Hi [[ session.user.profile.firstName ]]

Implementing Virtualized Network Encryption to Secure SD-WANs

Today enterprises and service providers are increasingly using network functions virtualization (NFV) and software-defined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organizations cost and operational benefits because they move network functions from dedicated hardware appliances to virtual servers. These same technologies can be now be applied to how encryption is deployed and managed to protect sensitive data and communications the flow across SD-WANs.

In this webinar you will learn about:
•What is the best network fit for virtualized encryption
•How to implement a virtual network encryption appliance in software-defined network
•What are the cost, operational and performance benefits of virtual encryption
•What it means to be transport layer independent and how you can protect network traffic simultaneously across Layers 2, 3 and 4
Recorded Jun 21 2018 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stan Mesceda, Senior Product Manager at Gemalto and Julian Fay, CTO at Senetas
Presentation preview: Implementing Virtualized Network Encryption to Secure SD-WANs
  • Channel
  • Channel profile
  • Meet the ‘New Normal’ Challenge by Finding and Protecting Your Sensitive Data Jun 18 2020 1:00 pm UTC 45 mins
    Tzach Kaufmann, Dir of Product Mgt, Data Discovery & Classification & Claire Pitman-Massie, Snr Dir Field Marketing EMEA
    Data protection begins with finding and understanding your sensitive data and its risks of exposure. But, data isn’t limited to traditional perimeters, applications, or data stores anymore. With remote working as the ‘new normal’, an unprecedented number of workers are logging in from diverse locations, personal devices, applications, and cloud accounts, creating new risks for companies. In a rush to maintain business continuity, organizations are likely to overlook critical security considerations, leaving themselves vulnerable to hacking. 
    This webinar will show you an easy and integrated way to discover, classify and protect your sensitive data from a single pane of glass.
  • Thales CipherTrust Data Security: definisci la tua strategia di protezione Jun 18 2020 9:00 am UTC 60 mins
    Luca De Fassi, Thales Presales Consultant e Luigi Vezzoso, Thales Presales Consultant
    Il continuo aumento di dati sensibili, personali e di proprietà intellettuale richiede una strategia aziendale ben definita. Thales CipherTrust Platform permette con una singola piattaforma di ricercare e classificare in modo efficiente i dati, ottenere una chiara visione degli stessi e quindi dei rischi associati, ed infine applicare le azioni necessarie per proteggerli
  • Encrypt Everything in the Cloud. OK, But What About All the Keys? Jun 16 2020 7:00 pm UTC 59 mins
    Charles Goldberg, VP of Data Protection Product Marketing at Thales, and Adrian Lane, Securosis CTO
    With cloud data security, the new mantra is “Encrypt Everything”. And why not. Encryption delivers proven security, automatically addresses existing and upcoming compliance requirements — like California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR) — and is fully integrated into the fabric of the cloud service. But the “just turn it on” mentality abdicates control over data and custodial responsibilities. The reality is that to control and protect your data, you need to own your cloud encryption keys.

    This webinar will review best practices for life cycle management of AWS, Azure, GCP, Salesforce, and other cloud provider encryption with Bring Your Own Key (BYOK).
  • COVID-19’s Impact on How CISOs View Cloud Access Management and Remote Working Jun 16 2020 6:00 pm UTC 45 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    Thales research conducted earlier this year captured the opinions from risk management and cloud security professionals just as the Covid-19 emergency erupted. Three months on, we have a unique vantage point to assess how this data lines up with the way remote access has played out in reality. Join us in this session to hear the latest trends and future directions in IAM as we discuss the findings of Thales’s annual Access Management Index for North America.
  • Secure Your Digital Transformation Journey with Thales and Microsoft Jun 11 2020 2:00 am UTC 90 mins
    Vasupon Thankakan (Vin), Microsoft Azure Business Group Lead; Sarawut Pavasajjanant (Ton), Thales CPL, DIS SecurityConsultant
    พร้อมที่จะปรับเปลียน และ ปกป้องข้อมูลของคุณ ในโลกที่เต็มไปด้วยข้อบังคับ ( regulation ) กับ Thales และ Microsoft (11 มิถุนายน)

    For virtually every organization today, the adoption of cloud services continues to expand — and so does the use of encryption. Join us with your morning coffee and learn how you can embark on your digital transformation journey and securely migrate your applications and data through a combined portfolio of Thales and Microsoft.

