ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Thales

  • 4 Steps to Cloud Access Management

    Today’s organizations rely on cloud-based applications as a critical aspect of their environment. However, deliberate security considerations need to be made in order to protect the sensitive data in these cloud tools. In this white paper discover 5 common challenges and 4 actions organizations can take to full cloud access management.

  • SafeNet Trusted Access: Cloud-based Access Management as a Service

    While cloud apps allow organizations to streamline collaboration and efficiency, each app is a potential vulnerability. Today’s distributed networks require access management, so Thales built the SafeNet Trusted Access tool – designed to address common authentication and app management challenges. Read on to learn more about this offering.

  • Securing data across the enterprise while simplifying IT operations

    The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.

  • Encrypt Everything

    Today’s IT security leaders are tasked with ensuring enterprise-wide protection for sensitive data. However, challenges arise due to data residing in various platforms (like on-prem systems or in the cloud). In this e-book, discover an overview of a data protection method along with best practices to ensure security.

  • Thales Data Protection on Demand

    In this e-book, discover a collection of case studies highlighting the data protection journeys of 4 organizations as they partner with Thales to ensure the security of their encrypted data. Read on to get started.

  • 2020 Payments Outlook: Trends in focus

    This report provides a brief recap of how these forces reared themselves in 2019 and offers 451 Research’s expert view on the defining trends of 2020. Download a copy today.

  • The CipherTrust Cloud Key Manager for Multicloud Environments

    Today’s corporate environment typically consists of a collection of multiple cloud services. However, this approach invites security risks, and encryption capabilities are often disparate. In this solution brief, discover CipherTrust’s Cloud Key Manager, designed to address multi-cloud security concerns.

  • The Changing Face of Data Security 2020 Thales Data Threat Report

    No organization is immune from data security threats, with 49% of global respondents experiencing a data breach at some point. In this 2020 Thales Data Threat Report, learn why it’s important to implement a smarter approach to data security and review IDC’s research on the topic.

  • Meeting Compliance and Data Privacy Requirements

    Wherever you operate, Thales can help you improve your data security posture and become fit for compliance. View this e-book to learn more.

  • 2019 Thales Data Threat Report

    Digital transformation is fundamentally changing business operations in today's enterprises – and that's putting sensitive data at risk. Find out how moving to the cloud or multi-cloud environments as part of this digital transformation journey makes protecting sensitive data increasingly complex.

  • Upgrading Existing Security Systems to Agile Quantum-Safe

    Since the National Security Agency (NSA) issued a warning against quantum computer attacks in 2015, organizations have begun to revisit their protection strategies in order to account for this growing threat. This solution brief highlights 3 challenges in today’s landscape and recommends tools for addressing them. Read on to learn more.

  • Access Management Handbook

    The concept of access management was created to address the changing security threats that came as a result of cloud migration and remote device enablement. This handbook provides a glossary of key access management terms and definitions. Read on to familiarize yourself with the terms.

  • The Enterprise Encryption Blueprint

    Download this white paper to be set in the right direction to discover, define and deploy the enterprise data encryption strategy that is best for your organization.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Today’s IT security teams are faced with an increasing demand for database encryption but managing this growing challenge can be difficult. In this white paper, discover the key approaches for addressing this uptick in encryption demand and familiarize yourself with Thales’ data protection portfolio.

  • CipherTrust Cloud Key Manager

    While it’s been common practice for the cloud provider to hold the key for encryption capabilities, industry best practices mandate that the keys be held by neither the cloud provider nor the end user. This data sheet takes a closer look at the key features and capabilities of the CipherTrust Cloud Key manager. Read on to get started.

  • Complying with APRA Prudential Standard CPS 234

    This white paper provides recommendations to APRA regulated entities on implementing key APRA practice guidelines (CPG 234) to comply with the requirements of CPS 234. Read on to get started.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.