at the heart of enterprise security, how drives a Zero Trust architecture and creates synergies across IT modernisation programs.
  • Finding and Securing Data without Traditional Borders Mar 11 2021 11:00 am UTC 60 mins
    Axel Debray - PreSales Consultant UKI, Thales
    What are the threats and risks from operating online and storing sensitive data, whether that is on-premises or in the cloud and what are the challenges of Internet Governance considering the erosion of traditional borders between Nations?

    Join Robert Carolina, Technology & Cyber Security Lawyer as he explores these considerations, how organisations can retain full ownership of their sensitive data by leveraging strong encryption and key management. Axel Debray from Thales will explore how to discover and classify sensitive data across data stores to give full visibility over your hybrid multi cloud environments and significantly reduce the risk of data leaks using the Thales CipherTrust Data Security Platform.

    Learn:
    • The Benefits of an External Key Manager
    • How to control Encryption Key Lifecycle’s
    • When and How to use Data Encryption
    • How to achieving Data Sovereignty across multiple Public Clouds

    Speakers
    - Robert Carolina, Technology & Cyber Security Lawyer
    - Elton Jones, Director at ID-3
    - Axel Debray, Pre-Sales Consultant at Thales
  • The Business Case for a Cloud-First PKI Strategy Mar 10 2021 6:00 pm UTC 60 mins
    Chris Hickman - Chief Security Officer, Ryan Yackel - VP of Product Management, Blake Wood - Director of Business Development
    The explosion of machine identities, keys, and certificates across multi-cloud and DevOps environments have stretched your on-premise PKI to its limits.

    And with over 62% of organizations currently or planning on outsourcing their PKI, now might be time to evaluate a new approach to PKI for the future.

    In this webinar, we explore the evolving complexity and costs of PKI, how to balance potential risks against those costs, and ways your organization can build the business case for a cloud-first PKI strategy.

    Join Chris Hickman, Chief Security Officer at Keyfactor, and Blake Wood, Director of Business Development at Thales, as they talk:

    - How PKI has evolved and continues to grow in complexity
    - Options for PKI deployment
    - The costs of on-premise PKI
    - The Future of PKI in the cloud
  • Secure Cloud Adoption – Come affrontare in sicurezza le nuove sfide Mar 10 2021 9:00 am UTC 60 mins
    Luigi Vezzoso, Thales Pre-Sales Consultant
    L’adozione del Cloud é un processo che non puó essere procastinato ed impatta tutte le societá indifferentemente dalla loro dimensione e/o organizzazione. Il nuovo paradigma pone sfide importanti ai team di Sicurezza e Compliance. Non é possibile adottare soluzioni cloud native senza introdurre security by-design nella progettazione delle soluzioni.

    Scopriamo insieme come le soluzioni di Data Protection Thales possono agire come elemento di semplificazione dei processi di adozione del cloud.
  • The Cloud Trust Paradox: Keeping Control of Data & Encryption Keys in the Cloud Mar 9 2021 7:30 pm UTC 60 mins
    Paul Hampton, Senior Product Manager, Thales; Anton Chuvakin, Security Solution Strategy, Google
    When it comes to encryption keys, security best practice is all about control and separation between encrypted data at rest and the keys. Google Cloud encrypts customer data at rest by default and offers organisations multiple options to control and manage their encryption keys. For many organisations hosting sensitive data or looking to migrate workloads to the cloud, they require additional control and ownership over their encryption keys in order to meet compliance or internal security requirements.
    In this webinar Anton Chuvakin (Google) and Paul Hampton, Senior Product Manager (Thales), will discuss how Google and Thales are helping organisations address this challenge by exploring use cases where keeping the encryption keys off the cloud may in fact be truly necessary or outweigh the benefits of cloud provider based key management.
  • Keeping our Critical National Infrastructure Secure Recorded: Mar 4 2021 41 mins
    Peter Smith, Senior Sales Engineer, Thales
    As our critical infrastructure becomes more connected, it exposes legacy technologies to the outside world; leaving some vital systems open to exploitation. In recent years, we have seen an increasing number of attacks on critical infrastructure. Governments and industry regulators around the world are now focusing beyond physical perimeter protection to ensure the integrity of the systems used to control our critical infrastructure.

