幺力视频

Skip to main content

Will your precious data rain down from the Cloud?

It鈥檚 hard to find fault with our digital lifestyle 鈥攅xcept when you consider how your data may lose its protection as it is used across the internet.

Consider a typical business trip: after purchasing online your airline ticket to an out-of-town conference, you board with a mobile boarding pass. Once inflight, you polish that important sales presentation on your tablet and update and record your contact information.  At the hotel, you check in and open the door to your room with your phone, before making a restaurant reservation with it for a client dinner.

Convenient? Yes, but the digital migration of data from one application to another or from a data center to the means that data protection needs to accompany that shift, especially with on the rise and increasingly strict data privacy regulations.

 

Protecting the Digital Migration

With its expertise and experience in the technologies of the , Thales delivers  flexible security solutions that secure critical data with the highest levels of assurance  鈥 wherever it resides, on-premises, in the cloud, or in hybrid environments.

鈥淭hales gives users the ability to set specific policies about how the data is accessed. One of the biggest threats organisation face is insiders leveraging their credentials to access sensitive data,鈥 says Peter Galvin, Chief Strategy and Marketing Officer, Thales.

鈥淏y providing fine grained access control, Thales helps prevent insider threats by limiting what a 鈥渟uper user鈥 is able to access.鈥

Thales鈥檚 offer includes advanced and services for organisations to protect their data as they move to the cloud.  The solutions include, 鈥淏ring Your Own Encryption鈥  (), 鈥淏ring Your Own Key鈥 () and , to  secure IaaS, PaaS, and Saas environments.

To protect highly sensitive information, Thales provides 鈥渉ardware security modules鈥 (HSM) to protect encryption keys.  One of the biggest dangers for organisations leveraging encryption to secure data is the protection of encryption keys.  If bad actors get access to the keys, then they have access to the data.  

With these tools, organisations can protect their information and avoid a thunderstorm of  unprotected data raining down from their clouds.