Cloud data protection, mobile payments, OASIS KMIP, DNSSEC, code signing and release of 2011 Global Encryption Trends Study
Weston FL – February 23, 2012 – Thales, leader in information systems and communications security, will be showcasing its line of high assurance solutions for data protection and cyber security at this year’s RSA Conference, San Francisco February 27 – March 2, 2012. Encryption and key management are essential components of any critical IT infrastructure and Thales will be demonstrating its solutions for:
Cloud data protection
While the
cloud is still embryonic, strong cryptography and key management are not. These are well defined areas of security and have been successfully deployed for years. The Thales portfolio protects critical data assets throughout their lifecycle – when in storage, passing over communications networks and while in use by business application – all of which are vital aspects of a cloud security strategy.
Mobile payments
Mobile payments and instant issuance are hot topics today. There are now more people with mobile phones than there are with bank accounts and that makes mobile phones a natural vehicle for payments. Thales solutions secure peer-to-peer mobile payment applications, mobile contactless payments and dedicated security for the issuing of mobile payment applications over the air (OTA).
Key Management Interoperability Protocol (KMIP)
Thales is participating in the OASIS showcase highlighting interoperability of the KMIP standard for key management. The demonstration provides a working snapshot of how this enterprise key management protocol functions in a multi-vendor environment with clients communicating securely with key management servers. Thales is the premier provider of encryption and key management systems such as
keyAuthority and an originating author of the KMIP specification.
Domain Name System Security Extensions (DNSSEC)
The domain name system (DNS) is a critical network infrastructure component responsible for the routing of both intranet and internet connections. Thales
hardware security modules (HSMs) enable top level domains (TLDs), registrars, registries and enterprises to secure critically important signing keys used to validate the integrity of
DNSSEC responses across the internet and protect the DNS from cash poisoning and man-in-the-middle attacks.
Code signing
Code signing is used by software publishers to allow end users to validate that software has not changed since it was published and also to verify the identity of the publisher. The assurance of software integrity and authenticity is important in the face of the continuing danger posed by advanced persistent threats (APTs) such as Stuxnet and Duqu. A critical and fundamental element of the security of any code signing process is protection of the private key used to create the digital signature. Just as with any PKI-based technology it is important to protect the risk of private key compromise. Thales HSMs provide tamper-resistant, certified protection for private code signing keys and a secure platform to perform critical digital signature processes.
2011 Global Encryption Trends Study
Thales is releasing this year’s edition of the annual research report from the Ponemon Institute, which surveyed 4,140 business and IT managers from around the world regarding how the use of encryption has evolved and its effect on the security posture of an organization. It focuses on the compliance pressures and cyber attacks targeting sensitive data and how these are leading organizations to alter their encryption strategies.
Thales and the Ponemon Institute reveal the results of the 2011 Global Encryption Trends Study, Tuesday, February 28, 2012 at “W” San Francisco Hotel 12noon – 1.00pm. Click
here to register (this is a registration only event).
Visit Thales at booth #723, RSA Conference, Moscone Center, San Francisco, February 27-March 2, 2012.
The OASIS KMIP interoperability showcase is at booth #128.
Visit the
Thales Key Management Insights blog for overviews of key management issues, industry news and comment.
Visit the
Thales Payments Security blog for overviews of payments security issues, industry news and comment.