Thank you for Subscribing to Apac CIO Outlook Weekly Brief
Thales eSecurity: 360-Degree Data Security Solutions
Over the last decade, technology has accelerated at an unprecedented pace and has pervaded almost every industry. With the rising adoption of AI and emergence of IoT, business processes have improved radically. But the rush to embrace newer innovations has also resulted in humongous amounts of data being generated everyday. A 2018 Global Data Threat Report by Thales suggests that digitally transformative technologies are pushing organizations toward a data-driven world, with 94 percent of them already using sensitive data in the cloud, big data, IoT, container, blockchain, and/or mobile environments. The report further finds that more and more companies today prefer multi-cloud environments over single ones to meet their burgeoning data storage needs. This typically entails companies working with multiple vendors for sourcing the right technical applications, platforms, and infrastructures to meet their business needs. But adopting multi-cloud environments also brings new challenges— they increase attack surfaces, open up fresh conduits for data loss, and pose potential compliance problems.
Director of Field Marketing and Strategy APAC, Jim Yip says, “We understand enterprises benefit from operating in multi-cloud environments. Our aim is to help them maximize those benefits by providing solutions that protect sensitive data, allow for centralized key management, and keep them in compliance with internal and industry data protection mandates–while also keeping operational costs in check.”
Our solutions are comprehensive and inclusive. They don’t involve complex installation or supplementation from other security vendors
What companies should be doing is identify a single platform that offers ease-of-use and robust measures like encryption, enterprise key management, access controls, and security intelligence. A good solution is one that casts little or no impact on existing system and application performance and enables rapid adoption of new technology solutions. This is the exact philosophy upon which Thales’s solutions are built, and is a reason why it is well regarded in the market.
Jim says, “Our solutions are comprehensive and inclusive. They don’t involve complex installation or supplementation from other security vendors.” However, when required Thales leverages its own technology and works with its OEM partners to tailor a specific solution to suit client needs. Thales’s comprehensive suite of hardware and software security solutions include its hardware security modules (HSMs) and the Vormetric data security product line, which enable companies and government entities to secure data on-premises and in the cloud in an agile and nimble manner. The firm also aids its clients to protect identities and intellectual property and meet regulatory compliance through encryption, advanced key management, tokenization, and privileged-user control and high-assurance solutions.
Since its inception in 1976, the firm has evolved tremendously and has received numerous awards and accolades over time. In this period, the firm has acquired several companies including nCipher (2008), Vormetric (2016), and Gemalto (expected to complete acquisition by the end of 2018). Jim concludes, “We pride ourselves on helping our customers overcome data security and regulatory challenges and we envision continuing the same in the future.”