Back to Search Begin New Search Save Search Auto-Notify
Mitigating Breaches
Join Thales for a live webinar on October 31st to learn about mitigating breaches by protecting structured and unstructured data at rest, in motion, and in use across devices, processes, platforms, and environments. We will take a data-centric security approach to the discussion beginning with the application stack and highlight where and why industry best practices for encryption, policy, and access controls can be applied. Leveraging this ty...
Add Favorite
Root Process Protection through Encrypt...
You are invited to our live webinar with Thales on November 19th where we will take a data-centric security approach to the discussion beginning with the application stack and highlight where and why industry best practices for encryption, policy, and access controls can be applied. Join us to learn about Thales' Root Process Protection through Encryption within Docker-Kubernetes. We'll cover protecting structured and unstructured data at rest...
Add Favorite
Centralizing Key Management Strategies
Join us for a complimentary on demand webcast to discuss how Thales CP&L Federal and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solution to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file level access controls, encryption, and key management are s...
Add Favorite
The Future of Encrypting Network Data
High-speed data networks are not inherently secure. Public and private network infrastructure are exposed to a multitude of cyber-threats, and with the rapid growth of IoT, Virtualization, Big Data Applications, Cloud, and Data Centric Services, the need for high data volume (100Gbps+ links) networks to securely deliver information when and where we need it has increased. Thales Trusted Cyber Technologies, offers a network security solution th...
Add Favorite
Securing Splunk: Balancing Big Data Ben...
Federal agencies require a simple way to correlate all security-relevant data so they can manage their security posture. Instead of merely watching events after they occur, agencies should anticipate their occurrence and implement measures to limit vulnerabilities in real time. For that, agencies need an analytics-driven SIEM platform such as Splunk. However, once data is correlated by SEIM tools, it becomes extremely valuable. By integrating...
Add Favorite
Safeguarding Sensitive and Compliant Da...
Join us for a complimentary webinar on April 23rd to discuss how Thales TCT and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solutions to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file-level access control, encryption, and key management are substantia...
Add Favorite
Attending to the Unattended: RPA Crytog...
U.S. Federal agencies often require PKI certificate-based authentication to perform Windows Logon and to access public key enabled systems. This requires use of a multi-factor authentication token that performs a cryptographic operation using the certificate and keys residing within the token. Traditional multi-factor authentication introduces roadblocks to technologies like Robotic Process Automation (RPA). The OMB Memo M-19-17 outlines a pol...
Add Favorite
Zero Trust - Beyond the Buzzword
Thank you for attending our Zero Trust - Beyond the Buzzword webinar! During this webinar, you learned: What is Zero Trust and how it applies to data security How digital transformation can make data vulnerable but also more secure. Tips for putting Zero Trust Architecture into action. How does cloud make implementing Zero Trust faster but more complicated How to develop a long-term strategy to protect data throughout its entire life-cycle Re...
Add Favorite
Deliver Secure Hyper-Converged Infrastr...
With the growing number of digital transformation initiatives, hyper-converged infrastructure (HCI) has emerged as a simple, cost-effective solution. However, as HCIs amass large volumes of data across distributed resources, security compliance becomes a critical factor when protecting data at rest in an HCI. View this 60-minute webcast to learn how you can work with VMware and Thales TCT to deliver secure hyper-converged infrastructure soluti...
Add Favorite
CTO Sessions Fireside Chat: Edge-to-Clo...
The rise of cyber attacks signals the current approach to security isn’t working, and the industry must make a radical shift to ensure protection of its most important asset – data. Enter Zero Trust. A defined roadmap and lack of cohesive security solutions places the burden of technology integration and partner orchestration on the customer. This results in organizations implementing a self-defined approach made up of an assortme...
Add Favorite
Back to Search Begin New Search