    Join us to explore how encryption is a key element in ensuring the security of SCADA networks and how it needs to deliver against four criteria: Speed, Scalability, Manageability and Affordability to be most effective. We will look at traditional SCADA network provision, the evolving need to secure IoT connected devices, identify network vulnerabilities and discover the benefits of High-Assurance and Network Independent Encryption.
  • TalkingTrust with Thales and DigiCert - PKI Recorded: Feb 24 2021 21 mins
    Brian Trzupek, Senior VP, Product Management at DigiCert, and John Ray, Director of HSM Product Management at Thales
    Public Key Infrastructure (PKI) is the proven framework for securing communications, transactions, network access, data and verifying ownership or authorship. However, traditional PKI deployment can be complicated and time-consuming. Also, if the digital keys are not properly secured, there are risks of a security breach. DigiCert, a leading provider in PKI solutions, has teamed up with Thales, an industry leader in data protection, to provide a “minutes, not months” deployable solution with automation for keeping keys safe and protecting your communications and assets. Join DigiCert and Thales to discover how a modern PKI platform and Thales Hardware Secure Module (HSM) establish roots of trust and drive security.
  • Multi-Cloud options for the Finance Sector from Thales and Fujitsu Recorded: Feb 24 2021 48 mins
    Iain Kothari Johnson, Fujitsu Security Sales Lead (Financial Sector)| Romi Hamplova, Thales Pre-Sales Manager Data Protection
    Fujitsu and Thales have partnered up to look at how financial organisations are expanding their cloud offerings on a global scale and how they are exploring the best security data practices to keep their organisations secure.

    Join the data security team at Fujitsu and Thales as we discuss:
    - The flexibility and benefits of moving to the cloud including how to improve the customer experience with value-added services
    - How to find the balance between innovation and compliance in one of the most regulated industries in the world
    - How to achieve cloud flexibility and data security adopting encryption and key management

    You will learn:
    - The Cloud Data Protection principles on the market
    - The Data Encryption and Key Management options for the finance sector
    - What challenges the finance sector face and what solutions they can implement
    - The Best Practices of gaining control of your encryption keys
  • Grasp Control of your keys in a Multi Cloudy World Recorded: Feb 23 2021 37 mins
    Axel Debray - PreSales Consultant UKI, Thales
    Over 80% of companies are using two and more cloud providers to store sensitive data that needs protection. While encryption is a globally recognized data security principle, how do you control it across environments? The Cloud Security Alliance and Industry Analysts state that encryption keys should be held by customers, so what does that mean in a multi-cloud environment?
    - How do you achieve cloud flexibility and data security, across AWS, Azure, Google cloud, IBM cloud, Salesforce, O365 and on-prem?
    - How do you gain visibility and grasp control of your keys in Multi Cloudy World?

