image description

Pursue an End to End Plan for Data Protection 2016|May

Forward to a Friend  
Thales e-Security + Vormetric = Better Together
    CEO Alan Kessler Icon
From the CEO's chair

Pursue an End to End Plan for Data Protection

Alan Kessler | CEO

Organisations that want to survive and thrive in the 21st century need every advantage they can get: top talent, top strategies and of course, top technology. Technology, after all, has helped make business transactions faster, more transparent and more efficient. Big data, cloud computing, the “Internet of Things” (IoT), robotics, bots and other forms of artificial intelligence are all technologies that your organisation is probably considering or reviewing, if they are not already in use. [...]



Join us on Stand C140, right in the centre of the show floor at the Networking Bar. We'll be highlighting the latest developments of the Vormetric Data Security Platform as well as discussing why, with the recent Thales acquisition of Thales e-Security, the companies are "better together".




State of Cyber Emergency
Sol Cates, Chief Security Officer

In late March, President Obama renewed a declaration of national emergency, citing the rising number of cyberattacks against the U.S. (let’s call it a State of Cyber-Emergency). I am pleased to hear the federal government is grasping the urgency of cybersecurity – an urgency demonstrated by the recent flurry of federal data breaches with the IRS, OPM, Department of Energy and Veteran’s Affairs, just to name a few. Thankfully, this steady drumbeat of federal breaches [...]



Docker and Containers 1 – Data Security Required
I-Ching Wang, Sr Director of Engineering

Containers have existed in some form or the other since Unix and FreeBSD days, for example, chroot, FreeBSD jails and Solaris Zones etc. The current generation of containers – LxC, LxD and Docker are extensions of these previous technology sets. But what exactly is Docker? From Wikipedia: Docker is an open-source project that automates the deployment of applications inside software containers, by providing an additional layer of abstraction and automation of operating-system-level virtualisation on Linux. [...]



When Hacking gets Very Real and Very Scary: ISIS targeting families
Charles Goldberg, Sr Director, Product Marketing

When you think about breaches and organisations targeted, a local uniform vendor probably wouldn’t top your list of obvious hacking threats. However, a recent hack at a uniform vendor that serves New Jersey Transit police officers presents a very illustrative cautionary tale. For enterprise security teams, the message is clear: Even the best defenses will be futile if your vendors’ security is weak. [...]



Addressing the Bank Bandits of Today
Tina Stewart, VP of Marketing

There once was a man named Willie Sutton
The bandit robbed banks like it was nothing
But data went online
Mass theft got redefined
And financial breaches hit major headlines

Nowadays, hardly a week goes by without news of another damaging data breach incident. According to the latest count from the Identity Theft Resource Center (ITRC) there have been a total of 269 data breaches recorded through April 19, 2016, and more than 11.27 million records have been exposed since the beginning of the year. [...]


2016 Data Threat Report, Cloud, Big Data and IoT Edition Thales e-Security brings critical
safe guards into
Docker environments
Visit Thales e-Security at InfoSecurity Europe 2016
2. Docker Solution brief
The latest Data Threat report focussing on Cloud, Big Data and IoT. Learn how to protect data within Docker environments. Join the V-team on stand C140.
Read More Read More Read More
Resources footer image
  Thales e-Security in the News Recent Press Releases Company Events Data Security White Papers
facebook Twitter Google+ Linkedin YouTube

Thales e-Security (@Thalesesecurity) is the industry leader in data security solutions that span physical, virtual and cloud environments. Data is the new currency and Thales e-Security helps enterprise customers and government agencies protect what matters—their sensitive data—from both internal and external threats. For more information, visit


©2016 Thales e-Security, Inc. All rights reserved. All trademarks are the property of their respective owners.