Posted on 12 August 2015 by Thales DIS
Mobile Workforce Security Blog Series – Part 6 Organizations worldwide are seeking greater employee mobility for a variety of business and quality of life reasons. Key to becoming a ‘mobile enterprise’ is the ability to manage and secure the identities and data within an IT ecosystem whose boundaries are becoming increasing blurry. This blog series […]
Posted on 04 August 2015 by Garrett Bekker
For security professionals, one of the primary challenges that arises with cloud computing is that they are faced with somehow protecting resources that, to varying degrees, they no longer have control over and for which traditional security controls like firewalls and IPS devices are ineffective. However, regardless of which cloud model you adopt – IaaS, […]
Posted on 30 July 2015 by Thales DIS
This is the second in a series of blog posts about how to address data security in the AWS cloud environment with the SafeNet product line from Gemalto. Topics that will be addressed include: how to store data in the AWS cloud with customer-owned encryption, roots of trust, the importance of secure key management, encryption […]
Posted on 27 July 2015 by Thales DIS
If you find yourself doing patchwork deployments when what you really want is a smart, long-term data protection strategy, then it’s time to enable encryption as an IT service.
Posted on 16 July 2015 by Thales DIS
In today’s global economy, data is king. Organizations are mining their available data to personalize customer experiences, automate processes, outperform the competition, and guide other important business initiatives and decisions. As a result, they’re not only producing more of it, but they’re also storing, processing, and distributing it in more places. So what does that […]
Posted on 29 June 2015 by Thales DIS
“Every cell phone tower you pass, friend you keep, article you write, site you visit, subject line you type, and packet you route, is in the hands of a system whose reach is unlimited but whose safeguards are not.” So if you don’t recognize this quote already, the author is Edward Snowden. We’re not talking […]