Hi [[ session.user.profile.firstName ]]

payShield 10K: features and benefits (Turkish language)

Sercan Koc will illustrate the features and benefits of payShield 10k. This webinar is organsied with Verisoft Software
Recorded Dec 3 2020 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sercan Koc, Sales Engineers for Turkey and Greece and Batuhan Celikkol Sales Manager Verisoft Software
Presentation preview: payShield 10K: features and benefits (Turkish language)
  • Channel
  • Channel profile
  • Cybersecurity in ASEAN: Why Hardware-based PKI is on the Rise Aug 26 2021 5:00 am UTC 60 mins
    TAN Heng Hiang, IAM Regional Sales Director, Thales DIS CPL ASEAN; Chin Jien Lau, Technical Consultant, Versasec APAC
    In this webinar, Thales hosts its technology partner, Versasec, a leader in identity and access management that provided customers with a secure solution for managing digital identities. With its flagship product, vSEC:CMS S - Series, Versasec eases the deployment of physical and virtual smart cards for enterprises of any size.
    Participants in the webinar will learn about PKI trends in ASEAN, why hardware-based PKI is the one of strongest and most effective cybersecurity solutions and how it enables a Zero Trust ecosystem.
    During the talk, experts from both Thales and Versasec will address customer challenges, discuss real-life use cases, and will explore the advantages of multifactor authentication.
    Key Discussion Points:
    1. What are the business customer requirements, and why should enterprises use strong authentication?
    2. Why hardware-based PKI and what are its benefits for enterprises?
    3. The advantages of hardware-based PKI versus other two-factor authentication solutions.
    4. Use cases from ASEAN that focus on SAM migration and work-from-home situations.
  • Secure Tertiary Data Backup (STDB) is Coming Aug 25 2021 7:00 am UTC 60 mins
    Chris Mo, Partner, PwC; Karl Lee, Commvault; Benjamin Hui, NetApp; Wood Lam, Thales DIS CPL
    The Hong Kong Monetary Authority (HKMA) has instructed banks to “critically assess” the need for setting up a Secure Tertiary Data Backup (STDB) to guard against destructive malwares like ransomwares. In response to the HKMA’s call, the Hong Kong Association of Banks (HKAB) formed a STDB Taskforce to oversee the development of the guidelines. Authorized Institutions (AIs) in Hong Kong are expected to submit a report containing the result of their assessment to the HKMA by November 2021.

    The STDB Guideline contains eight principle-based guidelines that AIs could consider to enhance their controls for recovering and restoring critical data to facilitate the resumption of critical functions, services and systems in a prompt manner in the event of destructive cyber-attacks, such as ransomware attacks.
    Thales, together with the Commvault and NetApp, the industry leading vendors in data management, backup and recovery to co-host a webinar to share the latest update about the latest STDB guidelines, its related solution design and implementation. This webinar will be also featuring PwC that was appointed by the HKAB to formulate the STDB principle-based guidelines.
    Come join this webinar to learn:
    - High-level consideration and preparation on STDB implementation
    - Protection against malicious attacks with data encryption, immutable point-in-time image and WORM retention
    - Data backup and recovery plan that is timely, secure, resilient and cost-optimized
    - Protection and management for cryptographic keys
    - A holistic data backup and protection offerings to meet the stringent security requirements

    Speakers:
    Chris Mo, Partner, Risk Assurance, PwC
    Karl Lee, Director, Sales Engineering, Commvault
    Benjamin Hui, Solutions Engineer, NetApp
    Wood Lam, Security Consultant, Cloud & Protection Licensing, Thales
  • タレス暗号鍵管理製品活⽤事例のご紹介 Recorded: Aug 2 2021 26 mins
    タレスDIS CPLジャパン株式会社、CPL (クラウドプロテクション&ライセンシング) データプロテクション事業本部、 セールスエンジニアリングマネージャ、CISSP、⾈⽊康浩
    大規模な情報漏洩事件によってデータ侵害への危機意識が高まってきており、暗号化と鍵管理は、データ侵害に対するガバナンス強化への対策需要として機密データの保護に欠かせないセキュリティソリューションです。機密情報を暗号化していれば、たとえ盗まれても解読不可を実現することができます。

