All resources sponsored by:

Thales

1 - 25 of 37 Matches
Thales SafeNet Trusted Access Platform
sponsored by Thales
ANALYST REPORT:IAM technologies are widely installed, but can be notoriously difficult to upgrade, which can leave you struggling to meet demands. Learn how to manage access to both cloud services and enterprise applications with an integrated platform combining single sign-on, multi-factor authentication and scenario-based access policies by reading this report.
Posted: 16 Jun 2021 | Published: 16 Jun 2021
Get This Now

TOPICS:  .NET

Data Security in the Era of Accelerated Cloud Transformation and Remote Work
sponsored by Thales
INFOGRAPHIC:COVID-19 left lasting changes regarding perspectives on the attacker community, technology expectations, and priorities in security operations and investment. This report examines the implications of survey responses and explores their meaning to security strategies and how to plan for the year ahead. Uncover the survey results today.
Posted: 15 Jun 2021 | Published: 15 Jun 2021
Get This Now

TOPICS:  .NET

Data Security in the Era of Accelerated Cloud Transformation and Remote Work
sponsored by Thales
RESEARCH CONTENT:Access this study for a 2021 report on data security topics, trends and concerns in the era of accelerated cloud transformation and remote work.
Posted: 14 Jun 2021 | Published: 14 Jun 2021
Get This Now

TOPICS:  .NET

Innovation Insight for Many Flavors of Authentication Token
sponsored by Thales
RESEARCH CONTENT:Access this guide from Gartner for insights into the current landscape of authentication token types. This guide describes and compares principal varieties of authentication tokens, presents research findings on use of different token types, makes recommendations for identity and access management.
Posted: 11 Jun 2021 | Published: 11 Jun 2021
Get This Now

TOPICS:  .NET

Database and Big Data Security
sponsored by Thales
ANALYST REPORT:Access this guide for an in-depth evaluation of the database and big data security market. Thorough comparative analyses are made on leading products and vendors.
Posted: 11 Jun 2021 | Published: 11 Jun 2021
Get This Now

TOPICS:  .NET

How Can You Trust an Untrusted Environment?
sponsored by Thales
EBOOK:Zero Trust security has become a necessity in the digital age but building Zero Trust and managing untrusted environments is easier said than done. Read this e-book to see what 21 industry-recognized security experts have to say about the biggest roadblocks to achieving Zero Trust.
Posted: 07 Jun 2021 | Published: 31 Mar 2021
Get This Now

TOPICS:  Cybersecurity

Thales Solutions for White House Executive Order on Improving the Nation’s Cybersecurity
sponsored by Thales
WHITE PAPER:The White House just issued an Executive Order on improving the Nation’s Cybersecurity. Luckily, Thales offers robust authentication and data encryption that addresses the requirements outlined in the Executive Order. Access this resource to learn about the Executive Order and Thales data protection.
Posted: 02 Jun 2021 | Published: 02 Jun 2021
Get This Now


Best Practices for Implementing the White House Executive Order on Improving the Nation’s Cybersecurity Infrastructure
sponsored by Thales
WHITE PAPER:Access this white paper to learn about the key requirements outlined in the White House Executive Order on Improving the Nation's Cybersecurity Infrastructure and how Thales can ensure the successful and timely implementation of Zero Trust, encryption, and authentication security solutions.
Posted: 02 Jun 2021 | Published: 02 Jun 2021
Get This Now


Meeting NIST Guidelines for Zero Trust Security
sponsored by Thales
WHITE PAPER:The digital age has completely transformed how organizations protect their users and data – traditional perimeter security methods have been replaced by Zero Trust architectures. Read this white paper to learn about facilitating effective Zero Trust implementation through NIST guidelines.
Posted: 01 Jun 2021 | Published: 01 Jun 2021
Get This Now

TOPICS:  Cybersecurity

Market Guide for User Authentication
sponsored by Thales
ANALYST REPORT:In an ever-wider market of tools designed to address user authentication needs, security and risk management leaders must balance innovation against proven effectiveness and ease of implementation. Read this Gartner Market Guide to further explore the user authentication market and unlock Gartner’s strategic recommendations.
Posted: 14 May 2021 | Published: 26 Jun 2020
Get This Now

TOPICS:  Cybersecurity

Zero-trust Implementation Begins With Choosing an On-Ramp
sponsored by Thales
EBOOK:PH
Posted: 14 May 2021 | Published: 14 May 2021
Get This Now

TOPICS:  Data Security

CPRA Compliance Creates Complications for IT Ops
sponsored by Thales
EBOOK:PH
Posted: 14 May 2021 | Published: 14 May 2021
Get This Now

