All resources sponsored by:

Thales

1 - 25 of 49 Matches
CipherTrust Data Discovery and Classification from Thales
sponsored by Thales
VIDEO:To meet today’s regulatory, privacy and security needs requires greater visibility into and understanding of key risk areas. This 5-minute video provides a brief overview of the key features and capabilities of Thales’ CipherTrust Data Discover and Classification, a dashboard designed to help organizations address these challenges.
Posted: 10 Aug 2020 | Premiered: 23 Mar 2020
Get This Now


CipherTrust Cloud Key Manager for Multi-cloud Environments - White Paper
sponsored by Thales
WHITE PAPER:The era of multi-cloud environments has enabled unmatched scalability and productivity. However, in order to optimize these capabilities, organizations need to restructure their approaches to data protection and key management. Download this report for a closer look at Thales’ CipherTrust Cloud Key Manager for multi-cloud environments.
Posted: 05 Aug 2020 | Published: 31 Jul 2020
Get This Now


Best Practices for Cloud Data Protection and Key Management
sponsored by Thales
WHITE PAPER:In the era of digital transformation and multi-cloud environments, ensuring the protecting of sensitive data is more important than ever. The following whitepaper highlights cloud data protection best practices, including an in-depth look into cloud native encryption and key management (BYOK, HYOK, RoT & more).
Posted: 05 Aug 2020 | Published: 31 Jul 2020
Get This Now


CipherTrust Cloud Key Manager
sponsored by Thales
PRODUCT OVERVIEW:To meet the recommendations of industry best practices, organizations are offering bring your own key (BYOK) services. However, this level of separation can have significant visibility and security impacts. This solution brief offers a closer look at CipherTrust Cloud Key Manager, which leverages BYOK while offering centralized visibility.
Posted: 05 Aug 2020 | Published: 30 Apr 2020
Get This Now


Leading healthcare provider protects vital client assets with help from Thales
sponsored by Thales
CASE STUDY:This North America-based healthcare provider needed an encryption solution that could operate without disrupting their patient management system while simultaneously meeting all HIPAA standards. Tap into the case study to learn why the healthcare provider chose Vormetric Transparent Encryption from Thales.
Posted: 22 Jul 2020 | Published: 22 Jul 2020
Get This Now


Data Security in Australia and New Zealand 2020
sponsored by Thales
ANALYST REPORT:Organizations in Australia and New Zealand are rapidly innovating their business models. This means more sensitive data to be created, collected and shared.The downside? This new data could be a gold mine for cybercriminals. How can businesses adapt to stay secure?To find out, read this report on the state of data security in the ANZ region.
Posted: 17 Jul 2020 | Published: 30 Jun 2020
Get This Now


Prevent Ransomware Attacks from Disrupting Your Business with Thales Data Security
sponsored by Thales
WHITE PAPER:Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds, and the estimated cost to businesses globally will be around $20 billion by 2021. In this white paper, learn how to defend against ransomware by taking a look at the anatomy of ransomware attacks.
Posted: 16 Jul 2020 | Published: 30 Jun 2020
Get This Now


Securing Big Data
sponsored by Thales
WHITE PAPER:In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020
Get This Now


Quantum Computing and Quantum-Safe Security
sponsored by Thales
WHITE PAPER:Although quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.
Posted: 15 Jul 2020 | Published: 15 Jul 2020
Get This Now


Vormetric Transparent Encryption for the SAP HANA® Data Management Suite
sponsored by Thales
PRODUCT OVERVIEW:While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.
Posted: 14 Jul 2020 | Published: 31 Jul 2019
Get This Now


Avoiding Data Leaks with Scalable Encryption and Access Controls
sponsored by Thales
PRODUCT OVERVIEW:Many organizations use Amazon S3 to store their sensitive data. However, in order to secure data in a cloud environment like S3, you need complete control of your data. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 is safe and complies with the strictest security regulations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020
Get This Now


The Challenges of Trusted Access in a Cloud-First World
sponsored by Thales
CASE STUDY:The 2020 Thales Access Management Index is a survey of 300 IT professionals across the U.S. and Brazil with responsibility for, or influence over, IT and data security.In this case study, read how these professionals answered questions regarding cloud access management as well as next steps and guidelines for adopting access management solutions.
Posted: 13 Jul 2020 | Published: 30 Jun 2020
Get This Now


