article thumbnail

When Encryption Meets Flash Arrays

Thales Cloud Protection & Licensing

To combat threats and keep data safe, IT teams must employ robust encryption, key management, and access controls. To secure storage, many organizations have been leveraging native encryption offerings from their storage vendors. On the other hand, many enterprise applications now offer native encryption capabilities.

article thumbnail

The value of Key Rotation and Re-encryption.

Thales Cloud Protection & Licensing

The value of Key Rotation and Re-encryption. To meet various compliance requirements and reduce the risk of your most sensitive data getting compromised you may want to consider changing the encryption key used to protect this data. Thales refers to this changing of encryption keys as “Key rotation” or “Rekey”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: End-to-End Data Encryption with Data Reduction from Thales & Pure Storage

Thales Cloud Protection & Licensing

At the 2019 RSA Conference, Pure Storage and Thales introduced Vormetric Transparent Encryption for Efficient Storage – the IT and security industries’ first end-to-end data encryption framework that realizes storage array data reduction. Storage Costs of Encrypted Data.

article thumbnail

Guest Blog: End-to-End Data Encryption with Data Reduction from Thales & Pure Storage

Thales Cloud Protection & Licensing

At the 2019 RSA Conference, Pure Storage and Thales introduced Vormetric Transparent Encryption for Efficient Storage – the IT and security industries’ first end-to-end data encryption framework that realizes storage array data reduction. Storage Costs of Encrypted Data.

article thumbnail

The GDPR: Requirements for encryption

IT Governance

Six months since the GDPR (General Data Protection Regulation) came into force, pseudonymisation and data encryption remain the only technology measures specifically mentioned in the famously technology-agnostic Regulation. But what exactly is meant by ‘pseudonymisation’ and ‘encryption’? To further protect data, we look to encryption.

article thumbnail

Seven Data Security Challenges You Must Meet to Comply with GDPR

Thales Cloud Protection & Licensing

Encryption for Data in Transit and at Rest. Strong, granular and flexible encryption capabilities are a key requirement for preventing unauthorized access to private data. As the reliance on encryption grows so does the need for robust key management. Strong Key Management.

GDPR 119
article thumbnail

Why Enterprises Should Control Their Encryption Keys

Thales Cloud Protection & Licensing

Cloud providers have done a good job of integrating default encryption services within their core infrastructure. However, as discussed in previous blogs , the encryption service is only as secure as the keys that are used to encrypt the data. Which data within cloud workloads is encrypted. Key access information.