Hi [[ session.user.profile.firstName ]]

Persistent Information Protection, Extending the Use of HSM Within Microsoft RMS

Want to take advantage of the cloud for collaboration but feel you will lose control of your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how you can deploy a unique solution that enforces strict security policies on your data assets and achieves persistent information protection. Learn how to:

• Deploy new features and capabilities of Microsoft Rights Management Services (RMS)
• Protect your sensitive files in any format and in any device, including iOS and Android
• Share protected information with anyone, inside and outside your own organization

You will also learn how the unique bring your own key (BYOK) capability enables you to generate and safeguard your own RMS private key within a Thales hardware security module (HSM), ensuring you that Microsoft operators cannot see or leak the keys during import or use.
Recorded Feb 11 2014 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Microsoft, Synergy Advisors, Thales
Presentation preview: Persistent Information Protection, Extending the Use of HSM Within Microsoft RMS

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Protecting Sensitive Applications &Customer Data On-Premises and in the Cloud Jul 21 2016 3:00 pm UTC 60 mins
    Don Laursen, Sr. Product Manager, F5 & Juan Asenjo, Sr. Product Marketing Manager, Thales e-Security
    More enterprises today are choosing to migrate their application delivery control for on-premises environments to the cloud. Ensuring you can support this shifting model while continuing to maintain control of critical cryptographic keys and certificates underpinning security requires careful planning. While migration to the cloud offers tremendous advantages including greater flexibility and cost-effectiveness, the cloud also presents new risks. Fraudsters increasingly take advantage of encryption, the technology used to protect sensitive applications and data, to also hide malware from security monitoring equipment. This creates a blind spot that allows propagation of malware across protected environments, and requires careful examination and selection of what application delivery controllers (ADCs) allow to be encrypted for outbound communications. This webinar will examine these threats and how a security architecture including cloud-based ADCs and on-premises hardware security modules (HSMs) are a critical component to help avert these risks.

    In this webinar you will learn:
    • Why application delivery control is moving to the cloud
    • What are the pros and cons of new deployment model
    • How you can protect your organization from new risks
    • Where do HSMs fit as the system’s foundation of trust
  • 2016 Encryption Application Trends Jul 20 2016 5:00 pm UTC 60 mins
    Larry Ponemon, Chairman & Founder, the Ponemon Institute & John Grimm, Sr. Director of Security Strategy, Thales e-Security
    Encryption is an increasingly important and prevalent technique to keep data safe. But where should you use it, what are the pitfalls, and how can you ensure you get maximum impact for your investment?

    Join Larry Ponemon, Chairman & Founder of the Ponemon Institute, and John Grimm, Senior Director of Security Strategy at Thales e-Security, for an overview of the top findings in this latest study focused on applications that use encryption, including:
    •A ranked list of what applications encryption is most often deployed with, including vertical industry-level and country-level data splits
    •What features of encryption solutions that users find the most valuable and effective in combatting the challenges associated with increased encryption usage
    •How trends such as cloud computing, big data and the IoT are affecting data protection plans.
  • 2016 Encryption Application Trends Jul 20 2016 1:00 pm UTC 60 mins
    Larry Ponemon, Chairman & Founder - Ponemon Institute and John Grimm, Senior Director of Security Strategy, Thales e-Security
    Encryption is an increasingly important and prevalent technique to keep data safe. But where should you use it, what are the pitfalls, and how can you ensure you get maximum impact for your investment?

    Join Larry Ponemon, Chairman & Founder of the Ponemon Institute, and John Grimm, Senior Director of Security Strategy at Thales e-Security, for an overview of the top findings in this latest study focused on applications that use encryption, including:
    •A ranked list of what applications encryption is most often deployed with, including vertical industry-level and country-level data splits
    •What features of encryption solutions that users find the most valuable and effective in combatting the challenges associated with increased encryption usage
    •How trends such as cloud computing, big data and the IoT are affecting data protection plans.
  • Scalability & Security – Will we always be playing catch-up? Recorded: Jun 9 2016 42 mins
    Michael Rothschild - Vormetric & Rohit Goyal - Nutanix
    With more organizations operating anywhere and everywhere, the question plaguing both business and IT titles alike is, how do I scale my infrastructure AND my security to keep up with the demands of my business. A more heterogeneous user base in more locations using more cloud based applications – both public and private - and transferring huge amounts of data. Is it even possible to ensure always-on capabilities while also being secure?
    Join us for this exciting webcast where we will talk about the security and scalability challenges that organizations face as well as the enterprise cloud concept – the new approach many organizations are turning to in order to ensure secure “any-to-any service”. Any app, anywhere, anytime, always secured.
  • Cloud Based Payments: the future of Mobile Payments? Recorded: May 19 2016 46 mins
    Simon Keates, Business Development Manager, Thales e-Security & Rob MacMillan, VP Marketing – Digital Payments, Proxama
    In this webcast Simon Keates, Business Development Manager, Thales and Rob Macmillan, VP Marketing, Proxama will present and discuss the history, scope and current status of mobile payments based on Cloud Based Payment (CBP) and Host Card Emulation (HCE) technology. Since HCE first became available in Android handsets, card issuers have been using it to deliver mobile payment solutions to the customers. With scheme specifications and the arrival of tokenisation there has been an increasing rate of adoption. Now, with an increasing number of payment options becoming available from the 'X-Pays' and a growing convergence between on-line, in-store and in-app transactions, what is the future for CBP?
  • Innovation and security in the digital payments world Recorded: Apr 20 2016 59 mins
    Ian Hermon, Payment Security Product Marketing Mgr. & Jose Diaz, Director, Payment Strategy
    Digital commerce is growing rapidly with new ways to make payments more streamlined (e.g., in-app payments). The drive towards improving the overall purchasing experience and ‘frictionless payments’ is forcing new security and trust models to evolve to meet new challenges and threats. Cards are no longer adequate to fulfill the continuing evolution of new purchasing methods. New trust models are necessary to secure transactions when the consumer uses an off-the-shelf PC browser, tablet application, mobile phone app, or wearable to initiate a purchase and resulting payment.


    Please join Ian Hermon and Jose Diaz from Thales e-Security for a webinar to learn more about the latest innovative payment trends as well as the demand for security and trust behind the scenes

    •Hear about the latest trends in digital commerce and payment methods
    •Gain a better understanding of the security behind the diverse solutions
    •Learn about EMVCo plans for improving the 3D Secure user experience while making it easier for merchant adoption
    •Benefit from the sharing of use cases to help determine the best approach for your business
  • Innovation and security in the digital payments world Recorded: Apr 20 2016 59 mins
    Ian Hermon, Payment Security Product Marketing Mgr. & Jose Diaz, Director, Payment Strategy
    Digital commerce is growing rapidly with new ways to make payments more streamlined (e.g., in-app payments). The drive towards improving the overall purchasing experience and ‘frictionless payments’ is forcing new security and trust models to evolve to meet new challenges and threats. Cards are no longer adequate to fulfill the continuing evolution of new purchasing methods. New trust models are necessary to secure transactions when the consumer uses an off-the-shelf PC browser, tablet application, mobile phone app, or wearable to initiate a purchase and resulting payment.

    Please join Ian Hermon and Jose Diaz from Thales e-Security for a webinar to learn more about the latest innovative payment trends as well as the demand for security and trust behind the scenes.


    • Hear about the latest trends in digital commerce and payment methods
    • Gain a better understanding of the security behind the diverse solutions
    • Learn about EMVCo plans for improving the 3D Secure user experience while making it easier for merchant adoption
    • Benefit from the sharing of use cases to help determine the best approach for your business
  • 2016 Top Trends in Encryption and Data Protection Recorded: Mar 23 2016 58 mins
    Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute and John Grimm, Senior Director
    Not surprisingly, companies are continuing to increase their use of encryption and other data protection techniques in response to data breaches and cyber attacks. But some of the other top deployment reasons – and techniques being used -- may surprise you.

    Join Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:

    • Variation in encryption and key management trends across multiple vertical industries
    • Attitudes regarding protection of sensitive data in the cloud
    • Types of data that are most commonly encrypted
    • Common use cases for encryption, and where Hardware Security Modules are most commonly deployed for key protection and management
  • Data Protection in 2016 - Top 5 Use Cases Recorded: Feb 17 2016 20 mins
    Kristina Cairns, Sr Product Marketing Manager and Sander Temme, Sr Product Line Manager
    2015 Highlighted what we all know: data protection issues are a big deal.

