ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Thales

  • Leading healthcare provider protects vital client assets with help from Thales

    This North America-based healthcare provider needed an encryption solution that could operate without disrupting their patient management system while simultaneously meeting all HIPAA standards. Tap into the case study to learn why the healthcare provider chose Vormetric Transparent Encryption from Thales.

  • Data Security in Australia and New Zealand 2020

    Organizations in Australia and New Zealand are rapidly innovating their business models. This means more sensitive data to be created, collected and shared.The downside? This new data could be a gold mine for cybercriminals. How can businesses adapt to stay secure?To find out, read this report on the state of data security in the ANZ region.

  • Prevent Ransomware Attacks from Disrupting Your Business with Thales Data Security

    Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds, and the estimated cost to businesses globally will be around $20 billion by 2021. In this white paper, learn how to defend against ransomware by taking a look at the anatomy of ransomware attacks.

  • Securing Big Data

    In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.

  • Quantum Computing & Quantum-Safe Security

    Although quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.

  • Vormetric Transparent Encryption for the SAP HANA® Data Management Suite

    While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.

  • Avoiding Data Leaks with Scalable Encryption and Access Controls

    Many organizations use Amazon S3 to store their sensitive data. However, in order to secure data in a cloud environment like S3, you need complete control of your data. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 is safe and complies with the strictest security regulations.

  • The Challenges of Trusted Access in a Cloud-First World

    The 2020 Thales Access Management Index is a survey of 300 IT professionals across the U.S. and Brazil with responsibility for, or influence over, IT and data security.In this case study, read how these professionals answered questions regarding cloud access management as well as next steps and guidelines for adopting access management solutions.

  • Brother Secures Access and Reduces Costs with Cloud-based Authentication

    In order to address the remote access security issues needs of their rapidly expanding support team, Brother Industries began exploring their security options for a partner who would be cost-effective, agile and secure. Download this case study to see how & why Brother partnered with Thales to implement SafeNet Trusted Access (STA).

  • Secure Access to Virtual Environments and Private Clouds

    As business environments become more distributed, securing and managing the growing population of endpoints presents an increasingly difficult security strategy. In this white paper, take a closer look at the SafeNet Access Management and Authentication offering, designed to deliver secure access to modern environments.

  • The Changing Face of Data Security: 2020 Thales Data Threat Report

    Thales, in conjunction with IDC, provides a comprehensive Data Threat Report each year designed to analyze the key trends and challenges as they relate to data breaches and securing critical data. Download this year’s Data Threat Report to learn more about the effects of digital transformations, cloud environments, and more.

  • Executive Summary 2020 Thales Access Management Index

    The 2020 Access Management Index explores access management practices within businesses and the use and importance of two-factor authentication, smart SSO and cloud access management tools. Read on to uncover the key findings.

  • Thales adds data discovery and classification to its growing data security and encryption empire

    In this 451 Research report, learn about Thales’s addition of data discovery, classification and risk analysis to its existing line of data security, encryption and key management offerings, in part to help address the growing convergence of requirements for data security and data privacy.

  • Achieving Security and Compliance for SAP HANA in the Cloud

    Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.

  • Shor's Algorithm

    While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.

  • Protecting Sensitive Data in and Around an Oracle Database

    When planning to secure sensitive data in an Oracle database, enterprises need to consider that sensitive data may reside in unanticipated locations outside of the database itself. Robust data security includes considering how to secure sensitive data surrounding the Oracle database. Read on to learn how to get started.

  • Access Management is Essential for Cloud Transformation

    Each year, Thales conducts a study into the trends, challenges and tactics of access management in order to better understand their efficacy and usage. The following infographic highlights the key findings from this year’s survey – which features topics like password credentials, cloud transformations, user convenience, and more.

  • Network Independent Encryption: Flexible, Policy-Based Network Encryption Security for Today’s High-Performance Network Architectures

    Thales is a global leader in the development of end-to-end encryption technologies. Their solutions protect sensitive data for a wide range of commercial, government, industrial and defense customers. Read this white paper to learn more about Network Independent Encryption, the basis of a new technology by Thales called Transport Independent Mode.

  • SureDrop Secure File-Sharing and Collaboration

    File-sharing and collaboration tools like DropBox, Box and OneDrive all offer a degree of security but, for many organizations, they don’t meet their standards for maximum data protection. Learn about SureDrop, a security application, featuring end-to-end encryption and data sovereignty control to protect against malicious content.

  • Passwordless Authentication Solutions by Thales

    Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.

  • Enabling Secure Remote Working in Times of Crisis: Plan Ahead

    As the global remote workforce continues to grow, security efforts need to be adjusted to focus on protecting distributed users and their access to critical data. This article highlights the challenges and best practices for security todays’ remote workforce. Read on to get started.

  • Securing Corporate Data When Remote Working is the Norm

    As companies are enabling record amounts of remote workers with access to corporate data, it is important for security team s to consider the necessary measures to take for protecting sensitive data. This article offers a list of useful tips for your teams to implement to avoid unnecessary risk. Read on to get started.

  • RSAC 2020: Trust in the Cloud. What Should You Do with Your Encryption Keys?

    As organizations continue to adopt cloud and SaaS models, ensuring cloud-specific security issues are addressed is paramount. This article highlights one of those key challenges, cloud key management, and explores how to ensure security during a cloud migration. Read on to learn more.

  • Protecting O365 and Microsoft Environments with Thales’ SafeNet Trusted Access

    Organizations are shifting from traditional environments to cloud infrastructures, and security needs change along with migration. In this white paper, discover access challenges in cloud environments and explore how the capabilities of SafeNet Trusted Access, Thales’s cloud-based access management and authentication service, can help.

  • Passwordless Authentication: How Giving Up Passwords Can Improve Security

    Although they were once effective for security, weak or stolen passwords are the root cause of 81% of today’s cyberattacks. Today’s sophisticated hackers know how to target and steal weak credentials. So, where do passwords go from here? In this white paper, discover how passwordless authentication can help to improve security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.