Business Wire

THALES

Share
Thales Empowers Organisations to Simplify the Discovery, Protection and Control of Sensitive Data

Thales today announced the launch of the CipherTrust Data Security Platform , the industry’s first unified data protection solution that enables organisations to discover, protect, and control their most sensitive data wherever it resides. The new platform helps solve key challenges they face today. These include data security complexity caused by multi-cloud adoption, evolving global and regional privacy regulations, as well as the risk of data breaches from external and internal threats.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20200921005046/en/

Drawing from years of data protection innovation, Thales has built the CipherTrust Data Security Platform to seamlessly unify data discovery, classification and data protection, along with strong access controls and centralised key management. The ‘all-in-one’ platform combines the best of Thales’s Vormetric and SafeNet KeySecure technologies to give organisations the power to keep sensitive data secure on premises or in the cloud while reducing costs and maintaining the highest levels of compliance assurance.

“CipherTrust Data Security Platform unifies the most critical elements of data security – data discovery, protection and control – into one integrated platform, providing powerful tools to address the evolving global and regional privacy regulations as well as the uptick of cloud adoption intensified by remote working,” said Todd Moore, Vice President, Encryption Solutions, Thales . “In addition to the external challenges of data protection, our new platform also helps reduce the operational complexities many organisations face, especially as businesses work to recover from the effects of the COVID-19 pandemic. This evolution of security through simplicity is exactly what organisations require now and for the future.”

Solving the Complexity Problem

Highly-distributed workforces, evolving regulations and technologies, infinite data growth and the exploding use of multi-cloud services puts sensitive data at risk, and makes data security even more challenging. According to the 2020 Thales Data Threat Report - Global Edition, organisations use 29 different cloud services on average. Lack of visibility and operational complexity has resulted in organisations not knowing where all of their sensitive data is stored. This concern around complexity (identified as the number one barrier to security by nearly 40% of the 2020 Thales Data Threat Report-Global Edition respondents) is simplified with the CipherTrust Data Security Platform.

“Complexity is one of the main barriers to deploying data security more broadly, in part because overall data security remains fairly specialised and siloed, forcing enterprises to manage multiple vendors and point products,” said Garrett Bekker, Senior Research Analyst, Information Security at 451 Research, part of S&P Global Market Intelligence, in the report, ‘Thales unites KeySecure and Vormetric product lines under CipherTrust Data Security Platform.’ “With the launch of CipherTrust Data Security Platform, Thales is looking to simplify the delivery of data security with one of the broadest data security portfolios in the market, spanning most flavours of encryption (application, database, server, file), vaulted and vaultless tokenisation, masking, key management, cloud key management, and HSMs and most recently, data discovery.”

Discover and classify sensitive data in the cloud and on-premises

As more enterprise applications and data move to the cloud and companies seek to improve scalability and deliver remote capabilities for their workforce, IT organisations will be challenged to have a holistic view of their data. As part of the platform, CipherTrust Data Discovery and Classification enables organisations to discover and classify sensitive data, as well as remediate, from a single pane of glass. Organisations can understand risks, uncover gaps, and make better decisions about both third-party data sharing and cloud migration. In addition, the solution provides a comprehensive set of built-in classification templates for commonly requested data privacy and security regulations, such as the GDPR and California Consumer Privacy Act (CCPA), but is flexible enough to handle custom policies based on specific patterns and algorithms.