    Join Axel Debray, Pre-Sales Manager for Data Protection at Thales UKI, to discover:
    - What happens if you do not have key visibility and control?
    - What does enterprise key management truly mean?
    - Learn how Thales CipherTrust increases the cloud security
    - Discover how seamless BYOK, HYOK and full key lifecycle management can be
  • Securing the Software Supply Chain Recorded: Feb 16 2021 39 mins
    Paul Hampton, Senior Product Manager, Thales; Kieran Miller, Chief Architect, Garantir
    Supply chain attacks can have catastrophic impacts and are some of the most difficult to prevent. These attacks can cause serious financial, and even national security, consequences and are typically carried out by well-resourced attackers, such as nation-states. In this webinar, we will discuss the anatomy of a supply chain attack and what you can do to prevent your enterprise from falling victim. While some of the ground we will cover is aimed at technology companies, it is relevant to any company that consumes software from a third-party vendor or produces software for internal or external purposes.
  • TalkingTrust with Thales and CyberArk - Privileged Access Management Recorded: Feb 1 2021 20 mins
    Andrew Silberman, Sr Product Marketing Manager at CyberArk, and Blair Canavan, Director of Business Development at Thales
    In this discussion, join experts from CyberArk and Thales to discuss why Identity Security and Privileged Access Management have converged to be a top priority for any organization looking to tangibly reduce risk. You’ll learn how CyberArk and Thales work together to secure the keys to the kingdom using the integrated solution to secure privileged access for all types of users and identities.
  • TalkingTrust with Thales and Red Hat: Securing Containers and DevOps Recorded: Jan 28 2021 19 mins
    Cameron Skidmore, Associate Solutions Architect at Red Hat, and David Madden, Director Business Development at Thales
    Containers and DevOps are being embraced as critical elements of enterprise digital transformation strategies, as this new paradigm provides development teams with an efficient way to build and deploy applications across hybrid cloud environments at scale. Red Hat and Thales have partnered to enable the benefits of DevSecOps to ensure code runs securely and data can be protected effectively. Thales and Red Hat discuss in this video how to enable a secure and scalable DevOps platform to deploy new services efficiently.
  • Retaining control of your encryption keys and data in Google Cloud Recorded: Jan 28 2021 32 mins
    Paul Hampton, Snr Product Manager & Claire Pitman-Massie, Director of EMEA Field Marketing, Thales CPL
    When it comes to encryption keys, security best practice is all about control and separation between encrypted data at rest and the keys. Google Cloud encrypts customer data at rest by default and offers organisations multiple options to control and manage their encryption keys. For many organisations hosting sensitive data or looking to migrate workloads to the cloud, they require additional control and ownership over their encryption keys in order to meet compliance or internal security requirements.
    In the first of our Data Protection Coffee Break Series for 2021, we will discuss how Google and Thales are helping organisations address this challenge by giving customer’s enhanced control over how and when their encryption keys are used to protect and access encrypted data in the cloud.
  • TalkingTrust with Thales and Keyfactor - IoT Security Recorded: Jan 27 2021 21 mins
    Ellen Boehm, VP of IoT Strategy at Keyfactor, and Dave Madden, Director of Business Development at Thales
    In this brief video, you’ll hear from Ellen Boehm, VP of IoT Strategy at Keyfactor, and Dave Madden, Sr. Director of Business Development at Thales, as they discuss the current state of IoT security and share their joint solution for securing the entire IoT ecosystem using Keyfactor Control and Thales Luna HSMs.
  • TalkingTrust with Thales and HashiCorp - DevSecOps Recorded: Jan 21 2021 16 mins
    Chintan Gosalia, Sr. Solutions Engineer at HashiCorp, and Dave Madden, Director of Business Development at Thales
    As organizations adopt DevSecOps principles for rapid application delivery, they are heavily leveraging HashiCorp vault to centrally manage and deliver appropriate secrets to the applications. Vault stores thousands or even millions of highly sensitive secrets in such environments and encrypts them in storage to prevent any unauthorized access. Thales HSM solutions encrypt the Vault master key in a hardware root of trust to provide maximum security and comply with regulatory requirements. In this video, we discuss how organizations can enhance Vault’s security controls by leveraging Thales Luna HSM to meet the most stringent compliance regulations and automate their DevOps processes.
  • TalkingTrust with Thales and Isara - Quantum Recorded: Jan 13 2021 19 mins
    Angelo Fafulo, Director Partnerships & Sales at Isara and Dave Madden, Director of Business Development at Thales
    The Quantum era is quickly approaching, threatening to impact security, as we know it. But how will it really impact you and how can you prepare?

    In this TalkingTrust video you will learn about:
    - The quantum landscape and where we’re at
    - The quantum threat to use cases and industries and how it impacts internet security
    - How crypto agility enables you to quickly react to cryptographic threats
    - How to ensure your IoT devices can remain in use and secure from spoofed software updates
    - Why it’s important to start preparing today with solutions that are readily available
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: DIY PKI
  • Live at: Apr 17 2017 3:00 pm
  • Presented by: Rae Barton, PKI expert at Gemalto
  • From:
Your email has been sent.
or close