    鍵と機密情報を同じ場所で管理した場合、暗号鍵の漏洩が発生した場合は複合化が可能になりますが、鍵を鍵管理システムに保管した場合、たとえ暗号データが漏洩しても情報を解読することが難しくなります。暗号データと暗号鍵の分離が非常に重要になってくるのです。ランサムウェアの攻撃を受けた場合でもこの方法が有効です。本セミナーでは、タレスが提供する鍵管理システムや暗号化ソリューションを実際に導入いただいたお客様の活用事例をご紹介するとともに、仮想環境のデータ暗号についてもご紹介します。
  • 世界のガイドラインが要求する暗号化と鍵管理のご紹介 Recorded: Jul 29 2021 21 mins
    タレスDIS CPLジャパン株式会社、CPL (クラウドプロテクション&ライセンシング)  データプロテクション事業本部、セールスエンジニアリングマネージャ、CISSP、⾈⽊康浩
    暗号化と鍵管理は、機密データの保護に欠かせないセキュリティソリューションであり、アンチウィルスやファイアーウォール等だけでなく、多要素認証と暗号化、鍵管理も標準で実装すべき時代に突入しています。
    大規模な情報漏洩事件によってデータ侵害への危機意識が高まってきており、データ侵害に対するガバナンス強化への対策需要として、暗号化・鍵管理はますます重要性を増してきています。

    本セッションでは、香港、シンガポールのコンプライアンス事情、国家サイバーセキュリティに対するホワイトハウス行政命令を例にとり、世界のコンプライアンス要求に対する対応、また、顧客情報漏洩の事例から
    データの暗号対策をしている企業としていない企業で、GDPRの制裁金の差がどれくらいあったのか等の事例をご紹介します。また、日本の暗号と情報利用の取り組みについても述べ、暗号化と鍵管理はなぜ重要なのかについて考えていきます。
  • SSO(シングルサインオン)MFA(認証強化)のIDaaS (SafeNet Trusuted Access)とトークン、カードのご紹介 Recorded: Jul 28 2021 21 mins
    タレスDIS CPLジャパン株式会社 クラウドプロテクション&ライセンシング IAM事業本部、担当課長 (Senior Inside Sales Representative)、瀬尾 雄一郎 (Yuichiro Seo)
    タレスは、クラウドおよびWebシングルサインオン(SSO)の利便性ときめ細かいアクセスセキュリティを組み合わせた、クラウドベースのアクセス管理サービス「SafeNet Trusted Access」を提供しています。
    ここでは、「SafeNet Trusted Access」の主な利点・特長を、以下のポイントでご紹介しています。

    - 様々なクラウド、アプリケーションのサポート
    - シナリオベースのアクセスポリシー定義
    - 幅広い様々な認証メソッドを提供
    - ユーザー変更に伴う自動化ワークフロー
    - レポーティング機能による可視化

    また、PKIやFIDOの採用についての確認ポイントについてもご紹介しています。
  • ゼロから始めるゼロトラストセキュリティ Recorded: Jul 28 2021 13 mins
    タレスDIS CPLジャパン株式会社、クラウドプロテクション&ライセンシング IAM事業本部、担当課長 (Senior Inside Sales Representative)、瀬尾 雄一郎 (Yuichiro Seo)
    昨今、ゼロトラストセキュリティという言葉をよく耳し、その重要性が注目されていますが、そもそもゼロトラストセキュリティとはどういった概念なのでしょうか?
    ここでは、ゼロトラストセキュリティの定義、日本市場におけるゼロトラストの採用状況、そして、クラウドおよびWebシングルサインオン(SSO)の利便性ときめ細かいアクセスセキュリティを組み合わせた、クラウドベースのアクセス管理サービス「SafeNet Trusted Access」を提供するタレスが推奨するNIST要件に基づくゼロトラストセキュリティの構築方法をご紹介いたします。
  • A Single Platform to rule them all - Control your data, encryption and keys Recorded: Jul 20 2021 44 mins
    Romana Hamplova - Cyber Security Specialist, Thales UKI
    Encryption has shown to be one of the strongest solutions to support most organisations' data protection strategy. However, the growing number of data encryption tools (and respective key managers) for on-premises and cloud systems, increases complexity and reduces visibility. Ultimately resulting in unexpected costs and security risks.

