Thales Cloud Protection & Licensing is the leader in advanced data security solutions and services that deliver trust wherever information is created, shared or stored. We ensure that the data belonging to companies and government entities is both secure and trusted in any environment – on premise, in the cloud, in data centers or big data environments – without sacrificing business agility. Security doesn’t just reduce risk, it’s an enabler of the digital initiatives that now permeate our daily lives – digital currency, e-identities, healthcare, connected cars and with the internet of things (IoT) even household devices. Thales provides everything an organization needs to protect and manage its data, identities and intellectual property and meet regulatory compliance – through encryption, advanced key management, tokenization, privileged user control and high assurance solutions. Security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Thales Data Protection Portfolio as security breaches continue with alarming regularity and compliance mandates get more stringent, companies need to protect sensitive data in both on-premises and cloud environments. The industry leading portfolio of data protection solutions from Thales allows you to manage data-at-rest and data-in-motion security across the entire IT ecosystem, lowering costs and improving operational efficiencies. Thales offers advanced data-at-rest products which include data encryption, key management, and tokenization capabilities that enable customers to protect sensitive data wherever it resides - in file servers, databases, applications, on-premises or in cloud and virtual environments. Our data-in-motion products include high speed network encryptors for your sensitive data, real-time video and voice, as they move from
data center to data center or site-to-site, or to back up and disaster recovery sites.


Thales is the market leader in hardware security modules that protect the crypto infrastructure of the most security conscious organizations in the world and act as trust anchors by securely managing, processing, and storing crypto keys inside a hardened, tamper-resistant device available on-premises, in the cloud as a service or as a hybrid solution. The most trusted brands rely on Thales to help them protect and secure access to their most sensitive information. Whether you're protecting customer PII data, want to leverage hybrid clouds without sacrificing control of your data, or looking to optimize meeting data security and privacy regulations, the Thales Data Protection portfolio has the solutions and services that your organization can trust.

Thales_Data_Protection_Portfolio_d1asia.jpg

 

Thales Data Protection Advantages

• Centralized data-at-rest and data-in-motion encryption and key management policies
• Manage keys for Thales and third-party encryption products to enable bring your own key or encryption use cases
• Consistent security and compliance across physical, virtual, cloud and big data environments
• Single vendor that offers the largest breadth and depth of data protection products
• Only true encryption, key protection and key management solution for hybrid cloud and multi-cloud environments
• Support for emerging technologies including quantum, IoT, blockchain, 5G and more
• Global support with presence in 68 countries around the world

 

Key Benefits :

Strengthen Security and Compliance

Thales enables you to address the demands of a range of security and privacy mandates, including the electronic IDentification, Authentication and trust Services (eIDAS) regulation, Payment Card Industry Data Security Standard (PCI DSS), the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), the Federal Information Security Management Act (FISMA) and regional data protection and privacy laws.

 

Optimize Staff and Resource Efficiency

Our products make administration simple and efficient, offering intuitive web-based interfaces and a variety of application programming interfaces (APIs) including support for REST, Java, .Net, and C. This portfolio enables you to apply key management, data-at-rest and data-in-motion security policies quickly and consistently, while optimizing staff efficiency and productivity.

 

Reduce Total Cost of Ownership

Overall, the Thales data protection portfolio delivers a comprehensive set of data security products and solutions that easily scale, expand into new use cases, and have a proven track record of securing new technologies. With Thales, you can future proof your data protection investments while reducing operational costs.

 

Protecting Data at Rest The Vormetric Data Security Platform is composed of an integrated suite of products that protect data-at-rest. The platform is built on a common, extensible infrastructure with efficient, centralized key and policy management. It offers capabilities for protecting data in files, databases and containers, securing sensitive assets residing in cloud, virtual and physical environments. The platform includes:

 

dsm.JPGData Security Manager management environment for all Vormetric Data Security Platform products offering policy control as well as secure generation, management and storage of encryption keys. The platform includes a web-based console, CLI, SOAP and REST APIs, and is available up to FIPS 140-2 Level 3 and Common Criteria certified virtual and physical appliances.

 

transparent_encryption.jpgTransparent Encryption Vormetric Transparent Encryption (VTE) is a set of software agents that run on servers to protect data in files, volumes or databases on-premises, and in hybrid cloud environments. It features hardware accelerated encryption, least-privilege access controls and data access audit logging across data center, cloud and hybrid deployments. It offers extensions for Container Security, Live Data Transformation, Transparent Encryption for Efficient Storage and SAP HANA. VTE also provides integration with security information and event management (SIEM) systems, with pre-packaged dashboards and reports that streamline compliance reporting and speed threat detection.

