APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cyber Security
    • Thales ESecurity
    Previous
    Next

    Thales eSecurity: 360-Degree Data Security Solutions

    Jim Yip,Director of Strategy, APAC, Thales eSecurityJim Yip, Director of Strategy, APAC
    Over the last decade, technology has accelerated at an unprecedented pace and has pervaded almost every industry. With the rising adoption of AI and emergence of IoT, business processes have improved radically. But the rush to embrace newer innovations has also resulted in humongous amounts of data being generated everyday. A 2018 Global Data Threat Report by Thales suggests that digitally transformative technologies are pushing organizations toward a data-driven world, with 94 percent of them already using sensitive data in the cloud, big data, IoT, container, blockchain, and/or mobile environments. The report further finds that more and more companies today prefer multi-cloud environments over single ones to meet their burgeoning data storage needs. This typically entails companies working with multiple vendors for sourcing the right technical applications, platforms, and infrastructures to meet their business needs. But adopting multi-cloud environments also brings new challenges— they increase attack surfaces, open up fresh conduits for data loss, and pose potential compliance problems.

    Director of Field Marketing and Strategy APAC, Jim Yip says, “We understand enterprises benefit from operating in multi-cloud environments. Our aim is to help them maximize those benefits by providing solutions that protect sensitive data, allow for centralized key management, and keep them in compliance with internal and industry data protection mandates–while also keeping operational costs in check.”
    Thales’s advanced data security solutions integrate with leading cloud platforms like AWS, Google, Microsoft, and Salesforce which offers users greater flexibility and control in establishing safeguards around their sensitive data and applications.

    Our solutions are comprehensive and inclusive. They don’t involve complex installation or supplementation from other security vendors

    The challenges, however, are not limited to only multi-cloud environments. Enterprises these days also deploy many disparate security solutions with the idea that taking a piecemeal approach will be the most effective. But it’s not. Also, some security controls impact performance, add to business costs, and require extensive solution re-architecting. “Security solutions that impose these ‘taxes’ are consistent failures,” Jim comments.

    What companies should be doing is identify a single platform that offers ease-of-use and robust measures like encryption, enterprise key management, access controls, and security intelligence. A good solution is one that casts little or no impact on existing system and application performance and enables rapid adoption of new technology solutions. This is the exact philosophy upon which Thales’s solutions are built, and is a reason why it is well regarded in the market.

    Jim says, “Our solutions are comprehensive and inclusive. They don’t involve complex installation or supplementation from other security vendors.” However, when required Thales leverages its own technology and works with its OEM partners to tailor a specific solution to suit client needs. Thales’s comprehensive suite of hardware and software security solutions include its hardware security modules (HSMs) and the Vormetric data security product line, which enable companies and government entities to secure data on-premises and in the cloud in an agile and nimble manner. The firm also aids its clients to protect identities and intellectual property and meet regulatory compliance through encryption, advanced key management, tokenization, and privileged-user control and high-assurance solutions.

    Since its inception in 1976, the firm has evolved tremendously and has received numerous awards and accolades over time. In this period, the firm has acquired several companies including nCipher (2008), Vormetric (2016), and Gemalto (expected to complete acquisition by the end of 2018). Jim concludes, “We pride ourselves on helping our customers overcome data security and regulatory challenges and we envision continuing the same in the future.”
    Previous
    Next
    Share this Article:
    Tweet

    Thales eSecurity Info

    Company
    Thales eSecurity

    Headquarters
    .

    Management
    Jim Yip, Director of Strategy, APAC and Cindy Provin, CEO

    Description
    Provides advanced data security solutions and services that enable organizations to protect data, identities and intellectual property, and meet regulatory compliance in any environment

    2018

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    CIO Speaks

    Previous Next
    Cloud Computing: Pharma Takes the Plunge

    Andy Newsom, SVP & CIO, CSL Behring

    WiFi 6, 5G and the Internet of Things (IoT)

    Mark Badal, CIO, IT&E

    In Augmented Reality, Size Matters

    Jason Blackman, CIO, Carsales.Com

    Enhancing Customers

    Marc A. Hamer, VP & CIO, Babcock & Wilcox Enterprises, Inc.

    Cloud or On-Premise? When Would The Question End?

    Kevin Soh, CIO and Director, e-Strategies, BH Global Corporation

    Responsible AI: The Human-Machine Symbiosis

    Sal Cucchiara, CIO & Head Of Wealth Management Technology, Morgan Stanley

    Asian Development Bank: Using Emerging Digital Technologies for the Common Good

    Shirin Hamid, CIO, & CTO, Asian Development Bank

    Diversity and Inclusion can Drive Better Solutions for Clients and Employee Engagement

    Linda K. Lannen, CIO & Sr. VP, Kleinfelder

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    The Great Tech Arms Race: How Changing Consumer Behaviour and Expectation is Driving Ecommerce Transformation

    Brett Raven, CIO, Big Red Group

    Relying On Technologies To Transform Data Into Information

    Mark Ohlund, CIO & Sr. V.P., Armada Supply Chain Solution

    3D Printing Requires Wildly Different Thinking

    James MacLennan, SVP & CIO, IDEX Corporation

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/thales-esecurity