Hi [[ session.user.profile.firstName ]]

How to Achieve Zero Trust in Your Access Management Strategy

Zero Trust approaches to security are at the core of key strategic IT initiatives, including cloud and digital transformation. Underlying Zero Trust assumptions rely on a "trust no one, verify everyone" approach, whereby the network, devices, and identities—whether internal or external—should always be assumed to be at risk. A key tenet in this approach is that every device, user, and network flow is authenticated and authorized.
Recorded Aug 7 2020 94 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sol Cates Principal Technologist, CTO Office Thales, Bryan Green BISO Salesforce, John Kindervag Field CTO Palo Alto Networks
Presentation preview: How to Achieve Zero Trust in Your Access Management Strategy
  • Channel
  • Channel profile
  • Trends, Technologies and Challenges of Payments Industry the Irish Market Dec 3 2020 11:00 am UTC 60 mins
    Simon Keates, Head of Payment Strategy
    The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.

    Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry and how Thales can help meet these challenges.
  • Compliance in the payments world leveraging HSMs Nov 25 2020 11:00 am UTC 45 mins
    Darren Burkey - PreSales Consultant, Thales
    Any organisation involved in card payment transactions, from issuance to processing, must be compliant with standards. These are increasingly becoming more robust, detailed and payment-specific to protect customer sensitive data. To meet these standards, HSMs are a mandatory requirement to both protect and support the cryptographic keys and operations throughout the payment transaction.

    As such, HSMs are a critical part of an organisation’s infrastructure and are expected to handle transactions seamlessly, 24/7. Performance, reliability and operating costs are all factors to consider during a procurement selection stage, while the operations team must have the available tools and knowledge to be able to remotely manage the HSMs for configuration, audit and key management, following industry best practise.

    Join Darren Burkey, Pre-Sales Consultant at Thales:
    1) Learn how international standards are driving the payments industry
    2) Explore the best practice guidance to protect payment data and transactions
    3) Discover how HSMs are helping to meet compliance
  • Adopting HSM in the Cloud - Multi Cloud Approaches Nov 19 2020 11:00 am UTC 45 mins
    Manoj Bhati - Pre-Sales Consultant, Thales
    Organisations are electing to move more of their applications to the cloud each year. As they make this transition, they are considering how they port their existing on-premise security solutions to the Cloud.

    Can organisations achieve the same level of security and trust as they enjoy on-premise? Are they able to use the same HSM or should they adopt an HSM service in a multi-cloud environment or hybrid infrastructure?

    Please join Manoj as he explores:
    - The different options for adopting HSMs in the cloud.
    - Using On-premise HSMs and an HSM service in: the Cloud, Multi-Cloud and Hybrid Cloud environments
    - The different use cases that can be addressed
    - How to achieve separation of roles/duties
    - Are the keys under your control?
  • Securing today’s modern High Speed Networks Nov 12 2020 11:00 am UTC 60 mins
    Peter Smith, Senior Sales Engineer, Thales
    Still using yesteryear’s technology to secure today’s modern High Speed Networks?

    Networks have developed incredibly quickly over the last 25 years, from low speed public and private network access to the high speed fibre and Software Defined Networks seen today. However, most of the sensitive data being transferred across modern networks still rely on the performance sapping, bandwidth hungry security technologies introduced decades ago.

    Join Thales on 12th November to learn how ultra-efficient certified network independent encryption can be deployed to secure today’s networks whether private layer 2 or public layer 3 networks with end points located on premise and in the Cloud.
  • Customer Needs: Increasingly Cloudy - Six ways to accelerate your XaaS Revenue Nov 5 2020 11:00 am UTC 60 mins
    Gary Marsden: Cloud Services Director, Thales Cloud Protection & Licensing (CPL)
    Today’s new normal has changed the market for data consumption and accelerated the need to protect data at multiple levels. With a feature-rich and comprehensive portfolio, partnering with an industry leader like Thales will help your business flourish. Our technologies enable you to cross-sell to existing customers, retain higher revenues per partner contract and increase stickiness for customer retention. It helps open doors to new markets, obtain new customers and enables you to wrap value add services as a competitive differentiator.