 

 tokenization_thales.jpg

 Tokenization and Dynamic Data Masking Vormetric Tokenization Server makes it easy to add format-preserving tokenization to protect sensitive fields in databases and policy-based dynamic data masking for display security. Static data masking and bulk encryption or tokenizaton is made quick and simple with Vormetric Batch Data Transformation.

 

application-layer_Encryption.jpg

Application-layer Encryption Vormetric Application Encryption streamlines the process of adding AES and format-preserving encryption (FPE) into existing applications. It offers standards-based APIs that can be used to perform highperformance 
cryptographic and key management operations.

 

 

Enterprise_Key_Management.jpgEnterprise Key Management Vormetric Key Manager provides unified key management and secure key storage for third-party Transparent Data Encryption (TDE) and KMIP-compliant clients as well as securely storing certificates.

 

 

 

cloudkey.JPGCloud Key Management CipherTrust Cloud Key Manager manages Bring Your Own Keys (BYOK) and provider created keys for Salesforce, Microsoft Azure and AWS while addressing enterprise needs to meet compliance and best practices for managing encryption key life cycles outside of their native environments, without the need for enterprises to become cryptographic experts.

 

 

Protecting Data in Motion Thales offers High Speed Encryptors (HSEs) that provide network independent data-in-motion encryption (Layers 2,3 and 4) ensuring data is secure as it moves from site-to-site, or from on-premises to the cloud and back. Our HSE solutions allow customers to better protect data, video, voice, and metadata from eavesdropping, surveillance, and overt and covert interception — all at an affordable cost and without performance compromise. Thales HSEs are available as both physical and virtual appliances, supporting a wide spectrum of network speeds from 10 Mbps to 100 Gbps, with platforms ranging from single to multi-port appliances.

The CN series is a hardened physical network appliance that delivers network layer independent (Layers 2, 3 and 4) data-in-motion encryption. These hardware encryptors are certified for FIPS 140-2 Level 3 and Common Criteria EAL 2 and 4+.

The CV series is a hardened virtual appliance that delivers robust encryption for data-in-motion across high speed carrier WANs and SD-WAN links, using Network Function Virtualization (NFV).

 

Hardware Security Modules Thales offers the industry leading product family of hardware security modules (HSMs), which are the highest performing, most secure and easiest to integrate in the market today. They act as trust anchors to protect the master keys that encrypt your data and digital identities in a high assurance FIPS 140-2 Level 3-certified, tamper-resistant appliance. Thales offers the following types of purpose-built HSMs:

 

generalhsm.JPGHardware Security Modules Luna HSMs come in several form-factors — a network attached appliance, an embedded PCI module, and a portable USB appliance. They can be easily integrated with a wide-range of applications to accelerate general cryptographic operations, secure crypto key life cycles and act as a root of trust for your entire crypto infrastructure. Crypto Command Center is available to centrally monitor and manage multiple Luna HSM crypto resources on-premises, virtual and hybrid cloud environments.

 

cloudhsm.JPGCloud HSM Data Protection On Demand (DPoD) is a cloud-based platform that provides a wide range of Cloud HSM and key management services through a simple on-line marketplace. With DPoD, security is made simpler, more cost effective and easier to manage because there is no hardware to buy, deploy and maintain. Just click and deploy the protection you need, provision services, add security policies and get usage reporting in minutes.

 

 

 

payment hsm.JPGPayment HSM payShield 10K delivers a suite of payment security functionality including transaction processing, sensitive data protection, payment credential issuing, mobile card acceptance and payment tokenization.
It is used throughout the global payment ecosystem by issuers, service providers, acquirers, processors and payment networks. The payShield 10K has PCI HSM v3 and FIPS 140-2 Level 3 certifications.

 

Top 10 reasons for migrating to payShield 10K now ,  please download >> Click <<

Thailand’s Personal Data Protection Act and What it Means for Your Business ,  please download >> Click <<

Thales Data Protection Portfolio ,  please download >> Click <<

Highlighted Technologies and Solutions :

Case Studies

Why choose us

Why Choose Us: DataOne Asia is the distributor of Thales payShield HSM, Luna HSM and Vormetric security solutions as well as security service provider among high security industry. Our security experts have been certified by international standards and are expreienced in solution designning, project management and implementation of security solutions to many other customers of Thales in Thailand. Our aftersales services include 24 x 7 call center support and spare part replacement.

https://cpl.thalesgroup.com/

 

 

 

 

 

ß