ARIA KMS Overview

What is Encryption Key Management, and What Factors Should be Considered when Implementing a KMS Solution?

To provide effective data protection and application defense and remain in compliance, organizations today need to protect their most critical data as it is created, transmitted, and stored. This requires companies to ...
Understanding Key Management Policy – Part 2

Understanding Key Management Policy – Part 2

In the first part of this two-part series on Key Management, we saw how an increasing number of organizations are encrypting their sensitive data to mitigate cybersecurity risks. As covered earlier, with ...
Thales Cloud Protection and Licensing Intro Video

A New Leader in Data Protection

It’s been an exciting week for everyone at Thales and Gemalto. The combination of our two companies creates the worldwide leader in digital security, protecting more data, transactions and identities than any ...
Kapalya Partners with Gemalto to Leverage Their Latest Key Management Solution

Kapalya Partners with Gemalto to Leverage Their Latest Key Management Solution

Discover why Kapalya recently selected SafeNet Virtual KeySecure k170v — Gemalto’s next-generation key management solution — to provide centralized key management and improved administration, while helping customers to meet compliance ...

Unearthing Ransomware Characteristics Using Classification Taxonomy

We are familiar with the problem of ransomware – malicious software that seeks to encrypt user data and demand a ransom in return for the decryption key. There are several defensive measures ...
key management

The Importance of Key Management When Implementing a Secure Information Gateway

With the rise of new technologies, such as mobility, cloud, and virtualization, enterprises need to adopt encryption to keep sensitive data secure, especially the data stored on-premise. In this blog, we emphasize ...
That’s Right, We are Playing Both Sides of the Key Management Game

That’s Right, We are Playing Both Sides of the Key Management Game:

| | key management
Thales both giveth and taketh Bring Your Own Keys (BYOK) There is no longer denying that encryption is a hot... The post That’s Right, We are Playing Both Sides of the Key ...
data protection

Is Your Data Hackproof?

The recent cyber attacks on two major Canadian Banks - The Bank of Montreal and Simplii Financial, has shaken the cyber community across the globe. In our latest post, we explore how ...
How to Maximize your ROI on Aadhaar Data Vault

How to Maximize your ROI on Aadhaar Data Vault

Amidst rising incidents of data breaches in India, the UIDAI has mandated all Aadhaar-based e-KYC Authenticating Agencies to store their Aadhaar-related data in “Aadhaar Data Vault” only. Discover how Authenticating Agencies can ...