Missed one of our live events? Don’t worry, you can catch up at a more convenient time. Simply click on your chosen event from our library to tune in at your leisure.
Our aim is to showcase how our decisive technologies can help your customers decision moments. Topics range from strategic insights and best practice guidance through to more technical overviews and we invite questions so we can help you address your customers needs out in the field.
The Thales Tech Talk Webinar Series discusses the hot topics, latest trends, market insights and compliancy regulations driving customer demand today. We offer our point of view on: Encryption, Key Management, Identity and Access Management, Payment and General Purposes HSMs topics.
Please reach out to us if you have a topic that you would like us to cover and we will accommodate the request for future webinars.
17 September 2020, 11:00 BST (12:00 CET)
Today’s new normal has changed the market for data consumption and accelerated the need to protect data at multiple levels. With a feature-rich and comprehensive portfolio, partnering with an industry leader like Thales will help your business flourish.
Our technologies enable you to cross-sell to existing customers, retain higher revenues per partner contract and increase stickiness for customer retention. It helps open doors to new markets, obtain new customers and enables you to wrap value add services as a competitive differentiator.
Join Gary Marsden, Cloud Services Director to learn more about how the Thales New Normal provides unrivalled growth opportunities with zero investment, through data protection on demand, that can help accelerate your client revenues
The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.
12th November 2020
Networks have developed incredibly quickly over the last 25 years, from low speed public and private network access to the high speed fibre and Software Defined Networks seen today. However, most of the sensitive data being transferred across modern networks still rely on the performance sapping, bandwidth hungry security technologies introduced decades ago.
Join Thales on 12th November to learn how ultra-efficient certified network independent encryption can be deployed to secure today’s networks whether private layer 2 or public layer 3 networks with end points located on premise and in the Cloud.
28th October 2020
The Industry leading virtualisation platform VMware vSphere® protects virtual machine files, virtual disk files, and core dump files with VMware vSphere VM Encryption introduced in vSphere 6.5. The solution leverages the Key Management Interoperability Protocol (KMIP) for encryption key management and key vaulting. vSphere can be used with the CipherTrust Manager from Thales to provide the full range of protection for key management and role separation.
The combined solution delivers non-disruptive encryption, ensuring the security of VMs, the applications they run and the sensitive data they process. The combination provides a cost-effective and comprehensive solution that meets the most stringent security requirements. Leveraging hardware-based data encryption ensures no adverse impact to system performance.
During this webinar you will learn
Organisations receive hundreds, if not thousands, of alerts and reports every single day from a number of different security solutions across multiple vendors. All of these solutions are creating and sending alerts which is primarily triggered to help organisations know if they are under attack.
The resulting data deluge makes it more challenging to identify and respond to the genuine threats whilst ignoring the false positives and the red herrings. Companies are becoming Cyber Fatigued.
Join Manoj Bhati, Pre-Sales Consultant at Thales as he uncovers how to avoid Cyber Fatigue:
Any organisation involved in card payment transactions, from issuance to processing, must be compliant with standards. These are increasingly becoming more robust, detailed and payment-specific to protect customer sensitive data. To meet these standards, HSMs are a mandatory requirement to both protect and support the cryptographic keys and operations throughout the payment transaction.
As such, HSMs are a critical part of an organisation’s infrastructure and are expected to handle transactions seamlessly, 24/7. Performance, reliability and operating costs are all factors to consider during a procurement selection stage, while the operations team must have the available tools and knowledge to be able to remotely manage the HSMs for configuration, audit and key management, following industry best practice.
IT Departments are balancing the need for optimising performance and availability along with how best to ensure heightened security when considering their Cloud adoption. Encryption is the most effective way of securing that data.
Considerations include: Should organisations rely on cloud native encryption only? Is there any effective Key Management available? Do you have complete control of your keys and a root of trust? Are you protected against the attacks that begin from within the cloud infrastructure?
Organisations are electing to move more of their applications to the cloud each year. As they make this transition, they are considering how they port their existing on-premise security solutions to the Cloud.
Can organisations achieve the same level of security and trust as they enjoy on-premise? Are they able to use the same HSM or should they adopt an HSM service in a multi-cloud environment or hybrid infrastructure?
More than half (55%) of businesses believe cloud apps are the biggest targets for cyber-attacks, according to the 2020 Thales Access Management Index. Still, authentication [the act of verifying users are who they say they are] for the most part of cloud apps relies on passwords, - and surveys shows that despite the increase in data breaches, password use is actually going up.
This upcoming webinar aims to prepare you, as a Thales partner, to explain to businesses how Smart single sign on, passwordless authentication and access management all have a critical role to play in an organisation’s strategy for providing trusted access to the cloud.
In a world where identity is the new perimeter, our mission is to deliver trusted access in a zero trust world.
Over the last few years cloud adoption has been very high. The efficiencies and agility of cloud services will become ever more attractive to organisations as they need to accommodate employees working from home. The need to expand on-prem infrastructure such as VPNs to support additional employees can be costly and operationally challenging. On the other hand, enabling users to log onto cloud services using a password exposes organisations to data breaches and security risks.
Authentication for the most part has relied on passwords, and surveys shows that despite the increase in data breaches, password use is actually going up. This can be attributed to cloud adoption trends – The pace of cloud adoption is not keeping up with security and access management implementation, hence organisations are likely defaulting to passwords for lack of a better alternative, despite the risks.
However, the good news is that IT and risk professionals are looking for new ways to secure access and this need has been driving innovation in authentication technologies and methods. These include passwordless authentication, the FIDO protocol, Zero trust approaches and adaptive authentication.
Delivering Data Security through the effective use of Encryption and Key Management has become an industry recognised practice, offering the best protection against data breaches.
However, the abundance of Key Management and Encryption Solutions in the market can seem slightly overwhelming, so what should you consider when choosing your solution?
Join Romana Hamplova, Pre-Sales Consultant at Thales during this webinar: