Missed one of our live events? Don’t worry, you can catch up at a more convenient time. Simply click on your chosen event from our library to tune in at your leisure.
Our aim is to showcase how our decisive technologies can help your customers decision moments. Topics range from strategic insights and best practice guidance through to more technical overviews and we invite questions so we can help you address your customers needs out in the field.
The Thales Tech Talk Webinar Series discusses the hot topics, latest trends, market insights and compliancy regulations driving customer demand today. We offer our point of view on: Encryption, Key Management, Identity and Access Management, Payment and General Purposes HSMs topics.
Please reach out to us if you have a topic that you would like us to cover and we will accommodate the request for future webinars.
Over 80% of companies are using two and more cloud providers to store sensitive data that needs protection. While encryption is a globally recognized data security principle, how do you control it across environments? The Cloud Security Alliance and Industry Analysts state that encryption keys should be held by customers, so what does that mean in a multi-cloud environment?
Join Axel Debray, Pre-Sales Manager for Data Protection at Thales UKI, to discover:
Fujitsu and Thales have partnered up to look at how financial organisations are expanding their cloud offerings on a global scale and how they are exploring the best security data practices to keep their organisations secure.
Join the data security team at Fujitsu and Thales as we discuss:
You will learn:
Today’s new normal has changed the market for data consumption and accelerated the need to protect data at multiple levels. With a feature-rich and comprehensive portfolio, partnering with an industry leader like Thales will help your business flourish.
Our technologies enable you to cross-sell to existing customers, retain higher revenues per partner contract and increase stickiness for customer retention. It helps open doors to new markets, obtain new customers and enables you to wrap value add services as a competitive differentiator.
Join Gary Marsden, Cloud Services Director to learn more about how the Thales New Normal provides unrivalled growth opportunities with zero investment, through data protection on demand, that can help accelerate your client revenues
Networks have developed incredibly quickly over the last 25 years, from low speed public and private network access to the high speed fibre and Software Defined Networks seen today. However, most of the sensitive data being transferred across modern networks still rely on the performance sapping, bandwidth hungry security technologies introduced decades ago.
Join Thales on 12th November to learn how ultra-efficient certified network independent encryption can be deployed to secure today’s networks whether private layer 2 or public layer 3 networks with end points located on premise and in the Cloud.
The Industry leading virtualisation platform VMware vSphere® protects virtual machine files, virtual disk files, and core dump files with VMware vSphere VM Encryption introduced in vSphere 6.5. The solution leverages the Key Management Interoperability Protocol (KMIP) for encryption key management and key vaulting. vSphere can be used with the CipherTrust Manager from Thales to provide the full range of protection for key management and role separation.
The combined solution delivers non-disruptive encryption, ensuring the security of VMs, the applications they run and the sensitive data they process. The combination provides a cost-effective and comprehensive solution that meets the most stringent security requirements. Leveraging hardware-based data encryption ensures no adverse impact to system performance.
During this webinar you will learn
Organisations receive hundreds, if not thousands, of alerts and reports every single day from a number of different security solutions across multiple vendors. All of these solutions are creating and sending alerts which is primarily triggered to help organisations know if they are under attack.
The resulting data deluge makes it more challenging to identify and respond to the genuine threats whilst ignoring the false positives and the red herrings. Companies are becoming Cyber Fatigued.
Join Manoj Bhati, Pre-Sales Consultant at Thales as he uncovers how to avoid Cyber Fatigue:
Join Manoj Bhati, Pre-Sales Consultant at Thales as he uncovers:
Please join Stéphane Kunegel, Pre-Sales Consultant at Thales to:
Make Thales Solutions a core part in your Data Security Strategy.