Hi [[ session.user.profile.firstName ]]

Beyond Zero Trust: The Future of Continuous and Granular Access

The concept of Zero Trust security is not new. The term itself was coined more than a decade ago at Forrester with a general premise that all network traffic should be considered untrusted. Over the years we have seen refinements to this idea by Google in their BeyondCorp publication, Gartner in their definition of CARTA framework, and to complete the circle by Forrester again in Zero Trust eXtended report that explained Zero Trust in the light of current cybersecurity challenges. One of these challenges is fine grained and continuous access to resources and data.

This Talk will review the history of Zero Trust and then explore how Zero Trust applies to continuous authentication and access. We will discuss the historical trends that have shaped our authentication evolution, and then look at Continuous Access Evaluation Protocol (CAEP) a nascent but promising technology that can fundamentally change how we define and implement Zero Trust in web applications. The role of major players in this effort, such as Thales and Google will be explained.
Recorded Mar 18 2021 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Asad Ali, Senior Technologist, CTO Office, Thales
Presentation preview: Beyond Zero Trust: The Future of Continuous and Granular Access
  • Channel
  • Channel profile
  • Cybersecurity in ASEAN: Why Hardware-based PKI is on the Rise Aug 26 2021 5:00 am UTC 60 mins
    TAN Heng Hiang, IAM Regional Sales Director, Thales DIS CPL ASEAN; Chin Jien Lau, Technical Consultant, Versasec APAC
    In this webinar, Thales hosts its technology partner, Versasec, a leader in identity and access management that provided customers with a secure solution for managing digital identities. With its flagship product, vSEC:CMS S - Series, Versasec eases the deployment of physical and virtual smart cards for enterprises of any size.
    Participants in the webinar will learn about PKI trends in ASEAN, why hardware-based PKI is the one of strongest and most effective cybersecurity solutions and how it enables a Zero Trust ecosystem.
    During the talk, experts from both Thales and Versasec will address customer challenges, discuss real-life use cases, and will explore the advantages of multifactor authentication.
    Key Discussion Points:
    1. What are the business customer requirements, and why should enterprises use strong authentication?
    2. Why hardware-based PKI and what are its benefits for enterprises?
    3. The advantages of hardware-based PKI versus other two-factor authentication solutions.
    4. Use cases from ASEAN that focus on SAM migration and work-from-home situations.
  • SSO(シングルサインオン)MFA(認証強化)のIDaaS (SafeNet Trusuted Access)とトークン、カードのご紹介 Recorded: Jul 28 2021 21 mins
    タレスDIS CPLジャパン株式会社 クラウドプロテクション&ライセンシング IAM事業本部、担当課長 (Senior Inside Sales Representative)、瀬尾 雄一郎 (Yuichiro Seo)
    タレスは、クラウドおよびWebシングルサインオン(SSO)の利便性ときめ細かいアクセスセキュリティを組み合わせた、クラウドベースのアクセス管理サービス「SafeNet Trusted Access」を提供しています。
    ここでは、「SafeNet Trusted Access」の主な利点・特長を、以下のポイントでご紹介しています。

    - 様々なクラウド、アプリケーションのサポート
    - シナリオベースのアクセスポリシー定義
    - 幅広い様々な認証メソッドを提供
    - ユーザー変更に伴う自動化ワークフロー
    - レポーティング機能による可視化