TOPICS:  Data Security

Comparing Data Protection vs. Data Security vs. Data Privacy
sponsored by Thales
EBOOK:PH
Posted: 14 May 2021 | Published: 14 May 2021
Get This Now

TOPICS:  Data Security

Select the Right Key Management as a Service to Mitigate Data Security and Privacy Risks in the Cloud
sponsored by Thales
WHITE PAPER:As data moves across multi-cloud, hybrid cloud and distributed public cloud services, security and risk management leaders must take urgent action to mitigate security, privacy and data residency risks. View this Gartner report to learn how encryption – specifically Key Management-as-a-Service – can help you do so.
Posted: 11 May 2021 | Published: 17 Feb 2021
Get This Now

TOPICS:  .NET

Building a Strong Foundation for Data Privacy and Security
sponsored by Thales
EBOOK:Take a quick survey to access a PDF download to learn about Thales CipherTrust Data Discovery and Classification, which allows you to easily uncover and mitigate privacy risks, enforce data sovereignty, and comply with a growing number of data privacy and security regulations, such as, CCPA, PCI DSS and HIPAA.
Posted: 04 May 2021 | Published: 04 May 2021
Get This Now

TOPICS:  Data Security

Meeting NIST Guidelines for Zero Trust Security
sponsored by Thales
EBOOK:The digital age has completely transformed how organizations protect their users and data – traditional perimeter security methods have been replaced by Zero Trust architectures. Take this brief survey to access this white paper and learn about facilitating effective Zero Trust implementation through NIST guidelines.
Posted: 04 May 2021 | Published: 31 Oct 2020
Get This Now


The Key Pillars for Protecting Sensitive Data in Any Organization
sponsored by Thales
EBOOK:Take a brief survey to access an informative white paper on the 3 pillars of data-centric security and the CipherTrust Data Security platform by Thales.
Posted: 04 May 2021 | Published: 04 May 2021
Get This Now

TOPICS:  Data Security

Manage Authentication Deployments Faster and More Effectively
sponsored by Thales
EBOOK:Cloud-based authentication services, especially when part of a broader access management service, can help organizations achieve significant savings through automation. To learn about the SafeNet Trusted Access solution from Thales, take a brief survey so you can gain access to an outline of its key benefits and features.
Posted: 04 May 2021 | Published: 04 May 2021
Get This Now


Top Security Concerns for New Technology Deployments
sponsored by Thales
VIDEO:Thales releases an annual Data Threat Report, which compiles their research into the evolving landscape of cyberthreats, data security, and more. Watch this video for a 45-minute walkthrough of this year’s results, which include everything from zero trust, to mutlicloud environments, to quantum computing and everything in between.
Posted: 29 Jan 2021 | Premiered: 29 Jan 2021
Get This Now


SURFnet Selects Thales Luna HSMs to Secure DNSSEC Material
sponsored by Thales
CASE STUDY:As part of an organization-wide initiative to ensure DNS security and compliance, SURFnet partnered with Thales to address several challenges they were facing related to DNS. Read this case study to see why they chose Thales as their DNS security and compliance partner and learn more about the outcomes of this initiative.
Posted: 29 Jan 2021 | Published: 29 Jan 2021
Get This Now


CipherTrust Data Discovery and Classification from Thales
sponsored by Thales
VIDEO:To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.
Posted: 10 Aug 2020 | Premiered: 23 Mar 2020
Get This Now


CipherTrust Cloud Key Manager for Multi-cloud Environments - White Paper
sponsored by Thales
WHITE PAPER:The era of multi-cloud environments has enabled unmatched scalability and productivity. However, in order to optimize these capabilities, organizations need to restructure their approaches to data protection and key management. Download this report for a closer look at Thales’ CipherTrust Cloud Key Manager for multi-cloud environments.
Posted: 05 Aug 2020 | Published: 31 Jul 2020
Get This Now


Leading healthcare provider protects vital client assets with help from Thales
sponsored by Thales
CASE STUDY:This North America-based healthcare provider needed an encryption solution that could operate without disrupting their patient management system while simultaneously meeting all HIPAA standards. Tap into the case study to learn why the healthcare provider chose Vormetric Transparent Encryption from Thales.
Posted: 22 Jul 2020 | Published: 22 Jul 2020
Get This Now


Prevent Ransomware Attacks from Disrupting Your Business with Thales Data Security
sponsored by Thales
WHITE PAPER:Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds, and the estimated cost to businesses globally will be around $20 billion by 2021. In this white paper, learn how to defend against ransomware by taking a look at the anatomy of ransomware attacks.
Posted: 16 Jul 2020 | Published: 30 Jun 2020
Get This Now


Securing Big Data
sponsored by Thales
WHITE PAPER:In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020
Get This Now


1 - 25 of 37 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences