nCipher shows how your crypto systems can be trusted at InfoSecurity Europe 2014
Release of third annual global survey by Thales and Ponemon Institute examining attitudes towards data protection, encryption and key management in the cloud
Thales, a world leader in Critical Information Systems and Cybersecurity, will be showcasing its high assurance cryptographic solutions for protecting cloud, mobile payments, public key infrastructures (PKIs), big data and cybersecurity at this year’s InfoSecurity Europe, Earls Court, London 29 April – 1 May 2014. At the show Thales is releasing the third edition of its annual research report – Encryption in the Cloud. The study, produced in conjunction with the Ponemon Institute, is based on a survey of more than 4,000 business and IT managers from around the world regarding the use of encryption in the cloud.
As organizations increasingly rely on cryptography as part of their data protection strategy and to protect their critical systems, the trustworthiness of these crypto systems becomes paramount. This is particularly relevant in light of recent concerns over back doors, poorly implemented crypto systems, and key finding attacks such as Heartbleed. The increasing scrutiny arising from privacy mandates and risk management initiatives expose the impact of weak key management systems and create pressure to adopt a proactive approach. Thales can help organizations re-assess and re-evaluate their crypto security and key management infrastructure and deliver solutions that ensure their integrity and trustworthiness.
Thales will address the following critical topics at InfoSecurity Europe:
Do you trust your path to the cloud?
Strong encryption and key management are recognized as the most secure and effective way of protecting data in the cloud. In order for organizations that migrate sensitive and high-value data to the cloud need a high assurance, reliable key management solution to retain control of their keys, and therefore their data. The Thales portfolio protects critical data assets throughout their lifecycle – when in storage, passing over communications networks and while in use by business applications – all of which are vital aspects of a cloud security strategy.
Are your payments systems ready to go mobile?
The proliferation of mobile devices such as smartphones and tablets has dramatically expanded the payments ecosystem, creating new security challenges and new business models. Thales technology can help you incorporate mobile point-of-sale (mPOS) solutions as well as enabling secure mobile issuance and provisioning of payments credentials to NFC and other contactless devices coupled with host security for cloud based wallets and peer-to-peer payments.
Is your PKI secure enough for your business applications?
The number of applications in an enterprise that rely on a PKI for their basis of trust is ever increasing. Under strain to do more and more, does your PKI make the grade? It is of crucial importance that the chain of trust leading back the root certificate authority (CA) along with its signing keys is protected with the utmost security implemented using a hardware security module (HSM) such as Thales nShield to protect against both logical and physical attacks.
Can you secure Big Data?
Massive scale data collection and high-velocity decision making challenges traditional security models and forces an approach that is fundamentally data centric. Encryption infrastructure and access control systems protected by Thales key management solutions not only help protect sensitive data in big data analytical systems, but also ensure it remains accessible to meet your business needs.
Have you stepped up to the cybersecurity challenge?
Over the past decade cybersecurity threats have significantly increased. Attacks are now more frequent, severe and harder to detect and being able to prevent an attack and mitigate the impact of any compromise is a vital part of enabling your business to return to normal operations as quickly as possible.
The Thales cybersecurity portfolio encompasses a range of technologies and solutions designed to help you fully understand a cyber-threat: reduce your cyber-risk, detect attacks in real time enabling deployment of rapid counter measures, or in the worst case scenario of an attack, offer a fast and direct solution to the issue.
Enterprise encryption: Where are you on the maturity curve?
Tuesday 29 April, 13.20-13.45, InfoSecurity Europe Business Strategy Theatre
Hear Richard Moulds, vice president strategy, Thales eSecurity speak about global encryption trends, highlighting deployment challenges, budgets, corporate ownership and the role of encryption in cloud computing – enabling attendees to make informed decisions on encryption and key management as they move up the encryption maturity curve.
Visit Thales at stand F30, InfoSecurity Europe 2014, Earls Court, London, 29 April – 1 May 2014.
For industry insight and views on the latest key management trends check out our blog www.thales-esecurity.com/blogs