Remove Blog Remove Encryption Remove Meeting Remove Security
article thumbnail

The value of Key Rotation and Re-encryption.

Thales Cloud Protection & Licensing

The value of Key Rotation and Re-encryption. To meet various compliance requirements and reduce the risk of your most sensitive data getting compromised you may want to consider changing the encryption key used to protect this data. Thales refers to this changing of encryption keys as “Key rotation” or “Rekey”.

article thumbnail

When Encryption Meets Flash Arrays

Thales Cloud Protection & Licensing

To combat threats and keep data safe, IT teams must employ robust encryption, key management, and access controls. To secure storage, many organizations have been leveraging native encryption offerings from their storage vendors. Security Versus Efficiency with Flash Arrays. columns of database). columns of database).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: End-to-End Data Encryption with Data Reduction from Thales & Pure Storage

Thales Cloud Protection & Licensing

At the 2019 RSA Conference, Pure Storage and Thales introduced Vormetric Transparent Encryption for Efficient Storage – the IT and security industries’ first end-to-end data encryption framework that realizes storage array data reduction. Data Security: Low Adoption Amidst Increasing Requirements.

article thumbnail

Seven Data Security Challenges You Must Meet to Comply with GDPR

Thales Cloud Protection & Licensing

The paper examines the regulation’s security standards and the capabilities security teams need to comply withthose standards in the face of more hybrid IT environments that encompass both on-premises and multiple cloud services. Encryption for Data in Transit and at Rest. They are covered in more depth in our White Paper.

GDPR 119
article thumbnail

Guest Blog: End-to-End Data Encryption with Data Reduction from Thales & Pure Storage

Thales Cloud Protection & Licensing

At the 2019 RSA Conference, Pure Storage and Thales introduced Vormetric Transparent Encryption for Efficient Storage – the IT and security industries’ first end-to-end data encryption framework that realizes storage array data reduction. Data Security: Low Adoption Amidst Increasing Requirements.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

Unfortunately, API attacks are increasing as vectors for security incidents. In this blog, we will explain the unique data security challenges for Telcos and three ways how both Thales and Red Hat can help them protect against future API attacks. These large subscriber bases in turn generate massive data volumes.

article thumbnail

The GDPR: Requirements for encryption

IT Governance

Six months since the GDPR (General Data Protection Regulation) came into force, pseudonymisation and data encryption remain the only technology measures specifically mentioned in the famously technology-agnostic Regulation. But what exactly is meant by ‘pseudonymisation’ and ‘encryption’? To further protect data, we look to encryption.