ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Thales

  • Passwordless Authentication Solutions by Thales

    Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.

  • Enabling Secure Remote Working in Times of Crisis: Plan Ahead

    As the global remote workforce continues to grow, security efforts need to be adjusted to focus on protecting distributed users and their access to critical data. This article highlights the challenges and best practices for security todays’ remote workforce. Read on to get started.

  • Securing Corporate Data When Remote Working is the Norm

    As companies are enabling record amounts of remote workers with access to corporate data, it is important for security team s to consider the necessary measures to take for protecting sensitive data. This article offers a list of useful tips for your teams to implement to avoid unnecessary risk. Read on to get started.

  • RSAC 2020: Trust in the Cloud. What Should You Do with Your Encryption Keys?

    As organizations continue to adopt cloud and SaaS models, ensuring cloud-specific security issues are addressed is paramount. This article highlights one of those key challenges, cloud key management, and explores how to ensure security during a cloud migration. Read on to learn more.

  • A Comprehensive Guide to Authentication Technologies and Methods

    Given the number of vectors being targeted by hackers, organizations are opting for a variety of focused tools based on need rather than an all-in-one approach to protect their digital identities. Read this comprehensive guide to learn more about the key methods and challenges surrounding authentication.

  • Protecting O365 and Microsoft Environments with Thales’ SafeNet Trusted Access

    Organizations are shifting from traditional environments to cloud infrastructures, and security needs change along with migration. In this white paper, discover access challenges in cloud environments and explore how the capabilities of SafeNet Trusted Access, Thales’s cloud-based access management and authentication service, can help.

  • An Anchor of Trust in a Digital World: Risk Management Strategies for Digital Processes

    A growing number of entities have integrated Hardware Security Modules (HSMs) into their information risk management deployments. In this white paper, learn about hardware security modules and the attributes that position HSMs as an attractive component in information risk management.

  • Passwordless Authentication: How Giving Up Passwords Can Improve Security

    Although they were once effective for security, weak or stolen passwords are the root cause of 81% of today’s cyberattacks. Today’s sophisticated hackers know how to target and steal weak credentials. So, where do passwords go from here? In this white paper, discover how passwordless authentication can help to improve security.

  • Decisive Technology for Decisive Moments

    Regardless of your current strategic initiatives, a partnership with a trusted cybersecurity provider is critical to your overall success. This white paper highlights success Thales has had in the role of strategic partner for leading enterprises across industries. Read on to see what these industry leaders have to say about Thales.

  • Secure Remote Access for Employees

    In today’s business environment, employees require constant access to information and services. It’s become more critical than ever for organizations to take a calculated approach towards how they secure remote access. This guide highlights several effective approaches for you to consider.

  • Thales looks to extend SafeNet Trusted Access beyond FIDO with a touch of PKI

    In this report, discover 451 Research’s key findings from their survey into the usage of STA amongst enterprises. The study also highlights the enhancements Thales introduced to the STA platform, and how it equates to comparable offerings. Read on to get started.

  • 4 Steps to Cloud Access Management

    Today’s organizations rely on cloud-based applications as a critical aspect of their environment. However, deliberate security considerations need to be made in order to protect the sensitive data in these cloud tools. In this white paper discover 5 common challenges and 4 actions organizations can take to full cloud access management.

  • SafeNet Trusted Access: Cloud-based Access Management as a Service

    While cloud apps allow organizations to streamline collaboration and efficiency, each app is a potential vulnerability. Today’s distributed networks require access management, so Thales built the SafeNet Trusted Access tool – designed to address common authentication and app management challenges. Read on to learn more about this offering.

  • Securing data across the enterprise while simplifying IT operations

    The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.

  • Encrypt Everything

    Today’s IT security leaders are tasked with ensuring enterprise-wide protection for sensitive data. However, challenges arise due to data residing in various platforms (like on-prem systems or in the cloud). In this e-book, discover an overview of a data protection method along with best practices to ensure security.

  • Thales Data Protection on Demand

    In this e-book, discover a collection of case studies highlighting the data protection journeys of 4 organizations as they partner with Thales to ensure the security of their encrypted data. Read on to get started.

  • 2020 Payments Outlook: Trends in focus

    This report provides a brief recap of how these forces reared themselves in 2019 and offers 451 Research’s expert view on the defining trends of 2020. Download a copy today.

  • The CipherTrust Cloud Key Manager for Multicloud Environments

    Today’s corporate environment typically consists of a collection of multiple cloud services. However, this approach invites security risks, and encryption capabilities are often disparate. In this solution brief, discover CipherTrust’s Cloud Key Manager, designed to address multi-cloud security concerns.

  • The Changing Face of Data Security 2020 Thales Data Threat Report

    No organization is immune from data security threats, with 49% of global respondents experiencing a data breach at some point. In this 2020 Thales Data Threat Report, learn why it’s important to implement a smarter approach to data security and review IDC’s research on the topic.

  • Meeting Compliance and Data Privacy Requirements

    Wherever you operate, Thales can help you improve your data security posture and become fit for compliance. View this e-book to learn more.

  • 2019 Thales Data Threat Report

    Digital transformation is fundamentally changing business operations in today's enterprises – and that's putting sensitive data at risk. Find out how moving to the cloud or multi-cloud environments as part of this digital transformation journey makes protecting sensitive data increasingly complex.

  • Upgrading Existing Security Systems to Agile Quantum-Safe

    Since the National Security Agency (NSA) issued a warning against quantum computer attacks in 2015, organizations have begun to revisit their protection strategies in order to account for this growing threat. This solution brief highlights 3 challenges in today’s landscape and recommends tools for addressing them. Read on to learn more.

  • Access Management Handbook

    The concept of access management was created to address the changing security threats that came as a result of cloud migration and remote device enablement. This handbook provides a glossary of key access management terms and definitions. Read on to familiarize yourself with the terms.

  • The Enterprise Encryption Blueprint

    Download this white paper to be set in the right direction to discover, define and deploy the enterprise data encryption strategy that is best for your organization.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Today’s IT security teams are faced with an increasing demand for database encryption but managing this growing challenge can be difficult. In this white paper, discover the key approaches for addressing this uptick in encryption demand and familiarize yourself with Thales’ data protection portfolio.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.