    Key Highlights:
    - What is Microsoft Migration Program?
    - How Microsoft manages customer data?
    - What is Bring Your Own Key(BYOK) and Bring Your Own Encryption (BYOE)?
  • Trends, Technologies and Challenges of Payments Industry Saudi Arabia and Levant Jun 9 2020 11:00 am UTC 60 mins
    Simon Keates, Head of Strategy for Payments Security and Omar Hassan, Presales Consultant, Saudi and Levant
    The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.

    Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry, and how Thales can help meet these challenges.
  • Hành trình chuyển đổi số an toàn, bảo mật cùng với Thales và Microsoft Jun 5 2020 2:00 am UTC 90 mins
    Vy (Gavin) Nguyen, Partner Technical Specialist, Microsoft, Huynh Tuan Kiet, Security Solution Manager, HPID
    Ngày nay, đối với hầu hết mọi tổ chức doanh nghiệp, việc áp dụng các dịch vụ đám mây (cloud services) ngày càng có xu thế mở rộng, đồng thời mở rộng hơn việc sử dụng mã hóa. Hãy tham gia buổi trò chuyện trong giờ café buổi sáng của bạn cùng chúng tôi, tìm hiểu cách bạn có thể bắt đầu hành trình chuyển đổi số an toàn và bảo mật cho hệ thống dữ liệu cũng như ứng dụng của bạn - cùng các giải pháp kết hợp của Thales và Microsoft.

    Nội dung chính:
    • Chương trình chuyển đổi lên cloud của Microsoft diễn ra như thế nào?
    • Microsoft quản lý dữ liệu khách hàng ra sao?
    • Giảii pháp quản lý khóa Bring Your Own Key(BYOK) và Your Own Encryption (BYOE) là gì?
  • Como Implantar Pagamentos Instantâneos PIX com Segurança, Escala e Flexibilidade Jun 4 2020 2:00 pm UTC 60 mins
    Abilio Branco, Head of Sales Brazil, Thales CPL Encryption; Murilo Fernandes, Gestor Comercial - EVAL
    O sistema de pagamentos instantâneos PIX promete revolucionar a indústria de pagamentos no Brasil. Mas, instituições financeiras têm que estar alertas para os desafios de segurança, escalabilidade e flexibilidade que são essenciais para o sucesso dos pagamentos instantâneos.

    Participe de nosso Webinar para entender como superar desafios como:

    •Estar preparado para milhões de transações e momentos de pico.
    •Processar transações com o maior nível de segurança.
    •Estabelecer disponibilidade 24x7x365 para uma infraestrutura essencial para a sociedade.
    •Atingir o tempo estimado da transação entre recebedor e pagador menor que 10 segundos.
    •Implementar um sistema escalável, seguro e flexível antes de novembro de 2020.

    HORARIO: 11:00 Horário de Brasília
  • CipherTrust Data Discovery and Classification ile Veri Keşfi ve Şifreleme Jun 4 2020 11:00 am UTC 60 mins
    Erhan Seckin Regional Sales Manager and Sercan Koc, Pre-Sales Consultant (Turkey and Greece)
    Thales olarak uzun süredir beklenen CipherTrust Data Discovery and Classification V 1.0 çözümümüzün satışa çıktığını duyurmaktan büyük mutluluk duyuyoruz.
    DDC ve CipherTrust Platform’u hakkında daha detaylı bilgi için webinar’larımıza katılabilir ve Thales Türkiye ekibimizle iletişime geçebilirsiniz
  • Passwordless authentication can finally put passwords to rest Jun 4 2020 10:00 am UTC 45 mins
    Danna Bethlehem, Product Manager, Access Management & Claire Pitman-Massie EMEA Snr Field Marketing Director
    About a third of firms and organisations in Europe, the Middle East and Africa still believe the humble password is a good enough security measure, according to a survey carried out by Thales. Although stubbornly persistent in our digital lives, the time has come to adopt easier and more secure ways of logging onto online services. Passwordless authentication aims to do just.
    Join us in this coffee break webinar for an insider’s view on passwordless authentication where we’ll discuss:
    ·       What passwordless authentication is
    ·       Whether passwordless authentication is secure
    ·       How you can adopt and implement passwordless authentication in your organization
  • Tech Talk: Secure Access to Hybrid IT Environments Jun 2 2020 5:00 pm UTC 45 mins
    Haider Iqbal, Director of IAM Technology Alliances; Kashyap Merchant, Lead Product Manager, Cloud Security, F5 Networks
    While many organizations are moving more applications to the cloud, there are still many applications that are managed inside the corporate network for security reasons. This hybrid ecosystem of internal and cloud-based applications makes managing access more difficult for security treams, from both security and user experience perspectives. This interactive tech talk with experts from Thales and F5 Networks will discuss best practices for managing secure access to applications in hybrid environments and provide opportunities for participants to ask the experts questions.
  • タレスの暗号化ソリューションで対応できるPCI DSSの要件 Jun 2 2020 1:00 am UTC 45 mins
    タレスDIS CPLジャパン株式会社、データプロテクション事業本部パートナー営業部、部長 前田 俊一
    PCIDSSコンプライアンス対応に留まらず、カード情報や個人情報の保護は企業の責任です。テレワークが増え、クラウドトランスフォーメーションが進む今、データそのものを保護する最後の砦となる暗号化の有効性と、実用例についてご紹介します。
  • Gerenciar o Acesso com Segurança é Crucial para Enfrentar os Desafios Atuais May 28 2020 2:00 pm UTC 60 mins
    Sergio Muniz, VP, LATAM IAM Sales; Rodrigo Eimar, Sr. Sales Engineer
    No novo ambiente global, onde trabalho remoto, serviços digitais, o potencial da nuvem e crimes cibernéticos se tornam um desafio estratégico em qualquer empresa, o gerenciamento do acesso seguro do usuário a aplicativos corporativos é crucial para obter e manter uma vantagem competitiva. A realidade é que apenas 36% das empresas atualmente usam um SSO (Logon Único) inteligente.

