Author: Kristina Cairns

Categories : Data Security            Leave a comment           

Bringing Convenience, Cost Reduction & Increased Uptime for Thales e-Security Customers According to our 2017 Thales Global Data Threat Report, 68% of respondents have experienced a breach at some point, with more than one in four reporting breaches in the last year alone, up by 22% from the previous year. In this environment of ever-present threats, securing sensitive data has become a top priority for organizations. It’s thus no wonder that advanced techniques, such as encryption with strong key management, […]

Categories : Data Security            Leave a comment           

A new protection profile has been introduced, giving manufacturers a standard by which to certify Hardware Security Modules (HSMs). The new protection profile, which is expected to be accepted under eIDAS (EU regulation 910/2014), provides a common EU standard for HSMs. Thales e-Security HSMs that are certified to this standard will meet EU governmental requirements for HSM procurement across the whole of the EU, where in many cases the American FIPS 140 standard has not been acceptable. ANSSI, the French […]

Categories : Data Security            Leave a comment           

Many companies today house critically sensitive data and applications on servers in data centers. Along with these sensitive assets, organizations are also deploying their security tools, such as encryption key management hardware devices, in data centers. However, the landscape of data centers is evolving, and encryption management tools must keep up to best serve their customers. In the last 15 years, we’ve seen a dramatic increase in remote, lights-out data centers. These facilities are incredibly large, and due to property costs, […]

Categories : Data Security            Leave a comment           

Today, research shows that 85% of enterprise businesses are storing sensitive data in cloud environments. With the vast majority of organizations adopting software as a service (SaaS) and other cloud technologies, it’s important to know the associated risks along with the rewards. By purchasing cloud services, organizations can focus on the core of their business by eliminating the need for internal infrastructure, maintenance and support – ultimately reducing their bottom line. Not only can organizations save costs, but they also save […]