    Join Romana Hamplova to discover:
    • How you can centrally manage all your encryption keys from a single pane of glass and simplify auditing
    • How CipherTrust Manager can help you gain full control and visibility over your encryption keys
    • How CipherTrust Manager delivers enterprise-grade key management and encryption for leading software and hardware vendors solutions
    • The added benefits of a unified data security platform to reduce cost and minimise risk
  • Embracing C-RAF 2.0 to Data-at-Rest Security Recorded: Jun 29 2021 56 mins
    Shangyan Chen, Director, Sales Engineering, Thales CPL / Herman Sin, Manager, Cyber Security, PwC
    The Hong Kong Monetary Authority has recently introduced the enhanced Cybersecurity Fortification Initiative (CFI) 2.0 to improve and address the state of cybersecurity banking systems in Hong Kong with a structured implementation timeline starting in mid-2021.
    With most banks currently in the Cyber Resilience Assessment Framework (C-RAF) assessment implementation phase, some are facing compliances challenges with C-RAF requirements, i.e, applying a data protection strategy in data tokenization and encryption; as well as iCAST Simulation.
    In this upcoming webinar, experts from Thales and PwC will share insights on the C-RAF 2.0 and how the banking sector can apply the C-RAF assessment. This webinar will discuss the following topics:

    We’ll cover the following:
    • Tips and techniques to debunk C-RAF 2.0 framework
    • Key root causes identified from iCAST Exercises
    • Real-world use cases sharing on C-RAF assessment: challenges in sensitive data protection
    • Using C-RAF to prepare better for data protection and encryption strategy
  • Data Security & Privacy Measures in Cloud Recorded: Jun 28 2021 60 mins
    Sankarson Banerjee, RBL Bank; Lakshmi N. Kaliyaperumal, Infosys; Sameer S. Jaini, The Digital Fifth; Rana Gupta, Thales
    Digital Transformation is leading in growing trend in adoption of cloud journey and multi-cloud strategy for the organizations. With workloads moving in cloud, the concerns regarding data security and privacy has been the major focus areas for the organizations today. Joining us are leaders from the industry who will be discussing security & privacy measures to consider during the cloud adoption journey.

    [Panelists]
    - Sankarson Banerjee, CIO, RBL Bank
    - Lakshmi Narayanan Kaliyaperumal, Vice President & Head, Cyber Security Technology & Operations, Infosys Limited
    - Sameer Singh Jaini, CEO, The Digital Fifth
    - Rana Gupta, APAC Regional VP, Data Protection, Thales - Moderator
  • 데이터 보안을 위한 효과적인 방안 (Effective way of protecting sensitive data) Recorded: Jun 24 2021 48 mins
    구병춘 (ByoungChoon Koo), Senior Solution Engineer, Thales
    민감 데이터 보안을 위해 암호화가 널리 적용되고 있습니다. 하지만 단순히 암호화만으로는 법적 규제와 보안성을 모두 확보하기는 쉽지 않습니다. 탈레스는 CipherTrust Data Security Platform 을 통해 민감데이터의 검출, 보호, 접근 관리를 하나의 플랫폼에서 구현함으로써 보다 손쉽고 효과적으로 법적 규제 충족 및 보안 요구 사항을 동시에 만족시킬 수 있습니다.

    Data encryption is widely adopted on many enterprise and organization. But just encrypting data is not that to meet the compliance and security best practice. Thales provides CipherTrust Data Security Platform to discover, protect and control the sensitive data on the single pane of glass so that the enterprise and organization can resolve data matter easily and effectively. (presented in Korean)
  • 多雲世界的資料保護策略 (Data protection strategy for a multi-cloud world) Recorded: Jun 23 2021 55 mins
    陳昶旭 - 大中華區暨韓國資深技術顧問 (Jeff Chen, Manager of Sales Engineer - Greater China & Korea, Thales)
    企業越來越依賴於多雲或混合雲架構來滿足特定的業務需求。儘管這些是基於可用性和工作量分攤的選擇,但是這些多方面及複雜的環境也同時帶來了更多的安全漏洞威脅,於開發系統,個人和組織,並給管理加密密鑰帶來困難。 在此網絡研討會中,我們將探討確保外包環境中數據安全的選項,以及如何保持對加密策略的控制,並確保安全使用敏捷環境。

