Welcome!

Python Authors: Pat Romanski, AppDynamics Blog, Matt Davis, Donald Meyer, Liz McMillan

News Feed Item

Thales strengthens its multi-cloud data security portfolio

New encryption, tokenization and key management capabilities simplify control and ensure compliance over data security in multi-cloud environments

SAN JOSE, Calif., July 26, 2017 /PRNewswire/ -- Thales, a leader in critical information systems, cybersecurity and data security, is making it easier for organizations to manage and secure their data in multi-cloud environments. Its advanced data security solutions integrate with the leading cloud service provider platforms from Amazon Web Services (AWS), Google, Microsoft and Salesforce, allowing users to establish strong safeguards around their sensitive data and applications in the cloud, satisfying compliance requirements and giving them greater control and flexibility.

Thales (PRNewsFoto/Thales)

Click to tweet: New additions to @thalesesecurity data security portfolio help orgs manage multi-cloud environments http://bit.ly/2tH0PFO

According to IDC, nearly 80 percent of IT organizations currently deploy multi-cloud or plan to implement multi-cloud environments within 12 months. Securing data in a multi-cloud environment can be especially problematic for organizations seeking compliance, since they need to prove they can control their data by following best practices around cloud data security shared responsibility models.

Delivering high performance encryption, sophisticated access control, intelligent auditing and strong key management, the latest additions to the Thales portfolio further assist customers with security, trust and control of their multi-cloud architecture. Understanding the challenges most organizations face in navigating this landscape, Thales provides the broadest support of cloud environments and data security technologies for multi-cloud data security.

Now both Microsoft Azure and AWS users will benefit from new enhancements to the Vormetric Data Security Manager (DSM), which offers centralized, FIPS 140-2 certified key and policy management. The latest version of Vormetric DSM in the Azure Marketplace brings support for Vormetric Transparent Encryption Live Data Transformation – which mitigates the need for downtime when transforming or rekeying encrypted data – and container security. Also newly available in Microsoft Azure is the Vormetric Tokenization Server; the platform enables workloads running in Microsoft Azure to tokenize data and offer dynamic data masking using simple REST API calls.

Peter Galvin, vice president of strategy for Thales eSecurity says:
"Ultimately, organizations operating in multi-cloud environments benefit most when they have a consistent, integrated solution that offers comprehensive data security and the ability to effectively manage encryption keys across diverse environments. Thales cloud security and key management allow companies to achieve both aims, which is vital as organizations are responsible for keeping their data secure, and can't default to holding the cloud provider solely responsible if and when something goes awry."

Other Thales solutions offering security, control and management for multi-cloud environments include:

  • nShield BYOK: The FIPS 140-2 certified key management solution gives organizations centralized control over their encryption keys regardless of whether they choose to utilize their cloud provider's native encryption, available for AWS, Microsoft Azure and Google Cloud Platform users
  • nShield Web Services Crypto API: The new API will help customers to save time and money at deployment by avoiding custom software integration with HSMs and gain flexibility with the ability to use any custom or non-standard operating system
  • Vormetric Transparent Encryption: Protects data with file and volume level data-at-rest encryption, access controls, and data access audit logging for on-premises, public clouds, and hosted services
  • Vormetric Key Management as a Service (KMaaS): Available for Salesforce Platform Encryption, KMaaS allows users to establish custodianship and strong controls over encryption keys. The service can be used in the cloud or deployed on-premises
  • Vormetric Cloud Encryption Gateway (VCEG): Delivering client-side encryption for Amazon S3 and compatible services, the latest version is now multi-tenant with increased performance
  • Vormetric Orchestrator: Simplifies the deployment, scale and operations of the DSM, for both on-premises and multi-cloud environments with the most notable addition being Ansible support for configuration management

Industry insight and views on the latest key management trends can be found on the Thales eSecurity blog at blog.thalesesecurity.com.

Follow Thales eSecurity on Twitter @Thalesesecurity, and on LinkedIn, Facebook and YouTube.

About Thales eSecurity
Thales eSecurity is the leader in advanced data security solutions and services that deliver trust wherever information is created, shared or stored. We ensure that the data belonging to companies and government entities is both secure and trusted in any environment – on-premise, in the cloud, in data centers or big data environments – without sacrificing business agility. Security doesn't just reduce risk, it's an enabler of the digital initiatives that now permeate our daily lives – digital money, e-identities, healthcare, connected cars and, with the internet of things (IoT), even household devices. Thales provides everything an organization needs to protect and manage its data, identities and intellectual property, and meet regulatory compliance – through encryption, advanced key management, tokenization, privileged-user control and high-assurance solutions. Security professionals around the globe rely on Thales to confidently accelerate their organization's digital transformation. Thales e-Security is part of Thales Group.

About Thales
Thales is a global technology leader for the Aerospace, Transport, Defence and Security markets. With 64,000 employees in 56 countries, Thales reported sales of €14.9 billion in 2016. With over 25,000 engineers and researchers, Thales has a unique capability to design and deploy equipment, systems and services to meet the most complex security requirements. Its exceptional international footprint allows it to work closely with its customers all over the world.

Positioned as a value-added systems integrator, equipment supplier and service provider, Thales is one of Europe's leading players in the security market. The Group's security teams work with government agencies, local authorities and enterprise customers to develop and deploy integrated, resilient solutions to protect citizens, sensitive data and critical infrastructure.

Thales offers world-class cryptographic capabilities and is a global leader in cybersecurity solutions for defence, government, critical infrastructure providers, telecom companies, industry and the financial services sector. With a value proposition addressing the entire data security chain, Thales offers a comprehensive range of services and solutions ranging from security consulting, data protection, digital trust management and design, development, integration, certification and security maintenance of cybersecured systems, to cyberthreat management, intrusion detection and security supervision through cybersecurity Operation Centres in France, the United Kingdom, The Netherlands and Hong Kong.

View original content with multimedia:http://www.prnewswire.com/news-releases/thales-strengthens-its-multi-cloud-data-security-portfolio-300494178.html

SOURCE Thales

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform elimi...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Ca...