    また、PKIやFIDOの採用についての確認ポイントについてもご紹介しています。
  • ゼロから始めるゼロトラストセキュリティ Recorded: Jul 28 2021 13 mins
    タレスDIS CPLジャパン株式会社、クラウドプロテクション&ライセンシング IAM事業本部、担当課長 (Senior Inside Sales Representative)、瀬尾 雄一郎 (Yuichiro Seo)
    昨今、ゼロトラストセキュリティという言葉をよく耳し、その重要性が注目されていますが、そもそもゼロトラストセキュリティとはどういった概念なのでしょうか?
    ここでは、ゼロトラストセキュリティの定義、日本市場におけるゼロトラストの採用状況、そして、クラウドおよびWebシングルサインオン(SSO)の利便性ときめ細かいアクセスセキュリティを組み合わせた、クラウドベースのアクセス管理サービス「SafeNet Trusted Access」を提供するタレスが推奨するNIST要件に基づくゼロトラストセキュリティの構築方法をご紹介いたします。
  • A Single Platform to rule them all - Control your data, encryption and keys Recorded: Jul 20 2021 44 mins
    Romana Hamplova - Cyber Security Specialist, Thales UKI
    Encryption has shown to be one of the strongest solutions to support most organisations' data protection strategy. However, the growing number of data encryption tools (and respective key managers) for on-premises and cloud systems, increases complexity and reduces visibility. Ultimately resulting in unexpected costs and security risks.

    Join Romana Hamplova to discover:
    • How you can centrally manage all your encryption keys from a single pane of glass and simplify auditing
    • How CipherTrust Manager can help you gain full control and visibility over your encryption keys
    • How CipherTrust Manager delivers enterprise-grade key management and encryption for leading software and hardware vendors solutions
    • The added benefits of a unified data security platform to reduce cost and minimise risk
  • Embracing C-RAF 2.0 to Data-at-Rest Security Recorded: Jun 29 2021 56 mins
    Shangyan Chen, Director, Sales Engineering, Thales CPL / Herman Sin, Manager, Cyber Security, PwC
    The Hong Kong Monetary Authority has recently introduced the enhanced Cybersecurity Fortification Initiative (CFI) 2.0 to improve and address the state of cybersecurity banking systems in Hong Kong with a structured implementation timeline starting in mid-2021.
    With most banks currently in the Cyber Resilience Assessment Framework (C-RAF) assessment implementation phase, some are facing compliances challenges with C-RAF requirements, i.e, applying a data protection strategy in data tokenization and encryption; as well as iCAST Simulation.
    In this upcoming webinar, experts from Thales and PwC will share insights on the C-RAF 2.0 and how the banking sector can apply the C-RAF assessment. This webinar will discuss the following topics:

    We’ll cover the following:
    • Tips and techniques to debunk C-RAF 2.0 framework
    • Key root causes identified from iCAST Exercises
    • Real-world use cases sharing on C-RAF assessment: challenges in sensitive data protection
    • Using C-RAF to prepare better for data protection and encryption strategy
  • Data Security & Privacy Measures in Cloud Recorded: Jun 28 2021 60 mins
    Sankarson Banerjee, RBL Bank; Lakshmi N. Kaliyaperumal, Infosys; Sameer S. Jaini, The Digital Fifth; Rana Gupta, Thales
    Digital Transformation is leading in growing trend in adoption of cloud journey and multi-cloud strategy for the organizations. With workloads moving in cloud, the concerns regarding data security and privacy has been the major focus areas for the organizations today. Joining us are leaders from the industry who will be discussing security & privacy measures to consider during the cloud adoption journey.

    [Panelists]
    - Sankarson Banerjee, CIO, RBL Bank
    - Lakshmi Narayanan Kaliyaperumal, Vice President & Head, Cyber Security Technology & Operations, Infosys Limited
    - Sameer Singh Jaini, CEO, The Digital Fifth
    - Rana Gupta, APAC Regional VP, Data Protection, Thales - Moderator
  • 데이터 보안을 위한 효과적인 방안 (Effective way of protecting sensitive data) Recorded: Jun 24 2021 48 mins
    구병춘 (ByoungChoon Koo), Senior Solution Engineer, Thales
    민감 데이터 보안을 위해 암호화가 널리 적용되고 있습니다. 하지만 단순히 암호화만으로는 법적 규제와 보안성을 모두 확보하기는 쉽지 않습니다. 탈레스는 CipherTrust Data Security Platform 을 통해 민감데이터의 검출, 보호, 접근 관리를 하나의 플랫폼에서 구현함으로써 보다 손쉽고 효과적으로 법적 규제 충족 및 보안 요구 사항을 동시에 만족시킬 수 있습니다.

    Data encryption is widely adopted on many enterprise and organization. But just encrypting data is not that to meet the compliance and security best practice. Thales provides CipherTrust Data Security Platform to discover, protect and control the sensitive data on the single pane of glass so that the enterprise and organization can resolve data matter easily and effectively. (presented in Korean)
  • 多雲世界的資料保護策略 (Data protection strategy for a multi-cloud world) Recorded: Jun 23 2021 55 mins
    陳昶旭 - 大中華區暨韓國資深技術顧問 (Jeff Chen, Manager of Sales Engineer - Greater China & Korea, Thales)
    企業越來越依賴於多雲或混合雲架構來滿足特定的業務需求。儘管這些是基於可用性和工作量分攤的選擇,但是這些多方面及複雜的環境也同時帶來了更多的安全漏洞威脅,於開發系統,個人和組織,並給管理加密密鑰帶來困難。 在此網絡研討會中,我們將探討確保外包環境中數據安全的選項,以及如何保持對加密策略的控制,並確保安全使用敏捷環境。

    Companies are becoming increasingly reliant upon multi-cloud or hybrid cloud options to meet specific business needs.Despite their options on availability and workload offsetting, these multi-faceted environments come with advanced threats in the form of security gaps which can be used to exploit systems, individuals and organizations, as well as presenting difficulties in managing encryption keys.

    In this webinar, we will look at the options to ensure data security in an outsourced environment and how you can maintain control of encryption policies, and be able to ensure secure use of agile environments.
  • Network Data Security Vulnerabilities: Cybersecurity Survey Reveals Weaknesses Recorded: Jun 17 2021 57 mins
    Julian Fay, CTO, Senetas; Stan Mesceda, Senior Product Manager for Network Encryption, Thales
    More data is in motion than ever before—a trend that will continue in line with the steep cloud adoption and digital transformation curves, as well as the significant impact of the COVID-19 pandemic on remote working. A number of important factors have significantly increased demand for, and dependency on, high-speed wide-area networks. These include workloads migrating to and from the cloud, real-time global collaboration, big data and cloud data storage, 5G and the expectation of higher bandwidth out to the edge and need for larger and faster aggregation points.
    However, only 54% of enterprises feel confident their network security will protect them against cyber threats. As organizations of all sizes continue to adopt connected technologies in support of Cloud Services, Mobility, CCTV, BYOD and Business Continuity; their increased network traffic expose them to increased data in motion security risks. A global research report of IT and cybersecurity decision-makers highlights serious concerns about the security of data in motion across networks. Assess where your organization ranks amongst these findings. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption.
  • Where IT meets Telco: The End-to-End Solutions Needed for 5G Security Recorded: Jun 17 2021 40 mins
    Chen Arbel, VP, 5G Business Development, Thales
    The impacts of 5G on our daily life will be massive, with promises of high-speed connections, ultra-low latency, and long battery life for low-power IoT devices. This fifth-generation telecom standard shifts the underlying networks to software-centric open architectures. This openness speeds innovation but also introduces security risks.