    O Thales SafeNet Trusted Access, é uma solução oferecida por meio de um serviço que permite que os funcionários acessem aplicações corporativas com segurança, combinando seu SSO inteligente com políticas de acesso granular e uma ampla variedade de formatos de autenticação proprietários, todos centralizados em um console de administração.

    Participe do nosso webinar para discutir:

    - Tendências do mercado e os resultados do relatório Índice de Gerenciamento de Acesso Thales
    - Como a adoção de aplicativos em nuvem está direcionando a necessidade de consolidar o acesso em uma única ferramenta
    - A gestão de acesso é um crucial, para atender as normas da LGPD, PCI e ISO 27001
    - Como melhorar a experiência do Usuário, utilizando políticas de acesso e o SSO.
    - Duplo fator de autenticação: Modelos para cada tipo de caso.

    HORARIO: 11:00 Horário de Brasília
  • Anatomy of a Crisis – How the Pandemic has Shone a Light on Sensitive Data" May 27 2020 1:00 pm UTC 45 mins
    Graham Wallace, Managing Dir, Senetas Europe & Claire Pitman-Massie, Snr Dir of Field Marketing, EMEA
    The concern around data-in-motion has always been that the information and more importantly, sensitive data, carried is vulnerable to interception, corruption or change. The pandemic has shone an even harsher light on these concerns. As more functions are carried out remotely, and more data is moving, network security and resilience are very much front of mind. Protecting critical infrastructure has never been more important. There is the immediate need to protect vital services and the general need to secure an economic recovery. The increase in attacks on infrastructure over the last few months only serves to highlight the fact that those who wish us harm, or are looking for reward, recognise that this is way to achieve that.
    Join the discussion to find out how to organisations are addressing these concerns without impacting efficiency, productivity or security.
  • Secure Collaboration During a Pandemic May 27 2020 9:00 am UTC 45 mins
    Juilan Fay, CTO, Senetas Corporation & Claire Pitman-Massie, Snr Director of Field Marketing, EMEA, Thales CPL
    Even the best prepared businesses couldn’t have anticipated the overnight shift to mass home working that the Covid-19 pandemic has caused.   Organisations are trying to maximise the productivity of their remote workers while ensuring they maintain a healthy security posture against an increased cyber security risk.  There is an unprecedented need for people to perform simple business tasks such as data-sharing and collaboration above and beyond the ways they have in the past.
    Join us in this webinar to hear the best practice guidelines for secure file sharing and collaboration and to learn the essential security features you should be looking for in the productivity tools you deploy.
  • Secure Your Digital Transformation Journey with Thales and Microsoft May 26 2020 1:00 am UTC 90 mins
    Herns Hermida, Business Group Lead PH, Microsoft; Vina Yee, Data Protection Lead, CPL ASEAN, DIS, Thales
    For virtually every organization today, the adoption of multiple cloud services continues to expand — and so does the use of encryption. As the proliferation of encryption continues, so do the number of keys and the potential risks. Join us with your morning coffee and learn how you can start your digital transformation journey and securely migrate your applications and data through a combined portfolio of Thales and Microsoft.