Protect sensitive data anywhere with advanced encryption and tokenisation

According to IDC, more than 175 zetabytes of data will be created by 2025, and today more than half of all corporate data is stored in the cloud. To address the complexity of where data is stored, the CipherTrust Data Security Platform offers strong capabilities for securing and controlling access to sensitive data in databases, files and containers. Specific technologies include:

  • CipherTrust Transparent Encryption – encrypts data across on-premises, cloud, database, file, and Big Data environments with comprehensive data access controls and detailed data access audit logging that can stop the most malicious attacks;
  • CipherTrust Database Protection – provides transparent column-level encryption of structured, sensitive data residing in databases, such as credit card, social security numbers, national ID numbers, passwords and email addresses;
  • CipherTrust Application Data Protection – offers APIs for developers to quickly add encryption and other crypto functions to their applications, while SecOps controls the encryption keys;
  • CipherTrust Tokenisation– offers application-level data tokenisation services in two convenient solutions that deliver customer flexibility--Vaultless Tokenisation with policy-based Dynamic Data Masking and Vaulted Tokenisation; and
  • CipherTrust Batch Data Transformation – provides static data masking services to remove sensitive data from production databases so compliance and security concerns are alleviated when sharing a database with third parties for analytics, testing, or other processing.

Control and centralise management of encryption keys

The accelerated adoption of encryption has led to the need to manage a far larger number of encryption keys across traditional data stores and multiple cloud environments. Proper management of encryption keys is paramount for data security because if keys are stolen, the encryption is rendered useless, and if they are lost the data is digitally shredded and cannot be recovered. This is why many organisations struggle with managing different key management solutions. CipherTrust Data Security Platform’s enterprise key management enables businesses to centrally manage and establish strong controls over encryption keys and policies for data encrypted on-premises and by cloud services. Specific technologies include:

  • CipherTrust Manager– centralises keys, management and data access policies for all CipherTrust Data Security Platform products and is available in both physical and virtual form factors that are up to FIPS 140-2 Level 3 compliant;
  • CipherTrust Cloud Key Manager – offers cloud bring you own key (BYOK) life cycle management for many Infrastructure, Platform- and Software as a Service cloud providers;
  • CipherTrust KMIP Server – centralises key management for the standard Key Management Interoperability Protocol (KMIP) commonly used across storage solutions; and,
  • CipherTrust TDE Key Manager – centralises key management for encryption found in Oracle, SQL, and Always Encrypted SQL.

Industry insight and views on the latest data security trends can be found on the Thales blog . Follow Thales on Twitter , LinkedIn , Facebook and YouTube .

About Thales

Thales (Euronext Paris: HO) is a global technology leader shaping the world of tomorrow today. The Group provides solutions, services and products to customers in the aeronautics, space, transport, digital identity and security, and defence markets. With 83,000 employees in 68 countries, Thales generated sales of €19 billion in 2019 (on a pro forma basis including Gemalto over 12 months).

Thales is investing in particular in digital innovations — connectivity, Big Data, artificial intelligence and cybersecurity — technologies that support businesses, organisations and governments in their decisive moments.

PLEASE VISIT

Thales Group

Security

Link:

ClickThru

About Business Wire

Business Wire
Business Wire
101 California Street, 20th Floor
CA 94111 San Francisco

http://businesswire.com

Subscribe to releases from Business Wire

Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.

Latest releases from Business Wire

Pure Lithium Receives Saudi Patent for Vertically Integrated Lithium Metal Battery Technology25.11.2025 14:20:00 CET | Press release

Pure Lithium Corporation, a disruptive lithium metal battery technology company, is pleased to announce that the Kingdom of Saudi Arabia has granted the company a foundational patent titled “Vertically Integrated Pure Lithium Metal Production and Lithium Battery Production.” This broad patent covers technology that combines lithium extraction, anode production and battery manufacturing. Pure Lithium’s Brine to Battery™ is a registered trademark in the Kingdom of Saudi Arabia, planting a strong base of intellectual property in the region. “The technology is particularly relevant to Saudi Arabia because it is one of the places in the world with lithium-containing brines, and even has an abundance of vanadium, which is used in our second-generation battery,” said Founder, Chairman and CEO Emilie Bodoin. “In order to displace today’s lithium-ion battery, our vision is to create global battery hubs with closed loop supply chains, not just in the U.S., but in the many places in the world whe

