ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Thales

  • CipherTrust Data Security Platform Architecture

    Get an overview of the deployment architecture of the CipherTrust Platform products and the use-cases that they enable for customers along their data protection journey.

  • Federal Government Looks to Zero-Trust Approach to Data Security: 2020 Thales Data Threat Report

    68% of U.S. federal government agencies are disrupting the services they provide, moving towards greater organizational agility. But what are the key drivers of this transformation? What recent changes in data security have necessitated more stringent protocols? This IDC threat report examines the case for zero trust in government agencies.

  • Ethernet WAN Encryption Solutions Compared

    This white paper describes the comparative security and performance benefits of Ethernet WAN data security solutions. Read on for a comprehensive comparison of the benefits of Thales Layer 2 high speed encryption hardware with integrated encryption using MACsec or TrustSec.

  • Thales for Cybersecurity Maturity Model Certification (CMMC)

    The DoD’s Cybersecurity Maturity Model Certification (CMMC) combines various cybersecurity controls standards and has specific requirements for how data is managed. Read this white paper to discover an overview of CMMC, including requirements, best practices and how Thales can help your organizations align with these new guidelines.

  • The Key Pillars for Protecting Sensitive Data in Any Organization

    Today’s workforces are largely remote, redefining what’s traditionally been considered as the network perimeter. As a result, security strategies are being forced to evolve to protect sensitive data, regardless of where it resides. Read this white paper to learn more about implementing a data-centric security strategy.

  • Prevent Ransomware Attacks from Disrupting Your Operations

    Ransomware is becoming one of the most costly and disruptive cyberattacks, as well as one of the most common. So, what should organizations do to address this threat head-on? Read this white paper, which provides an in-depth look at ransomware attack patterns and offers prevention methods, best practices and tools.

  • Zero Trust in a Multicloud World: 2020 Thales Data Threat Report

    Thales releases an annual Data Threat Report, which compiles their research into the evolving landscape of cyberthreats, data security, and more. Watch this video for a 45-minute walkthrough of this year’s results, which include everything from zero trust, to mutlicloud environments, to quantum computing and everything in between.

  • SURFnet Selects Thales Luna HSMs to Secure DNSSEC Material

    As part of an organization-wide initiative to ensure DNS security and compliance, SURFnet partnered with Thales to address several challenges they were facing related to DNS. Read this case study to see why they chose Thales as their DNS security and compliance partner and learn more about the outcomes of this initiative.

  • Virtualization-Based Security - External Key Management

    Thales Trusted Cyber Technologies (TCT) is a U.S. based provider of government high-assurance data security solutions. Their mission is to provide innovative solutions to protect the most vital data from the core to the cloud to the field. Scan this white paper to get a closer look at TCT and their enterprise cryptographic key manager.

  • CipherTrust Data Discovery and Classification from Thales

    To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.

  • CipherTrust Cloud Key Manager for Multi-cloud Environments - White Paper

    The era of multi-cloud environments has enabled unmatched scalability and productivity. However, in order to optimize these capabilities, organizations need to restructure their approaches to data protection and key management. Download this report for a closer look at Thales’ CipherTrust Cloud Key Manager for multi-cloud environments.

  • Leading healthcare provider protects vital client assets with help from Thales

    This North America-based healthcare provider needed an encryption solution that could operate without disrupting their patient management system while simultaneously meeting all HIPAA standards. Tap into the case study to learn why the healthcare provider chose Vormetric Transparent Encryption from Thales.

  • Prevent Ransomware Attacks from Disrupting Your Business with Thales Data Security

    Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds, and the estimated cost to businesses globally will be around $20 billion by 2021. In this white paper, learn how to defend against ransomware by taking a look at the anatomy of ransomware attacks.

  • Securing Big Data

    In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.

  • Quantum Computing and Quantum-Safe Security

    Although quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.

  • Vormetric Transparent Encryption for the SAP HANA® Data Management Suite

    While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.

  • Avoiding Data Leaks with Scalable Encryption and Access Controls

    Many organizations use Amazon S3 to store their sensitive data. However, in order to secure data in a cloud environment like S3, you need complete control of your data. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 is safe and complies with the strictest security regulations.

  • The Challenges of Trusted Access in a Cloud-First World

    The 2020 Thales Access Management Index is a survey of 300 IT professionals across the U.S. and Brazil with responsibility for, or influence over, IT and data security.In this case study, read how these professionals answered questions regarding cloud access management as well as next steps and guidelines for adopting access management solutions.

  • The Changing Face of Data Security: 2020 Thales Data Threat Report

    Thales, in conjunction with IDC, provides a comprehensive Data Threat Report each year designed to analyze the key trends and challenges as they relate to data breaches and securing critical data. Download this year’s Data Threat Report to learn more about the effects of digital transformations, cloud environments, and more.

  • Thales adds data discovery and classification to its growing data security and encryption empire

    In this 451 Research report, learn about Thales’s addition of data discovery, classification and risk analysis to its existing line of data security, encryption and key management offerings, in part to help address the growing convergence of requirements for data security and data privacy.

  • Achieving Security and Compliance for SAP HANA in the Cloud

    Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.

  • Shor's Algorithm

    While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.

  • Protecting Sensitive Data in and Around an Oracle Database

    When planning to secure sensitive data in an Oracle database, enterprises need to consider that sensitive data may reside in unanticipated locations outside of the database itself. Robust data security includes considering how to secure sensitive data surrounding the Oracle database. Read on to learn how to get started.

  • Access Management is Essential for Cloud Transformation

    Each year, Thales conducts a study into the trends, challenges and tactics of access management in order to better understand their efficacy and usage. The following infographic highlights the key findings from this year’s survey – which features topics like password credentials, cloud transformations, user convenience, and more.

  • Access Management Handbook

    The concept of access management was created to address the changing security threats that came as a result of cloud migration and remote device enablement. This handbook provides a glossary of key access management terms and definitions. Read on to familiarize yourself with the terms.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.