Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Keep The TechnoWorldInc.com Community Clean: Read Guidelines Here.
Recent Updates
[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[November 08, 2024, 04:31:03 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Techno News
 Thales ensures your crypto systems can be trusted at RSA Conference 2014
Pages: [1]   Go Down
  Print  
Author Topic: Thales ensures your crypto systems can be trusted at RSA Conference 2014  (Read 431 times)
RealWire
TWI Hero
**********



Karma: 0
Offline Offline

Posts: 18530


View Profile Email


Thales, leader in information systems and communications security, will be showcasing its high assurance cryptographic solutions for protecting big data, public key infrastructures (PKIs), cloud and mobile payments at this year’s RSA Conference, San Francisco, February 24 – 28, 2014.

As organizations increasingly rely on cryptography as part of their data protection strategy and to protect their critical systems, the trustworthiness of these crypto systems becomes paramount. This is particularly relevant in light of recent concerns over back doors, poorly implemented crypto systems, out of date algorithms, weak key management systems and the increasing burdens arising from privacy mandates. Thales can help organizations re-assess and re-evaluate their crypto security and key management infrastructure and deliver solutions that ensure their integrity and trustworthiness.

Can you secure Big Data?
Massive scale data collection and high-velocity decision making challenges traditional security models and forces an approach that is fundamentally data centric. Encryption infrastructure and access control systems protected by Thales key management solutions not only help protect sensitive data in big data analytical systems, but also ensure it remains accessible to meet your business needs.

Is your PKI secure enough for your business applications?
The number of applications in an enterprise that rely on a PKI for their basis of trust is ever increasing. Under strain to do more and more, does your PKI make the grade? It is of crucial importance that the chain of trust leading back the root certificate authority (CA) along with its signing keys is protected with the utmost security implemented using a hardware security module (HSM) such as Thales nShield to protect against both logical and physical attacks.

Do you trust your path to the cloud?
Strong encryption and key management are recognized as the most secure and effective way of protecting data and that applies equally to the cloud as it does across the enterprise. In order for organizations to take up cloud services and migrate sensitive and high-value data to virtualized and cloud deployments, they need a high assurance, reliable key management solution that ensures they retain control of their keys, and therefore their data. The Thales portfolio protects critical data assets throughout their lifecycle – when in storage, passing over communications networks and while in use by business applications – all of which are vital aspects of a cloud security strategy.

Microsoft Azure RMS – a case study
To highlight the potential of the cloud to deliver trusted services without compromising security Thales and Microsoft will jointly present a case study detailing how they utilize Thales HSMs to help secure the new Microsoft Azure RMS and the “Bring Your Own Key” capability that puts customers firmly in control of their data within a cloud environment:

‘Securing your transition to the cloud – how can you trust the man behind the curtain?’
4.20pm, Wednesday, February 26, 2014 – Briefing Centre, North Expo Hall, RSA Conference
Dan Plastina, Microsoft and Richard Moulds, Thales

Are your payments systems ready to go mobile?
The proliferation of mobile devices such as smartphones and tablets has dramatically expanded the payments ecosystem, creating new security challenges and new business models. Thales technology can help you incorporate mobile payments into your business while maintaining the highest levels of performance and security. Thales payShield 9000 and nShield deliver secure solutions for mobile point-of-sale (mPOS) solutions as well as enabling secure mobile issuance and provisioning of payments credentials to NFC and other contactless devices coupled with host security for cloud based wallets and peer-to-peer payments.

Enterprise class key management
Thales is again participating in the OASIS showcase, highlighting the Key Management Interoperability Protocol (KMIP) standard, with its high assurance enterprise-class key management solution – keyAuthority. The demonstration highlights the comprehensive capabilities of the Thales solution in the context of a variety of encryption devices from other participants in the KMIP interoperability booth. In addition, Thales key management experts will be available to discuss the evolution of the KMIP standard and the contribution of Thales as an originating author of the KMIP specification.

New Global Encryption Trends Study
Thales is releasing the ninth edition of its annual research report - the Global Encryption Trends Study. The study, which is produced in conjunction with the Ponemon Institute, is based on a survey of more than 4,000 business and IT managers from around the world regarding the use of encryption, how it has evolved and its effect on the security posture of an organization. It focuses on the compliance pressures and cyber-attacks targeting sensitive data and how and where different types of organizations are deploying encryption and key management as a result. Come along to our booth to collect your copy.

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.092 seconds with 23 queries.