This document discusses how Thales can help organizations securely adopt cloud applications and manage access. It notes that single sign-on alone in a hybrid IT environment poses security risks if credentials are compromised. Thales' SafeNet Trusted Access allows validating identities, determining trust levels, and applying access controls for cloud services. It can leverage Windows authentication and PKI to enhance convenience without additional authentication. The document also outlines Thales' key management and encryption solutions for data at rest, applications, big data, and the cloud.
2. 2
Thales & Gemalto: A New Profile
Does not include externally
financed R&D.
80,000employees
*Based on Thales and Gemalto reported 2017 consolidated income statements.
68Countries
global presence
€1bn+self-funded
R&D* 2017
Our team Around the world
Innovation
€19bn
A balanced
revenue structure
Revenue*
around
60%
Civil
40%
Defence
3. 3
The
Reality
The
Perception
94%
of enterprises say their perimeter
security technology is quite effective
at keeping unauthorized users out of
their networks.
of enterprises aren’t confident
their data would be secure after
a breach.
Source: 2017 Gemalto Data Security Confidence Index report
65%94%
Would your data be secure after a breach?
4. 4
With no defined perimeter in the digital world, it’s
time for a fundamental shift in the security
paradigm…
…by moving security closer to what
matters most – Data and Identities
5. 5
Move security beyond the perimeter to defend what’s really under attack
OWN & SECURE ENCRYPTION KEYS
• Manage key lifecycle
• Store keys securely
• Manage cryptographic resources
CONTROL ACCESS
• Manage and ensure appropriate
access to resources across enterprise
environments
• Provide strong multi-factor
authentication to corporate resources
ENCRYPT SENSITIVE DATA
• Secure data at rest and data in
motion
• Secure data across cloud, virtual,
and on-premises environments
8. 8
IDENTITY THEFT UNENCRYPTED DATA
Main cause of attacks Main cause of damages
69%
of breach
incidents
came from
identity theft
95%
of breaches involved
unencrypted data
The main causes of cyber threats
10. 10
Co přinesla adopce cloud aplikací
▌Uživatel
• Frustration or Same Passwords
• PW Fatigue
• Security work arounds
▌IT Admin
• PW resets
• Security risk
• Lack of visibility
11. 11
SSO v hybridním IT postředí
▌Uživatel
• Convenient and hassle free
▌IT Admin
• Security risk: if the credential is
compromised, all apps will be vulnerable
• Visibility: Can’t track which apps are being
accessed and when
12. 12
SSO + MFA + IT Control = Win-Win pro uživatele a IT
▌Uživatel
• Authenticate once and step up only
when required
▌IT Admin
• Set the access policy per cloud app
• Get visibility on who is accessing what,
when and how
• Maintain security, reduce PW workarounds
13. 13
SafeNet Trusted Access
APPLY ASSESS
Assess which
access policy
should be applied
Apply
appropriate
access controls,
with smart single
sign on
IDENTIFY
Validate
user’s identity
1
23
• SafeNet Trusted Access allows organizations to manage access to cloud applications by validating
identities, determining levels of trust and applying appropriate access controls each time the user
accesses a cloud service.
OTP PushSMS
Hardware PKI
Biometric
14. 14
Windows Integrated Authentication and PKI adoption
▌ SafeNet Trusted Access can use Windows login to the enterprise
As an authentication factor in the SSO session
▌ Enhances convenience:
No need to authenticate again after logging in with your Windows domain password