    Key Highlights:
    - What is Microsoft Migration Program?
    - How Microsoft manages customer data?
    - What is Bring Your Own Key(BYOK) and Bring Your Own Encryption (BYOE)?
  • Evolving Security for an IoT World Recorded: May 21 2020 48 mins
    Gorav Arora, Office of CTO at Thales and Ted Shorter, CTO, Keyfactor
    The Internet of Things (IoT) has transformed our lives, providing convenience, enabling personalization, and changing our expectations of how devices behave. Products have become smarter with an extended usable life, allowing companies to deepen customer engagement through bi-directional touchpoints and enhanced usage analytics.

    With Internet connectivity opening these formerly isolated devices, they are digitally transformed into data hubs – sending and receiving critical information to the end-user and the enterprise. While this flow of data offers enhanced product features and new revenue opportunities, it can introduce security risks to the user and enterprise.

    Join Thales and Keyfactor to learn:
    • The state of IoT security today;
    • Best practices for securing the entire IoT ecosystem and product lifecycle – from development, manufacturing, updates, decommissioning; and
    • How a robust, secure PKI process can protect device identities, sign application artifacts in all environments, secure communication channels to and from the device, and ensure authorized access to the device, software and data.
  • Bring your own Encryption to the Cloud (BYOE) Recorded: May 20 2020 31 mins
    Manoj Bhati - Pre-Sales Consultant, Thales
    IT Departments are balancing the need for optimising performance and availability along with how best to ensure heightened security when considering their Cloud adoption. Encryption is the most effective way of securing that data.

    Considerations include: Should organisations rely on cloud native encryption only? Is there any effective Key Management available? Do you have complete control of your keys and a root of trust? Are you protected against the attacks that begin from within the cloud infrastructure?

    Join Manoj Bhati as he uncovers:

    - How can you bring your own encryption in the Cloud.
    - How to have complete control of your keys.
    - The best layer to encrypt your data (application, database, file/folder, etc...)
    - How key management is the most important part in encryption.
    - How organisations can cater for cloud, multi Cloud and hybrid cloud use cases.
  • Gestionar de Manera Segura el Acceso es Crucial para Enfrentar los Desafios Recorded: May 15 2020 52 mins
    Martin Bobbio, Regional Sales Manager for IAM LATAM, Thales CPL
    En el nuevo entorno global, donde el trabajo remoto, los servicios digitales, el potencial de la nube y el cyber crimen se vuelven un reto estratégico en cualquier compañía, gestionar el acceso seguro de los usuarios a las aplicaciones corporativas es crucial para obtener y mantener una ventaja competitiva. La realidad es que solo el 36 % de las empresas utiliza actualmente un Single Sign-On (SSO) inteligente.

    Thales SafeNet Trusted Access, es una solución ofrecida a través de un servicio que permite a los empleados acceder a las redes corporativas de manera segura al combinar su SSO inteligente con las políticas de acceso granulares y una amplia gama de formatos de autenticación propios, todo centralizado en una consola de administración.

    Participe en nuestro Webinar para discutir:
    •Las tendencias del mercado y los resultados de nuestro reporte Access Management Index
    •Cómo la adopción de aplicaciones en la nube está impulsando la necesidad de consolidar el acceso en una sola herramienta
    •Nuestra solución de gestión de acceso (Safenet Trusted Access)
    •Políticas de Acceso, SSO inteligente y Múltiple Factor de Autenticación.
    •Variables para evaluar una solución IDaaS que se adapte a las necesidades actuales.
  • Tech Talk: Cloud Security & Digital Transformation Recorded: May 14 2020 41 mins
    Haider Iqbal, Director IAM Ecosystems, Thales & Chris Gregory, VP of Channel Development & Operations, Saviynt
    The cloud is a critical component of enterprises’ digital transformation journey. But it also opens the enterprise to new threat vectors. Join this interactive Tech Talk with experts from Saviynt and Thales to learn how identity-centric cloud security can help companies address such threats, and make their digital transformation a success.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Implementing Virtualized Network Encryption to Secure SD-WANs
  • Live at: Jun 21 2018 3:00 pm
  • Presented by: Stan Mesceda, Senior Product Manager at Gemalto and Julian Fay, CTO at Senetas
  • From:
Your email has been sent.
or close