    Companies are becoming increasingly reliant upon multi-cloud or hybrid cloud options to meet specific business needs.Despite their options on availability and workload offsetting, these multi-faceted environments come with advanced threats in the form of security gaps which can be used to exploit systems, individuals and organizations, as well as presenting difficulties in managing encryption keys.

    In this webinar, we will look at the options to ensure data security in an outsourced environment and how you can maintain control of encryption policies, and be able to ensure secure use of agile environments.
  • Network Data Security Vulnerabilities: Cybersecurity Survey Reveals Weaknesses Recorded: Jun 17 2021 57 mins
    Julian Fay, CTO, Senetas; Stan Mesceda, Senior Product Manager for Network Encryption, Thales
    More data is in motion than ever before—a trend that will continue in line with the steep cloud adoption and digital transformation curves, as well as the significant impact of the COVID-19 pandemic on remote working. A number of important factors have significantly increased demand for, and dependency on, high-speed wide-area networks. These include workloads migrating to and from the cloud, real-time global collaboration, big data and cloud data storage, 5G and the expectation of higher bandwidth out to the edge and need for larger and faster aggregation points.
    However, only 54% of enterprises feel confident their network security will protect them against cyber threats. As organizations of all sizes continue to adopt connected technologies in support of Cloud Services, Mobility, CCTV, BYOD and Business Continuity; their increased network traffic expose them to increased data in motion security risks. A global research report of IT and cybersecurity decision-makers highlights serious concerns about the security of data in motion across networks. Assess where your organization ranks amongst these findings. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption.
  • Where IT meets Telco: The End-to-End Solutions Needed for 5G Security Recorded: Jun 17 2021 40 mins
    Chen Arbel, VP, 5G Business Development, Thales
    The impacts of 5G on our daily life will be massive, with promises of high-speed connections, ultra-low latency, and long battery life for low-power IoT devices. This fifth-generation telecom standard shifts the underlying networks to software-centric open architectures. This openness speeds innovation but also introduces security risks.

    In this session, hear from industry-leading experts in the 5G field, as they discuss the security challenges facing modern Telco, and how Thales is uniquely positioned to help address these challenges to enable continued innovation.
  • Recent Advances in Cloud Key Management Recorded: Jun 17 2021 48 mins
    Leonor Jones, Director of Product Management, Thales; Eric Wolff, Senior Product Marketing Manager, Cloud Key Management
    Cloud key management began with bring your own key (BYOK) and hold your own key (HYOK) offerings from cloud providers are multiplying. In this session, Leonor Jones and Eric Wolff will provide a quick introduction to cloud key life cycle management followed by a live conversation between Leonor Jones and Eric about the lastest advances in cloud key management.
  • Protecting credentials, data, and secrets in a containerized DevOps environment Recorded: Jun 17 2021 29 mins
    Dave Meurer, Red Hat; Evan Litwak, CyberArk; Rohini Deepak, Senior Manager, Strategy, Thales
    Industry leaders from CyberArk, Red Hat, and Thales will discuss how the strength of our portfolios come together to protect credentials, data, and secrets in modern containerized DevOps environments. Learn how the combination of Red Hat OpenShift Container Platform, CyberArk Conjur, CyberArk Privileged Access Manager, Thales CipherTrust Data Security Platform, and Thales Luna HSMs provide end-to-end encryption, secrets & key management for the DevOps community to build secure cloud-native applications.
  • Flexible Crypto with Uncompromised Trust: Security to Meet Your Business Needs Recorded: Jun 17 2021 37 mins
    Paul Hampton, Senior Product Manager, Thales
    Maintaining digital security best practices and ensuring business continuity in challenging times does not mean compromising on confidentiality and integrity. Next generation Thales Luna Hardware Security Modules (HSMs) can provide an uncompromised foundation of digital trust across cloud, on-premises and hybrid environments.

    Join us to discover how Thales Luna HSMs give you the flexibility to run your business the way you want, and to manage your business continuity seamlessly and securely.

    We’ll focus on different use cases that will help you understand how your organization can:

    - safeguard digital identities, applications and sensitive key materials with flexible deployment and billing models
    - move freely between on-premises, cloud, hybrid and multi-cloud environments
    - securely migrate, scale and backup HSMs regardless of your environment
    - meet compliance needs with an HSM root of trust
  • Network Data Security Vulnerabilities: Cybersecurity Survey Reveals Weaknesses Recorded: Jun 17 2021 55 mins
    Stan Mesceda, Senior Product Manager for High-Speed Encryption, and Julian Fay, CTO at Senetas
    More data is in motion than ever before—a trend that will continue in line with the steep cloud adoption and digital transformation curves, as well as the significant impact of the COVID-19 pandemic on remote working. A number of important factors have significantly increased demand for, and dependency on, high-speed wide-area networks. These include workloads migrating to and from the cloud, real-time global collaboration, big data and cloud data storage, 5G and the expectation of higher bandwidth out to the edge and need for larger and faster aggregation points.
    However, only 54% of enterprises feel confident their network security will protect them against cyber threats. As organizations of all sizes continue to adopt connected technologies in support of Cloud Services, Mobility, CCTV, BYOD and Business Continuity; their increased network traffic expose them to increased data in motion security risks. A global research report of IT and cybersecurity decision-makers highlights serious concerns about the security of data in motion across networks. Assess where your organization ranks amongst these findings. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption.
  • The CipherTrust Data Security Platform for Developers: Offerings & Vision Recorded: Jun 17 2021 39 mins
    Marc Seguin, Director of Engineering, Thales; Eric Wolff, Senior Product Marketing Manager, Thales
    Software developers don't need to be crypto experts, or source, use, and store in dangerous places poor-quality keys. With CipherTrust Application Data Protection, devops gets a solution for integrating data protection into applications with a secure key source and repository, and then sending those applications into production. In this session, Eric Wolff will provide a quick introduction to the application-level data protection tools in the CipherTrust Data Security Platform, followed by a live conversation between Marc Segiun and Eric about the Thales vision for app-layer data protection.
  • Any Time, Any Way, Anywhere: Trends Accelerating the Payments Market Recorded: Jun 17 2021 48 mins
    Claire Pitman-Massie, Sr. Director, EMEA Field Marketing, Thales; Simon Keates, Head of Payment Security Strategy, Thales
    Rapid adoption of contactless and alternative payment methods, increase use of cloud technologies, and significant changes to consumer spending habits have required organisations to rethink their strategies to address changes to internal and external requirements. In this session Simon and Claire will discuss the significant trends that emerged in 2020, trends for 2021 and beyond, and the security implications that need to be considered by organisations to ensure that they remain compliant and maintain the security of their customers’ data.
  • Flexible Crypto with Uncompromised Security to Meet Your Dynamic Business Needs Recorded: Jun 17 2021 30 mins
    Paul Hampton, Cloud Security Expert, Thales
    Maintaining digital security best practices and ensuring business continuity in challenging times does not mean compromising on confidentiality and integrity. Next generation Thales Luna Hardware Security Modules (HSMs) can provide an uncompromised foundation of digital trust across cloud, on-premises and hybrid environments.

    Join us to discover how Thales Luna HSMs give you the flexibility to run your business the way you want, and to manage your business continuity seamlessly and securely.

    We’ll focus on different use cases that will help you understand how your organization can:

    - safeguard digital identities, applications and sensitive key materials with flexible deployment and billing models
    - move freely between on-premises, cloud, hybrid and multi-cloud environments
    - securely migrate, scale and backup HSMs regardless of your environment
    - meet compliance needs with an HSM root of trust
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: payShield 10K: features and benefits (Turkish language)
  • Live at: Dec 3 2020 8:00 am
  • Presented by: Sercan Koc, Sales Engineers for Turkey and Greece and Batuhan Celikkol Sales Manager Verisoft Software
  • From:
Your email has been sent.
or close