Brother Secures Access and Reduces Costs with Cloud-based Authentication
sponsored by Thales
CASE STUDY:In order to address the remote access security issues needs of their rapidly expanding support team, Brother Industries began exploring their security options for a partner who would be cost-effective, agile and secure. Download this case study to see how & why Brother partnered with Thales to implement SafeNet Trusted Access (STA).
Posted: 13 Jul 2020 | Published: 13 Jul 2020
Get This Now


Secure Access to Virtual Environments and Private Clouds
sponsored by Thales
PRODUCT OVERVIEW:As business environments become more distributed, securing and managing the growing population of endpoints presents an increasingly difficult security strategy. In this white paper, take a closer look at the SafeNet Access Management and Authentication offering, designed to deliver secure access to modern environments.
Posted: 13 Jul 2020 | Published: 30 Jun 2020
Get This Now


The Changing Face of Data Security: 2020 Thales Data Threat Report
sponsored by Thales
WHITE PAPER:Thales, in conjunction with IDC, provides a comprehensive Data Threat Report each year designed to analyze the key trends and challenges as they relate to data breaches and securing critical data. Download this year’s Data Threat Report to learn more about the effects of digital transformations, cloud environments, and more.
Posted: 13 Jul 2020 | Published: 31 Mar 2020
Get This Now


Executive Summary 2020 Thales Access Management Index
sponsored by Thales
RESEARCH CONTENT:The 2020 Access Management Index explores access management practices within businesses and the use and importance of two-factor authentication, smart SSO and cloud access management tools. Read on to uncover the key findings.
Posted: 10 Jul 2020 | Published: 10 Jul 2020
Get This Now


Thales adds data discovery and classification to its growing data security and encryption empire
sponsored by Thales
ANALYST REPORT:In this 451 Research report, learn about Thales’s addition of data discovery, classification and risk analysis to its existing line of data security, encryption and key management offerings, in part to help address the growing convergence of requirements for data security and data privacy.
Posted: 09 Jul 2020 | Published: 09 Jul 2020
Get This Now


Achieving Security and Compliance for SAP HANA in the Cloud
sponsored by Thales
PRODUCT OVERVIEW:Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.
Posted: 09 Jul 2020 | Published: 29 Feb 2020
Get This Now


Shor's Algorithm
sponsored by Thales
WEBCAST:While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020
Get This Now


Protecting Sensitive Data in and Around an Oracle Database
sponsored by Thales
DATA SHEET:When planning to secure sensitive data in an Oracle database, enterprises need to consider that sensitive data may reside in unanticipated locations outside of the database itself. Robust data security includes considering how to secure sensitive data surrounding the Oracle database. Read on to learn how to get started.
Posted: 08 Jul 2020 | Published: 08 Jul 2020
Get This Now


Access Management is Essential for Cloud Transformation
sponsored by Thales
RESOURCE:Each year, Thales conducts a study into the trends, challenges and tactics of access management in order to better understand their efficacy and usage. The following infographic highlights the key findings from this year’s survey – which features topics like password credentials, cloud transformations, user convenience, and more.
Posted: 07 Jul 2020 | Published: 07 Jul 2020
Get This Now


Network Independent Encryption: Flexible, Policy-Based Network Encryption Security for Today’s High-Performance Network Architectures
sponsored by Thales
WHITE PAPER:Thales is a global leader in the development of end-to-end encryption technologies. Their solutions protect sensitive data for a wide range of commercial, government, industrial and defense customers. Read this white paper to learn more about Network Independent Encryption, the basis of a new technology by Thales called Transport Independent Mode.
Posted: 30 Jun 2020 | Published: 30 Apr 2020
Get This Now


SureDrop Secure File-Sharing and Collaboration
sponsored by Thales
DATA SHEET:File-sharing and collaboration tools like DropBox, Box and OneDrive all offer a degree of security but, for many organizations, they don’t meet their standards for maximum data protection. Learn about SureDrop, a security application, featuring end-to-end encryption and data sovereignty control to protect against malicious content.
Posted: 30 Jun 2020 | Published: 30 Jun 2020
Get This Now


Passwordless Authentication Solutions by Thales
sponsored by Thales
VIDEO:Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.
Posted: 30 Apr 2020 | Premiered: 10 Mar 2020
Get This Now


Enabling Secure Remote Working in Times of Crisis: Plan Ahead
sponsored by Thales
RESOURCE:As the global remote workforce continues to grow, security efforts need to be adjusted to focus on protecting distributed users and their access to critical data. This article highlights the challenges and best practices for security todays’ remote workforce. Read on to get started.
Posted: 30 Apr 2020 | Published: 19 Mar 2020
Get This Now


1 - 25 of 49 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info