    Join Gary Marsden, Cloud Services Director to learn more about how the Thales New Normal provides unrivalled growth opportunities with zero investment, through data protection on demand, that can help accelerate your client revenues
  • Increase VMware Encryption Security with Thales Key Manager Oct 28 2020 11:00 am UTC 60 mins
    Axel Debray - PreSales Consultant UKI, Thales
    The Industry leading virtualisation platform VMware vSphere® protects virtual machine files, virtual disk files, and core dump files with VMware vSphere VM Encryption introduced in vSphere 6.5. The solution leverages the Key Management Interoperability Protocol (KMIP) for encryption key management and key vaulting. vSphere can be used with the CipherTrust Manager from Thales to provide the full range of protection for key management and role separation.

    The combined solution delivers non-disruptive encryption, ensuring the security of VMs, the applications they run and the sensitive data they process. The combination provides a cost-effective and comprehensive solution that meets the most stringent security requirements. Leveraging hardware-based data encryption ensures no adverse impact to system performance.

    During this webinar you will learn

    • Why encrypting VMWare is important for your organisation
    • How to integrate Key Management with VMWare
    • What the different VMware encryption methodologies are
    • Benefits of using an external Key Manager with VMware
    • How to meet compliance and security requirements with FIPS compliant solutions
  • payShield 10K – the future of payment protection Oct 13 2020 12:00 pm UTC 60 mins
    Simon Keates, Head of Strategy, Payment Security at Thales and Cas Liddle, Sr. Solutions Architect at Thales
    You can rely on payShield 10K payment HSM to deliver the protection, performance, and operational efficiency needed to confidently secure digital payments.

    This informative webinar will cover:

    payShield 10K new product features and its benefits 
    Roadmap and what's new to come
    How to be compliant in the payment industry
    Six steps to migrate to payShield 10K
  • 金融業界のDXを取り巻くデータ脅威の動向、各組織の取り組みを解説 Oct 1 2020 3:00 am UTC 45 mins
    タレスジャパン株式会社、クラウドプロテクション&ライセンシング、シニアテクニカル スペシャリスト 畑瀬 宏一

    第1回のウェビナーは、「2019年タレス データ脅威レポート 金融サービス版」から、100の米国金融サービス組織の回答者からの調査結果をまとめた具体的なデータ結果に基づき解説してまいります。金融業界におけるDXが、金融サービスの機密データにどのような影響を与え、各組織はその保護にどう取り組んでいるのか、マルチクラウド利用が増加する中で、法規制に対応しながら効果的に機密データを保護することの重要性について考察していきます。

  • アクセス管理でOffice 365を保護するベストプラクティス Recorded: Sep 29 2020 41 mins
    タレスDIS CPLジャパン株式会社、IAM事業本部 担当部長、 芳賀 悟
    タレスのSafeNet Trusted Accessを利用すると、この質問に「はい」と答えることができます。
  • Securing Cloud Apps with Next Gen Access Management Solutions (Live Demo) Recorded: Sep 25 2020 60 mins
    Umesh Arya, Regional Sales Engineer, Identity & Access Management, Thales
    Simplifying and securing access to the cloud is becoming more complex for IT security teams. Today's enterprises use, on average, 29 different cloud applications and services. In fact, 10% of organizations use more than 100 cloud services. In addition, cloud services are seen as one of the leading source of data breaches.

    This session will discuss how IT security teams can simplify secure access to the cloud while providing a more simple and seamless way for employees to access cloud services without having to worry about password fatigue. This session will also include a live demonstration of SafeNet Trusted Access, Thales' cloud-based access management solution.
  • How to Think Ahead of the Attacker: Taking Control of Security in the Cloud Recorded: Sep 25 2020 55 mins
    Welland Chu, Director of Business Development for APAC Region at Thales; Harry Pun, Cybersecurity Executive, Microsoft
    There is an old Chinse saying, where there is opportunity there is also risk. This applies to the digital transformation journey many businesses are undertaking today. Businesses are driving significant digital transformation initiatives in order to accelerate performance and create new opportunities. Much of this transformation is being powered by the cloud. This means that more data and information is being stored in the cloud, creating significant risk especially for cyberattacks and data breaches. This interactive Tech Talk will discuss the challenges of maintaining a strong security posture in the cloud and how to think ahead of attacks before placing sensitive data in the cloud. This session will also present a playbook of practical steps organizations should follow for cloud security.
  • Putting Continuous Security First in Your Cloud-first Strategy Recorded: Sep 24 2020 48 mins
    Sundaram Lakshmanan, CTO, CipherCloud; Danna Bethlehem, Dir. of IAM Prod. Mktg., Thales; Haider Iqbal, Dir. Bus Dev., Thales
    Cloud adoption is the stepping stone for any organization’s digital transformation initiative. As digital-native businesses emerge, and incumbent businesses embark on their journey to transform their internal and external processes; IaaS and SaaS become the very fabric of the business. But as the adoption of cloud services evolves, so does the threat landscape. Often, IT teams find themselves scrambling to keep pace with business needs because their age-old perimeter-based security controls were not built to scale in today’s digital world.

    Join Thales and CipherCloud experts to learn how to navigate this very fluid threat landscape with solutions that scale up with your business needs, and help you achieve the true potential of your digital transformation objectives.
  • Securing the Application Development Lifecycle at the Speed of DevOps Recorded: Sep 24 2020 57 mins
    David Zendzian Exec. Tech Advisor, VMware Tanzu; Steve White, Exec. Tech Advisor, VMware Tanzu; Rohini Deepak, Thales
    Organizations making the digital transformation have a lot of considerations to make with compliance being one of the most important. In navigating security for digital transformation, it is easy for organizations to fall into the trap of addressing just the most basic compliance obligations first before fully grasping more complex issues that have implications in the software development lifecycle.

    In this session, Thales and VMware Tanzu will discuss how they work together so security serves as a tool that facilitates the transition to the ‘cloud-native’, DevOps world. Attendees will also learn how the collaboration between VMware Tanzu and Thales eases the friction business leaders face in digitally transforming their organizations.
  • Securing Cloud Access with Continuous Access Evaluation Protocol (CAEP) Recorded: Sep 24 2020 51 mins
    Asad Ali, Senior Technologist, Thales; Atul Tulshibagwale, Software Eng., Google; Haider Iqbal, Dir. of Biz Dev, Thales
    Seamless authentication and continuous access to online resources has been an elusive target. While many have tried, few have been able to achieve it. The ones who claim success have built it on proprietary protocols and niche implementations that only address a small spectrum of digital security industry. In this talk we describe Continuous Access and Evaluation Protocol (CAEP), a new approach to cybersecurity using a user’s complete online footprint collected through a collaborative exchange of events and signals between multiple parties. CAEP was started by Google, and now has support of many key players in identity and security industry including Microsoft, Cisco, SailPoint, Amazon, Ping and Thales. We will explain how CAEP can help deliver Zero Trust by providing signals and events as input to machine learning capabilities, and thereby address current challenges around continuous access to online resources.
  • Managing Keys in the Google Cloud Platform Recorded: Sep 24 2020 57 mins
    Sol Cates, Principal Technologist, CTO Office at Thales and Il-Sung Lee, Senior Product Manager at Google
    In this Tech Talk, you will hear about approaches and be able to ask questions about how to manage and secure the keys to encrypted data in the Google Cloud.
  • Network Data Encryption: The Key to Cloud Security Recorded: Sep 24 2020 70 mins
    Julian Fay, CTO, Senetas; Stan Mesceda, Senior Product Manager, Network Encryption, Thales
    Ensuring secure access into cloud infrastructure is the best defence for cloud computing. Modern cloud services must accommodate any-any connectivity amongst a wide range of devices, applications and third parties across the Internet and other communication channels.