‘BLUE LOCK - TOKYO EGOIST -’ kicks off on Saturday, November 2225.11.2025 14:07:00 CET | Press release

“BLUE LOCK” voice actors Kazuki Ura and Hiroshi Kamiya were also blown away by the spectacle! A countdown to the new release was held together with over 2,000 fans gathered at the Tokyo Metropolitan Government Plaza. In its efforts to promote nighttime tourism, the Tokyo Metropolitan Government is developing new attractions that illuminate the capital after dark. As part of this initiative, projection mapping is being presented year-round on the iconic Tokyo Metropolitan Government Building No. 1, transforming its façade into a canvas of light and sound. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251121922505/en/ ©Muneyuki Kaneshiro, Yusuke Nomura, KODANSHA/BLUE LOCK Production Committee. A brand-new production inspired by the internationally popular soccer anime“BLUE LOCK”, titled BLUE LOCK – TOKYO EGOIST –, began screening on Saturday, November 22. On the first day of the screening, a mini-event was held at the Tokyo M

Infineon and HTEC Showcase Humanoid Robotic Head at Infineon’s OktoberTech™ Silicon Valley 2025 Show25.11.2025 14:00:00 CET | Press release

The demo won the Partner Innovation Award for its innovative 360° multi-sensory awareness and human-interactive robotic capabilities. The long-standing collaboration between Infineon Technologies AG and HTEC reached a new milestone this October at OktoberTech™ Silicon Valley 2025, where the two companies presented their jointly developed 360° Awareness Humanoid Robotic Head. The technology, which is a result of close partnership in embedded engineering, sensor fusion, and AI integration, captured the attention of attendees and was honored with the event’s Partner Innovation Award. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251125008456/en/ The Humanoid Robotic Head, developed by HTEC using Infineon technologies, won the Partner Innovation Award at Infineon's OktoberTech event for its innovative 360° multi-sensory awareness and human-interactive robotic capabilities. The Robotic Head represents a major step toward more pe

Henderson Municipal Power & Light builds multigigabit FTTH network with Adtran fiber access technology25.11.2025 14:00:00 CET | Press release

News summary: Kentucky-based utility and internet provider needed a scalable solution to accelerate city-wide broadband deployment Adtran’s open intelligent access technology with Mosaic One and GLDS BroadHub® streamlines operations and boosts subscriber satisfaction AI-driven insights drive smarter service delivery and open new revenue opportunities Adtran today announced that Henderson Municipal Power & Light (HMP&L) is expanding broadband services across Henderson, Kentucky, using its open, intelligent fiber access platform. The highly scalable network leverages Adtran’s AI-powered insights to boost performance and reliability, enabling HMP&L to deliver fast, dependable multigigabit fiber-to-the-home (FTTH) services to residents and businesses. Fully integrated with Mosaic One and GLDS BroadHub® platforms, the solution simplifies network management and elevates the customer experience. The strong partnership between Adtran and HMP&L is enhancing access to digital resources, providin

How Banks and Fintech Will Verify in 2026: Regula Study25.11.2025 14:00:00 CET | Press release

Regula’s report, “What’s Reshaping IDV in Banking & Fintech: 2026 Trends and Predictions,” reveals that biometric verification has become the most attacked point in the digital identity verification (IDV) process across financial organizations. New global data shows that at least three in ten financial institutions are hit by impersonation fraud, driving a shift toward more robust identity verification. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20251125171096/en/ Survey data from Regula shows banks and fintechs align on automation and integration challenges, but diverge sharply on user-experience concerns. According to survey data from organizations in the US, UAE, Germany, and Singapore, at least three in ten banks and fintechs report biometric verification as the stage most frequently targeted by fraudsters—ahead of document checks or other onboarding steps. Many of these incidents involve AI-generated media, including

In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.

Visit our pressroom
World GlobeA line styled icon from Orion Icon Library.HiddenA line styled icon from Orion Icon Library.Eye