Learning How to Secure your Digital Tra...
Thales enables federal agencies to accelerate their digital transformation vision and execution by making data safe in any environment, all while maintaining business agility. Our data security platform provides:EncryptionTokenizationHSM SolutionsAdvanced Key ManagementJoin us for a live webinar on August 29th to learn how we protect structured and unstructured data at rest, in motion, and in use across devices, processes, platforms, and envir...
Protecting Sensitive and Compliant Anal...
Big data collects and analyzes large amounts of data from heterogeneous sources to discover unprecedented new knowledge and understanding of scientific and business scenarios. Aiming to gain greater insight into patterns not generally discernible from smaller data sets, big data business intelligence enables visibility into associations and trends that otherwise go unnoticed.However, big data exposes the enterprise to numerous data security th...
Securing Virtual Machine-Based Security...
Join us for a complimentary webinar on May 30, 2019 to learn about the strong partnership between Thales eSecurity, the industry leader in access control encryption and key management solutions, and FireEye, the industry leader in external threat intelligent services.The Thales Vormetric Data Security Platform produces detailed security intelligence log information on file level access of sensitive data including server activity, access attemp...
The Changing Landscape of Data Security...
With digital government initiatives underway throughout U.S. Federal agencies, new attacks occurring daily, and traditional threats, many agencies are struggling to protect critical citizen data, financial information and government secrets. In this session we’ll address the state of data security in U.S. Federal agencies today, the changing landscape of risks to data, and agency IT security pros priorities for data security today. Based...
Data Security Summit
In modernization efforts across government, agencies are doing more than replacing or updating legacy systems. They are leveraging the cloud and related technologies to make the IT enterprise more efficient, adaptable and scalable. In the process, they are also making the enterprise more diverse and complex, especially as they adopt a multi-cloud approach to delivering access to services and data. Unfortunately, this increased diversity and co...
Thales e-Security Webinar
This complimentary on-demand webcast discusses how Thales eSecurity Federal and Dell can help you secure your hyper-converged data. Dell has partnered with Thales, the industry leader in access control encryption and key management solutions, to allow its customers to secure data and centralize keys on a number of Dell solutions. Many government customers have now realized file-level access control, encryption, and key management are substanti...
Safeguarding Sensitive and Compliance D...
Join us for a complimentary webinar on February 28th to discuss how Thales eSecurity Federal and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solutions to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file-level access control, encryption, and key manageme...
Thales and Nutanix Deliver Secure Cloud...
Join us for a complimentary webinar on January 31st to discuss how Thales eSecurity Federal and Nutanix can help you secure your hyper-converged data. Nutanix has partnered with the industry leader in access control encryption and key management solutions to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file-level access control, encryption, and key manage...
Enabling Public Cloud Application Perfo...
As government agencies move application to the public cloud, they are faced with the challenge of application performance and security in cloud-hosted application delivery. Default application delivery software in public cloud offerings rarely provide the true features and security that agencies are used to from enterprise Application Delivery Controls (ADCs) and Web Application Firewalls (WAFs). By adding virtual enterprise ADCs or WAFs with...
Securing Your Privileged User Accounts
According to the findings of the recent 2017 Data Threat Report, 59% of the U.S. federal government respondents cited privileged users as the most dangerous insider threat. Cyber criminals launch sophisticated attacks to gain access to, and exploit insider privileges. Once they have privileged credentials, they are difficult to detect and can do irreparable damage. Our on demand webcast will highlight a typical use case to illustrate how the...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.