    Network encryption provides essential intrinsic protection for cloud services and is mandated in many laws and regulations.

    Today’s network encryption devices must handle intensive encryption algorithms, operate across a diverse range of cloud architectures and connectivity and be future proof against emerging threats.

    In this session Stan Mesceda and Julian Fay will discuss the importance of providing encrypted network access into cloud environments and give strategies for managing the security of cloud environments today and into the future using the Thales HSE product family.
  • Rethinking Cloud Marketplaces Recorded: Sep 24 2020 39 mins
    Tarik Faouzi, VP Cloud Solutions at CloudBlue; Gary Marsden, Senior Director, Cloud Services, Thales
    There is no shortage of cloud services. While most organizations think of AWS, Azure and Google as the go-to destinations for software, infrastructure and platform as a services offerings, there are also other emerging marketplaces for cloud services. These marketplaces aggregate cloud services from multiple other providers and so give end users the same ability to consume services on-demand with simple pricing and billing but across multiple vendor offerings. In this session you learn more about these types of marketplaces, how they deliver and deploy services and how we are right at the tip of the iceberg in terms of changes in the cloud marketplace world. Tarik Faouzi from CloudBlue and Gary Marsden from Thales will provide an overview of the market changes, how to best leverage cloud based marketplaces and the associated processes to maximum benefit for your organization.
  • Smart Data Security - Reducing noise on your network Recorded: Sep 24 2020 39 mins
    Manoj Bhati - Pre-Sales Consultant, Thales
    Organisations are receive hundreds if not thousands of alerts and reports every single day. Not only that, but organisations are using a many different security solutions from multiple vendors. All of these solutions are creating and sending alerts. This is their window to know if they are under attack. The resulting data means it is difficult for organisations to look into and respond, not to mention the false positives and the red herrings. Companies are becoming Cyber Fatigued.

    Thales provide solutions that allow customers to encrypt data at a given layer. With encryption in place any alert below this layer can be handled at a lower priority. We help organisations in prioritising the logs they are receiving and reducing the noise in the network by using encryption.
  • Driving Access Management Adoption in Large Enterprises - APAC Edition Recorded: Sep 24 2020 58 mins
    Eric Avigdor, Director of Product Management, IAM, Thales; Asaf Lerner, Business Development Manager, Thales
    Strategic IT initiatives such as O365 adoption, MFA consolidation, SSO for All alongside compelling events such as COVID 19 – often drive enterprise IT modernization. At no time is this more relevant than the present, when cloud adoption, accelerated by the need to support work from home, has exposed many weaknesses in existing on-premises legacy schemes.

    This session will discuss why Access Management and Authentication is at the heart of enterprise security and how drives a Zero Trust architecture and creates synergies across IT modernization programs and present a technical demonstration of how a cloud-based access management can simplify user access to cloud services and enterprise apps.
  • Identity-Centric Zero Trust Models for a Multi-Cloud World - APAC Edition Recorded: Sep 24 2020 40 mins
    Danna Bethlehem, Director of Product Marketing, Thales
    The need to enable mass work from home has exposed weaknesses in existing on-premises security solutions. As traditional security perimeters disintegrate, the login point becomes the front line of enterprise security.

    Now is the time to rethink how identity-centric Zero Trust models can offer an effective strategic framework for transforming security schemes in order to accommodate our users’ need for anywhere, anytime access to cloud applications and services.

    During this session we’ll discuss:
    • The Benefits of ID-centric Zero Trust
    • How ID-centric zero trust concepts can address the fast moving needs related to COVID-19
    • The advantages of identity-centric zero trust for modernizing IAM schemes
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Achieve Zero Trust in Your Access Management Strategy
  • Live at: Aug 7 2020 6:30 pm
  • Presented by: Sol Cates Principal Technologist, CTO Office Thales, Bryan Green BISO Salesforce, John Kindervag Field CTO Palo Alto Networks
  • From:
Your email has been sent.
or close