Thales will be showcasing its line of high assurance solutions for data protection and cyber security at this year’s RSA Conference, San Francisco, February 25 – March 1, 2013.
The company's booth #517 will be offering a hands-on experience with a genuine World War II Enigma machine and compare key management practices of yesterday and today. Strong encryption and key management are cornerstones of today’s IT infrastructures and Thales will be demonstrating its latest solutions for:
Enterprise class key management
Thales is again participating in the OASIS showcase, highlighting the Key Management Interoperability Protocol (KMIP) standard, with its high assurance enterprise-class key management solution – keyAuthority. The demonstration highlights the comprehensive capabilities of the Thales solution in the context of a variety of encryption devices from other participants in the KMIP interoperability booth. In addition, Thales key management experts will be available to discuss the evolution of the KMIP standard and the contribution of Thales as an originating author of the KMIP specification.
Cloud data protection
Strong encryption and key management are recognized as the most secure and effective way of protecting data and that applies equally to the cloud as in it does the enterprise. In order for organizations to take up cloud services and migrate sensitive and high-value data to virtualized and cloud deployments, they need a high assurance, reliable key management solution that allows them to retain control of their keys, and therefore their data. The Thales portfolio protects critical data assets throughout their lifecycle – when in storage, passing over communications networks and while in use by business applications – all of which are vital aspects of a cloud security strategy.
The growth of advanced persistent threats (APTs) such as Stuxnet and Duqu, the increase in cloud-based services and the smartphone and tablet revolution all place pressure on software producers to ensure the integrity and authenticity of their code. Code signing is used not only by software publishers but by all types of organizations writing software and firmware. It enables those installing software to validate that it has not changed since it was published and also to verify the identity of the publisher. A critical and fundamental element of the security of any code signing process, just as with any PKI-based technology, is protection of the confidentiality of the private key used to create the digital signature. Thales HSMs provide tamper-resistant, certified protection for private code signing keys, and our code signing solution offers flexible automation capabilities to simplify code signing request/approval workflows for organizations with more complex environments.
Thales is releasing the 8th edition of its annual research report - the Global Encryption Trends Study. The study, which is produced in conjunction with the Ponemon Institute, is based on a survey of more than 4,000 business and IT managers from around the world regarding the use of encryption, how it has evolved and its effect on the security posture of an organization. It focuses on the compliance pressures and cyber attacks targeting sensitive data and how and where different types of organizations are deploying encryption as a result.