    Join Thales e-Security as we share our practical knowledge of the top ways companies are protecting their data. Please register below to learn from our examples and make sure you’re on track for 2016!
  • Data Protection in 2016 - Top 5 Use Cases Recorded: Feb 17 2016 36 mins
    Kristina Cairns, Sr Product Marketing Manager and Sander Temme, Sr Product Line Manager
    2015 Highlighted what we all know: data protection issues are a big deal.

    Join Thales e-Security as we share our practical knowledge of the top ways companies are protecting their data. Please register below to learn from our examples and make sure you’re on track for 2016!
  • Cloud Payments (HCE): A Simpler Step with Thales HSMs Recorded: Jan 13 2016 50 mins
    Simon Keates, Principal Consultant, Mobile Security
    Deploying a cloud payment (HCE) solution can be a daunting and complex task. Cryptographic and key management requirements don’t have to be something to slow down your project. At Thales e-Security we have been at the forefront of designing solutions to reduce the complexity of cryptographic security and implementation, helping organisations rapidly bring solutions to market.

    This webinar will explain the key management requirements of the various schemes’ specifications, and explain how using Thales HSMs can shorten your development cycle and allow you to rapidly bring your product to market.
  • Digital Certificates - A Critical Line of Defense Against Cybercrime Recorded: Dec 16 2015 62 mins
    John Grimm, Sr. Director, Product Marketing - Thales e-Security and Ted Shorter, CTO - Certified Security Solutions (CSS)
    Digital Certificates are a critical line of defense against cybercrime. From authenticating traditional user endpoints to enabling trusted e-commerce purchases, digital certificates and the public key infrastructure (PKI) that issues them create a high assurance foundation for digital security when implemented correctly.

    Partnering to provide best-in-class PKI solutions, Certified Security Solutions and Thales e-Security invite you to a live webinar to discuss digital certificate use cases, the security threat landscape and resolutions to dangerous enterprise problems putting your company at risk for costly outages and data breaches.

    Join John Grimm, Sr. Director, Product Marketing - Thales e-Security and Ted Shorter, CTO at Certified Security Solutions (CSS) as they discuss:

    • "Newest" security technology
    • Why it's different today
    • Digital certificate use cases
    • Security threat landscape
  • Global PKI Trends…Revealed! Recorded: Nov 19 2015 59 mins
    Industry expert Peter DiToro, and independent researcher, Larry Ponemon
    In this webcast, you will learn about the Top 10 ten trends in Global PKI based on our 2015 Global Trends Study from the Ponemon Institute. Industry expert Peter DiToro, and independent researcher, Larry Ponemon, discuss the increased reliance on public key infrastructures (PKIs) in today’s enterprise environment, and how they are supporting a growing number of applications. Other discussion topics include:

    •Issues around the general lack of clear PKI ownership
    •Issues around lack of resources and skills to properly support PKIs
    •How current approaches to PKI are fragmented and do not always incorporate best practices
    •The need for many organizations to apply increased effort to secure their PKI as an important part of creating a foundation of trust
  • Global PKI Trends…Revealed! Recorded: Nov 18 2015 60 mins
    Industry expert Peter DiToro, and independent researcher, Larry Ponemon
    In this webcast, you will learn about the Top 10 ten trends in Global PKI based on our 2015 Global Trends Study from the Ponemon Institute. Industry expert Peter DiToro, and independent researcher, Larry Ponemon, discuss the increased reliance on public key infrastructures (PKIs) in today’s enterprise environment, and how they are supporting a growing number of applications. Other discussion topics include:

    • Issues around the general lack of clear PKI ownership
    • Issues around lack of resources and skills to properly support PKIs
    • How current approaches to PKI are fragmented and do not always incorporate best practices
    • The need for many organizations to apply increased effort to secure their PKI as an important part of creating a foundation of trust
  • Thwarting Advanced Threats with Trusted Crypto Recorded: Sep 2 2015 60 mins
    John Grimm of Thales e-Security and John Pescatore of the SANS Institute
    The dangers posed by advanced targeted attacks are real. Enterprises have come up against the limitations of approaches such as intrusion detection and signature-based malware detection. One promising avenue to explore is trusted crypto, which can help ensure that an application, for example, is doing just what its developers intended and has not been tampered with. Things can be taken a step further with trusted execution environments.

