THANK YOU FOR SUBSCRIBING

Thales eSecurity: 360-Degree Data Security Solutions


Director of Field Marketing and Strategy APAC, Jim Yip says, “We understand enterprises benefit from operating in multi-cloud environments. Our aim is to help them maximize those benefits by providing solutions that protect sensitive data, allow for centralized key management, and keep them in compliance with internal and industry data protection mandates–while also keeping operational costs in check.”
Thales’s advanced data security solutions integrate with leading cloud platforms like AWS, Google, Microsoft, and Salesforce which offers users greater flexibility and control in establishing safeguards around their sensitive data and applications.
The challenges, however, are not limited to only multi-cloud environments. Enterprises these days also deploy many disparate security solutions with the idea that taking a piecemeal approach will be the most effective. But it’s not. Also, some security controls impact performance, add to business costs, and require extensive solution re-architecting. “Security solutions that impose these ‘taxes’ are consistent failures,” Jim comments.
What companies should be doing is identify a single platform that offers ease-of-use and robust measures like encryption, enterprise key management, access controls, and security intelligence. A good solution is one that casts little or no impact on existing system and application performance and enables rapid adoption of new technology solutions. This is the exact philosophy upon which Thales’s solutions are built, and is a reason why it is well regarded in the market.
Jim says, “Our solutions are comprehensive and inclusive. They don’t involve complex installation or supplementation from other security vendors.” However, when required Thales leverages its own technology and works with its OEM partners to tailor a specific solution to suit client needs. Thales’s comprehensive suite of hardware and software security solutions include its hardware security modules (HSMs) and the Vormetric data security product line, which enable companies and government entities to secure data on-premises and in the cloud in an agile and nimble manner. The firm also aids its clients to protect identities and intellectual property and meet regulatory compliance through encryption, advanced key management, tokenization, and privileged-user control and high-assurance solutions.
Since its inception in 1976, the firm has evolved tremendously and has received numerous awards and accolades over time. In this period, the firm has acquired several companies including nCipher (2008), Vormetric (2016), and Gemalto (expected to complete acquisition by the end of 2018). Jim concludes, “We pride ourselves on helping our customers overcome data security and regulatory challenges and we envision continuing the same in the future.”
Our solutions are comprehensive and inclusive. They don’t involve complex installation or supplementation from other security vendors
What companies should be doing is identify a single platform that offers ease-of-use and robust measures like encryption, enterprise key management, access controls, and security intelligence. A good solution is one that casts little or no impact on existing system and application performance and enables rapid adoption of new technology solutions. This is the exact philosophy upon which Thales’s solutions are built, and is a reason why it is well regarded in the market.
Jim says, “Our solutions are comprehensive and inclusive. They don’t involve complex installation or supplementation from other security vendors.” However, when required Thales leverages its own technology and works with its OEM partners to tailor a specific solution to suit client needs. Thales’s comprehensive suite of hardware and software security solutions include its hardware security modules (HSMs) and the Vormetric data security product line, which enable companies and government entities to secure data on-premises and in the cloud in an agile and nimble manner. The firm also aids its clients to protect identities and intellectual property and meet regulatory compliance through encryption, advanced key management, tokenization, and privileged-user control and high-assurance solutions.
Since its inception in 1976, the firm has evolved tremendously and has received numerous awards and accolades over time. In this period, the firm has acquired several companies including nCipher (2008), Vormetric (2016), and Gemalto (expected to complete acquisition by the end of 2018). Jim concludes, “We pride ourselves on helping our customers overcome data security and regulatory challenges and we envision continuing the same in the future.”

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info