    In this session, hear from industry-leading experts in the 5G field, as they discuss the security challenges facing modern Telco, and how Thales is uniquely positioned to help address these challenges to enable continued innovation.
  • Recent Advances in Cloud Key Management Recorded: Jun 17 2021 48 mins
    Leonor Jones, Director of Product Management, Thales; Eric Wolff, Senior Product Marketing Manager, Cloud Key Management
    Cloud key management began with bring your own key (BYOK) and hold your own key (HYOK) offerings from cloud providers are multiplying. In this session, Leonor Jones and Eric Wolff will provide a quick introduction to cloud key life cycle management followed by a live conversation between Leonor Jones and Eric about the lastest advances in cloud key management.
  • Protecting credentials, data, and secrets in a containerized DevOps environment Recorded: Jun 17 2021 29 mins
    Dave Meurer, Red Hat; Evan Litwak, CyberArk; Rohini Deepak, Senior Manager, Strategy, Thales
    Industry leaders from CyberArk, Red Hat, and Thales will discuss how the strength of our portfolios come together to protect credentials, data, and secrets in modern containerized DevOps environments. Learn how the combination of Red Hat OpenShift Container Platform, CyberArk Conjur, CyberArk Privileged Access Manager, Thales CipherTrust Data Security Platform, and Thales Luna HSMs provide end-to-end encryption, secrets & key management for the DevOps community to build secure cloud-native applications.
  • Flexible Crypto with Uncompromised Trust: Security to Meet Your Business Needs Recorded: Jun 17 2021 37 mins
    Paul Hampton, Senior Product Manager, Thales
    Maintaining digital security best practices and ensuring business continuity in challenging times does not mean compromising on confidentiality and integrity. Next generation Thales Luna Hardware Security Modules (HSMs) can provide an uncompromised foundation of digital trust across cloud, on-premises and hybrid environments.

    Join us to discover how Thales Luna HSMs give you the flexibility to run your business the way you want, and to manage your business continuity seamlessly and securely.

    We’ll focus on different use cases that will help you understand how your organization can:

    - safeguard digital identities, applications and sensitive key materials with flexible deployment and billing models
    - move freely between on-premises, cloud, hybrid and multi-cloud environments
    - securely migrate, scale and backup HSMs regardless of your environment
    - meet compliance needs with an HSM root of trust
  • Network Data Security Vulnerabilities: Cybersecurity Survey Reveals Weaknesses Recorded: Jun 17 2021 55 mins
    Stan Mesceda, Senior Product Manager for High-Speed Encryption, and Julian Fay, CTO at Senetas
    More data is in motion than ever before—a trend that will continue in line with the steep cloud adoption and digital transformation curves, as well as the significant impact of the COVID-19 pandemic on remote working. A number of important factors have significantly increased demand for, and dependency on, high-speed wide-area networks. These include workloads migrating to and from the cloud, real-time global collaboration, big data and cloud data storage, 5G and the expectation of higher bandwidth out to the edge and need for larger and faster aggregation points.
    However, only 54% of enterprises feel confident their network security will protect them against cyber threats. As organizations of all sizes continue to adopt connected technologies in support of Cloud Services, Mobility, CCTV, BYOD and Business Continuity; their increased network traffic expose them to increased data in motion security risks. A global research report of IT and cybersecurity decision-makers highlights serious concerns about the security of data in motion across networks. Assess where your organization ranks amongst these findings. Find out here what you can do to make sure your data is secure as it crosses the network by taking a crypto-agile approach to network encryption.
  • The CipherTrust Data Security Platform for Developers: Offerings & Vision Recorded: Jun 17 2021 39 mins
    Marc Seguin, Director of Engineering, Thales; Eric Wolff, Senior Product Marketing Manager, Thales
    Software developers don't need to be crypto experts, or source, use, and store in dangerous places poor-quality keys. With CipherTrust Application Data Protection, devops gets a solution for integrating data protection into applications with a secure key source and repository, and then sending those applications into production. In this session, Eric Wolff will provide a quick introduction to the application-level data protection tools in the CipherTrust Data Security Platform, followed by a live conversation between Marc Segiun and Eric about the Thales vision for app-layer data protection.
  • Any Time, Any Way, Anywhere: Trends Accelerating the Payments Market Recorded: Jun 17 2021 48 mins
    Claire Pitman-Massie, Sr. Director, EMEA Field Marketing, Thales; Simon Keates, Head of Payment Security Strategy, Thales
    Rapid adoption of contactless and alternative payment methods, increase use of cloud technologies, and significant changes to consumer spending habits have required organisations to rethink their strategies to address changes to internal and external requirements. In this session Simon and Claire will discuss the significant trends that emerged in 2020, trends for 2021 and beyond, and the security implications that need to be considered by organisations to ensure that they remain compliant and maintain the security of their customers’ data.
  • Flexible Crypto with Uncompromised Security to Meet Your Dynamic Business Needs Recorded: Jun 17 2021 30 mins
    Paul Hampton, Cloud Security Expert, Thales
    Maintaining digital security best practices and ensuring business continuity in challenging times does not mean compromising on confidentiality and integrity. Next generation Thales Luna Hardware Security Modules (HSMs) can provide an uncompromised foundation of digital trust across cloud, on-premises and hybrid environments.

    Join us to discover how Thales Luna HSMs give you the flexibility to run your business the way you want, and to manage your business continuity seamlessly and securely.

    We’ll focus on different use cases that will help you understand how your organization can:

    - safeguard digital identities, applications and sensitive key materials with flexible deployment and billing models
    - move freely between on-premises, cloud, hybrid and multi-cloud environments
    - securely migrate, scale and backup HSMs regardless of your environment
    - meet compliance needs with an HSM root of trust
  • What is high trust remote signing & how can it benefit your business? Recorded: Jun 17 2021 49 mins
    Geoff Bartlett, Customer Success Manager, Ascertia
    Topics covered in this session include:

    - What is remote signing?
    - Learn more about interoperability, standardization and compliance
    - Ultimate high trust solution – Ascertia ADSS Server & SigningHub
    - Short demo
  • Accelerating IoT Deployment and Addressing the Latest Regulatory Compliance Recorded: Jun 17 2021 43 mins
    Brian Trzupek, DigiCert; Welland Chu, Thales DIS CPL
    IoT is the building block in Smart Devices, Connected vehicles, Digital Cities, etc. Its prevalence and expected market growth at 25% CAGR in the next 6 years is attracting more hardware products, software applications and services to come into the market. How to ensure the “efficiency”, “scalability”, “security & compliance” aspects during the manufacturing, implementation and operation phases are of paramount importance to the industry. In this webinar, Brian Trzupek, Senior VP of Product from DigiCert, will share his insights of the market, technology and regulatory landscape, including the latest Cybersecurity Labelling Scheme (CLS) that is launched by the Cyber Security Agency of Singapore recently.

    <Speakers>
    Brian Trzupek, SVP, Emerging Markets Product Management, DigiCert
    Welland Chu, Business Development Director, Asia Pacific, Thales Group, CPL
  • Accenture 5G security solutions powered by Thales Data Security Solutions Recorded: Jun 17 2021 49 mins
    GANESH NARAYANAN, South East Asia Lead – 5G /Next-Gen Telco/ SW Security Accenture Security
    5G brings together various new cutting-edge technologies like Cloud, NB IoT, Edge computing, Virtualization and Network slicing, increasing the unknown vulnerabilities and hence expanding the attack surface posing many risks to the service provider and to users. The security threats in 5GT include networks, infrastructure, application and databases, including identity and access breach resulting in service disruption, network degradation and eventually loss of trust in the services offered to the market. Specific 5G differentiators like MEC, Edge services, low latency applications and critical infrastructure applications, need highest levels of data/application/network identity, access, authentication and authorization management supported by encryption and digital certificate life cycle management.
    Accenture with its global expertise in 5G networks and security, in partnership with THALES global 5G security products and solutions, provides you a holistic end-end visibility of 5G security across end user terminals, access networks, RAN, back-haul/mid-haul/front haul transport networks, Core networks all the way to internet client facing applications. In this webinar we explain to you how, the security services provided by Accenture include pre & post 5G network/ data security assessments, target 5G security architecture &controls, deployment of Thales data security solutions and a next generation 5G Security Operations Centre that monitors and detects alerts, events and incidents based on 3GPP/NIST/GSMA best practices for 5GT security.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Beyond Zero Trust: The Future of Continuous and Granular Access
  • Live at: Mar 18 2021 6:00 pm
  • Presented by: Asad Ali, Senior Technologist, CTO Office, Thales
  • From:
Your email has been sent.
or close