    In this webcast, John Grimm of Thales e-Security and John Pescatore of the SANS Institute will discuss the gaps in current best-practice defenses and the ways that trusted crypto and trusted execution environments can help fill those gaps.
  • An Easy Step to Host Card Emulation (HCE) Solutions with Thales HSMs Recorded: Apr 29 2015 55 mins
    Ian Hermon
    Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary HCE specifications released by the major card schemes. Today, HCE enables contactless mobile payments on Android phones to take place at an NFC-capable POS terminal without the need for a Secure Element (SE) inside the phone. It is evident that HCE support is an important consideration for any issuer wanting to launch payment support on Android phones since the current rollouts of Apple Pay are restricted to Apple iOS devices.

    Thales would like to invite you to attend a webinar covering how Thales can help you generate new revenue by getting your HCE solution to market quickly and securely.

    Ian Hermon, Product Marketing Manager for Payment Security Solutions at Thales e-Security is the presenter and will be covering the following topics:
    •How HCE apps deliver new transactions and new revenue
    •What you need to support the new security and risk models required by HCE
    •How to maximize use of your existing back office security infrastructure
    •The flexibility of the Thales HSM offerings
  • An Easy Step to Host Card Emulation (HCE) Solutions with Thales HSMs Recorded: Apr 29 2015 61 mins
    Ian Hermon
    Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary HCE specifications released by the major card schemes. Today, HCE enables contactless mobile payments on Android phones to take place at an NFC-capable POS terminal without the need for a Secure Element (SE) inside the phone. It is evident that HCE support is an important consideration for any issuer wanting to launch payment support on Android phones since the current rollouts of Apple Pay are restricted to Apple iOS devices.

    Thales would like to invite you to attend a webinar covering how Thales can help you generate new revenue by getting your HCE solution to market quickly and securely.

    Ian Hermon, Product Marketing Manager for Payment Security Solutions at Thales e-Security is the presenter and will be covering the following topics:
    •How HCE apps deliver new transactions and new revenue
    •What you need to support the new security and risk models required by HCE
    •How to maximize use of your existing back office security infrastructure
    •The flexibility of the Thales HSM offerings
  • Applications that go bump in the night Recorded: Mar 12 2015 52 mins
    Richard Moulds, VP of Strategy at Thales e-Security, and Derek Brink, Vice President- Information Technology, Aberdeen Group
    The rise of malware and malicious insiders brings application security into clear focus. Well written software, security testing and code obfuscation mitigate risk but the most critical applications in the most risky locations need to go one step further to become tamper resistant. Trusted applications that handle sensitive data, control valuable IP and perform critical processes can be isolated and protected within secure execution environments. Mobile phones, embedded devices and data center servers all adopt physical hardening to secure the applications they host. This webinar focuses on protecting business applications that support high-tech manufacturing, content distribution, online authentication – in fact any situation where you need to know for sure that your application is doing precisely what the developer intended – nothing more, nothing less.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Nov 20 2014 39 mins
    John Grimm, Sr Director Product Marketing, Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we saw with the Heartbleed OpenSSL vulnerability and more recently with POODLE, encryption is no silver bullet and can’t be taken for granted. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, November 20th, to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • High Assurance Security for Mission Critical Applications Recorded: Oct 22 2014 61 mins
    Chris Glidden, SE Federal Thales - Bob Smith, SE Manager F5 Networks- Brian Jones, VP Federal & Mid Atlantic FishNet Security
    Downtime of critical networked applications can cost your company lost revenue opportunities in the short term, as well as long term negative impact on your brand. Attacks can interrupt the availability of critical applications or compromise sensitive data traversing your network.
    Securing critical applications to ensure availability is imperative.
    Integrating hardware security modules (HSMs) with intelligent network managers allows you to trust that data traveling across your network is encrypted and secure from unauthorized users.
    Join F5 Networks, Thales e-Security and FishNet for a free webcast to learn how to optimize and secure the delivery of critical applications. You’ll learn how F5’s BIG-IP System integrated with Thales’s nShield HSM can:
    •Deliver high performance processing
    •Provide robust security
    •Meet regulatory compliance standards
    •Secure data while improving data center performance
Encryption and Key Management Solutions
Data protection and security solutions to help companies meet compliance and protect the security of your most sensitive data leveraging encryption and key management.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Persistent Information Protection, Extending the Use of HSM Within Microsoft RMS
  • Live at: Feb 11 2014 6:30 pm
  • Presented by: Microsoft, Synergy Advisors, Thales
  • From:
Your email has been sent.
or close