Key Management and Payments Security Blog - Thales e-Security

Data Security and Key Management - Thales e-Security

  • Vormetric Live Data Transformation – Boldly Going Where No Encryption Has Gone Before

    By | January 17, 2017

    Downtime. Nobody likes it. Unplanned downtime is almost always expensive. A 2015 report from IDC also revealed that for the Fortune 1000, the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year.

    Planned downtime is also a pain. Before I was in the security business, I marketed network solutions that were “bumps on the wire” that required planned downtime for deployment. There were ways to minimize or even reduce the downtime, but they were complicated.

    Continue Reading
  • Identity in the Time of Digitalization

    By | January 16, 2017

    Electronic Signature and Multifactor Authentication

    We are entering a new digital world in which the way we perceive and protect identity is rapidly shifting. As a result , the risk of identity theft is increasing. So how can today’s technology meet challenges such as these?

    Continue Reading
  • New Innovations for the New Year, Part One: The Short Term

    By | January 13, 2017

    This may sound obvious, but our industry is very reactive. It often feels like we, as security professionals, must wait in the wings until something disastrous happens. Then, and only then, are we allowed to develop and respond to technologic trends.

    So why does security consistently feel like it’s behind the curve? There are multiple reasons. We are all familiar with the dichotomy of security vs. convenience, which often positions security as the polar opposite of innovation. Many start-ups encourage a culture that values business swiftness over long term stability, and security is typically seen as too cumbersome. However, it’s possible for us to be excited about market trends and information security, we just need to begin taking the correct steps.

    Continue Reading
  • How governments around the globe are tackling cyber-security

    By | January 09, 2017
    Every country has secrets. Every government has data or information that it simply cannot afford to lose or have stolen. Whether it’s strategic military positioning, government-owned ‘Big Data’ or even citizen ID or voter data governments have long had a need for High Assurance computer systems protection and cyber intelligence defences.
    Continue Reading
  • CSO new year resolutions for 2017 - make security a priority in digital transformation

    By | January 03, 2017

    In 2016, we saw organizations increasingly investing in a digital transformation strategy and any CIO worth their salt is going to continue to drive that change through 2017. In fact, Gartner’s 2017 CIO agenda survey found that more money is being invested into technologies that support shifts to digital services than in the past. At the same time, the board is increasing the pressure on CIOs to move the organization forward technologically in order to better compete in this ever-increasing digital world.

    Continue Reading
  • Docker data security - going from zero to hero

    By | December 28, 2016

    If you are already developing on Docker, you already know why interest is so high.  The combination of faster application delivery and evolution that it makes possible, easily scalable microservices, reusable standard images, and the possibility of reducing system licensing and management costs is nearly irresistible if you’ve adopted a DevOps strategy.  And a compelling reason to adopt one if you are not.

    For a look at just how hot Docker is, take a look at the Google trends search I captured in November comparing searches on Docker, Virtualization, DevOps and Big Data since the introduction of Docker in March of 2013.  It’s a telling story, with Docker searches far exceeding even combined searches around virtualization and DevOps from late 2014 on.

    Continue Reading
  • How Thales gets you home safe in time for Christmas

    By | December 22, 2016

    The singer Chris Rea enjoyed a seasonal hit in 1988 with “Driving home for Christmas”; but his hit album the following year, “The Road to Hell”, perhaps painted a more accurate picture of travel at Christmas.

    Fortunately, 50 years of advances in transport operations and information technology have transformed the experiences of millions of passengers and Thales UK, through its wide-ranging products and services, has made great advances towards reducing crowded trains, congested roads and unreliable services. 

    Continue Reading
  • Remote administration: value, security and convenience

    By | December 21, 2016

    Many companies today house critically sensitive data and applications on servers in data centers. Along with these sensitive assets, organizations are also deploying their security tools, such as encryption key management hardware devices, in data centers. However, the landscape of data centers is evolving, and encryption management tools must keep up to best serve their customers. In the last 15 years, we’ve seen a dramatic increase in remote, lights-out data centers. These facilities are incredibly large, and due to property costs, they are often located in isolated areas far away from urban centers and airports.

    Continue Reading
  • Shopping Survey: Cash is Still King, breaches hit the bottom line, mobile coming on slow

    By | December 19, 2016

    We recently released a survey about consumer’s attitudes and behavior around this “Most Shopping Time of Year”, and some of the results go straight to people and retailer’s pocket books.  First up let’s talk about what people will actually use to pay this season.


    Continue Reading
  • What's next for digital payments - and the security implications

    By | December 15, 2016

    It’s that time of year when people start reflecting on what happened in the last year and what is expected to happen in the new year. It’s no secret that blockchain was the single most impactful technology story of 2016. Why? Because it offers unique and revolutionary benefits over legacy systems and promises very much more for the future of trusted connected systems. Blockchain’s design inherently ensures transaction integrity but trust in the system as a whole also depends on the security of cryptographic keys at various end points which need to be very carefully created, managed and used. For example, a great strength of blockchain is that once a transaction is committed it can’t be undone – so participants must ensure that their identities cannot be abused.

    Continue Reading
View more

About this blog

Welcome to our new merged blog site, featuring key management and payments security focused content previously hosted on and

As companies look to protect their customer data and other sensitive information, encryption is being deployed more widely. Yet if an encryption key is lost then that data cannot be recovered. Avoiding this problem demands formalized processes and robust technologies for key management making the protection, management and secure use of cryptographic keys a fundamental component of modern IT security.

Thales has been applying data protection and key management expertise to the worldwide payments industry for over 25 years. Our solutions secure retail and corporate banking, integrate with all widely used credit/debit applications, and include the world's best-selling EMV data preparation system and complete PIN management for card issuers.