Webcasts

Thales e-Security RSS Feed
  • Data Protection in 2016 - Top 5 Use Cases

    2015 highlighted what we all know: data protection issues are a big deal.

    Join Kristina Cairns, Sr Product Marketing Manager, Thales e-Security and Sander Temme, Sr Product Line Manager, Thales e-Security as they share their practical knowledge of the top ways companies are protecting their data.

    Please register below to learn from our examples and make sure you're on track for 2016!

    Content Type: Webcasts
    Tags: payShield , nShield
  • Cloud Payments (HCE): A simpler step with Thales HSMs

    In this webinar, Simon Keates, Principal Consultant, Mobile Security will explain the key management requirements of the various schemes’ specifications, and explain how using Thales HSMs can shorten your development cycle.
    Content Type: Webcasts
    Tags: payShield , nShield
  • Digital Certificates - A Critical Line of Defense Against Cybercrime

    Digital Certificates are a critical line of defense against cybercrime. From authenticating traditional user endpoints to enabling trusted e-commerce purchases, digital certificates and the public key infrastructure (PKI) that issues them create a high assurance foundation for digital security when implemented correctly. Join John Grimm, Senior Director at Thales e-Security, and Ted Shorter, CTO at Certified Security Solutions (CSS), as they discuss digital certificate use cases and today’s security threat landscape.

    Content Type: Webcasts
    Tags: nShield
  • Global PKI Trends…Revealed!

    In this webinar, Peter DiToro, Vice President Advanced Solutions, ASG, Thales e-Security, and independent researcher, Larry Ponemon, discuss the increased reliance on public key infrastructures (PKIs) in today’s enterprise environment, and how they are supporting a growing number of applications.
    Content Type: Webcasts
    Tags: payShield , nShield
  • Proteção de Dados: Como as Empresas Brasileiras utilizam a Criptografia (Webcast)

    Veja como as organizações brasileiras estão aumentando o uso da criptografia para atender aos novos regulamentos e aos ataques cibernéticos. Pesquisa multi-nacional da Thales conclui que a criptografia e o uso de chaves criptográficas tem se tornado questões estratégicas de negócios para abordar os regulamentos de segurança e gerenciar os riscos.

    Content Type: Webcasts
  • Trends in Cloud Encryption (Webcast)

    This webinar will discuss the results of the 2012 study that examines perceptions and current practices surrounding the threats and protection issues relating to sensitive or confidential data in the cloud.

    Content Type: Webcasts
  • How High Assurance Code Signing Can Make You a Hero (Webcast)

    Thales security expert Peter DiToro gives an informative session where you will learn how to:

    • Provide high assurance protection for private code signing keys and digital signature operations

    • Automate and simplify code signing workflows in multi-workstation environments

    • Apply cryptographic best practices to significantly reduce the risk of malicious software alteration and protect your brand.

    Content Type: Webcasts
    Tags: PKI , nShield
  • Database Encryption for Government- High Assurance and Compliance (Webcast)

    Thales and Microsoft will discuss high assurance database encryption for Government Microsoft SQL Server users. Learn how to:

    • Enhance the security of your Microsoft SQL database using built-in TDE and the extensible key management feature

    • Achieve operational ease with centralized key management in a scalable manner across multiple databases

    • Simplify regulatory compliance by protecting critical master keys in certified hardware with advanced separation of duties capabilities

    Content Type: Webcasts
    Tags: nShield
  • Database Encryption for Financial Services - High Assurance and Compliance (Webcast)

    Thales and Microsoft will discuss high assurance database encryption for Microsoft SQL Server users in the financial services industry. Learn how to: 

    • Enhance the security of your Microsoft SQL database using built-in TDE and the extensible key management feature

    • Achieve operational ease with centralized key management in a scalable manner across multiple databases

    • Simplify regulatory compliance by protecting critical master keys in certified hardware with advanced separation of duties capabilities

    Content Type: Webcasts
    Tags: nShield
  • Appliance Key Management Advantages for IBM Storage Encryption (Webcast)

    Whether yours is a small enterprise looking for a reliable point solution, or a global organization with a large investment in centralized IT services, this presentation will inform you on how today’s solutions provide the right fit to accelerate adoption and plan for future growth.

    Content Type: Webcasts