@CloudExpo Authors: Carmen Gonzalez, John Mertic, Elizabeth White, Lori MacVittie, Ed Featherston

Blog Feed Post

Thales Delivers Comprehensive Enterprise Key Management Capabilities with keyAuthority 4.0

Hardened key manager sets new standard for widely interoperable key management with high levels of assurance using OASIS KMIP

RSA Conference, San Francisco - February 25, 2013 - Thales, leader in information systems and communications security, announces keyAuthority 4.0, the industry's most comprehensive hardened key manager, providing full support for Key Management Interoperability Protocol (KMIP) version 1.1. Developed by the OASIS standards body, KMIP will be a critical enabler of broad enterprise key management that can span numerous encryption use cases and cryptographic applications.

Enterprises today understand the importance of cryptography to ensure the security of critical data - both on premise and in the cloud. However this creates a significant key management challenge, particularly as the number of applications and devices, often from different vendors, increases. To combat complexity, unnecessary operational costs and to ease compliance, valuable operational efficiencies can be gained by centralizing and automating key management. The value of separating key management tasks from the applications that use the keys is further increased in virtualized and cloud environments, where organizations can retain in-house control of keys and still take advantage of cloud-based encryption and data storage. KMIP is the first widely accepted industry standard for key management allowing organizations to gain these benefits while applying consistent controls and security policies.

News facts:

  • With KMIP 1.1 protocol support, enterprises are now able to expand the numbers and types of encryption applications supported under a single, unified key management system to achieve consistent security policy, simplified administration, auditing/reporting and economies of scale.

  • With the broad industry acceptance of KMIP, customers can deploy key management solutions to solve immediate needs with the confidence that they can be extended to support future use cases with minimal impact. keyAuthority 4.0 provides KMIP-enabled interoperability for encryption-enabled products from leading vendors including Brocade, NetApp and Quantum.

  • keyAuthority 4.0 offers the broadest and most complete support for KMIP 1.1, combined with market-proven enterprise capabilities such as the automation of key lifecycle management controls, high scalability, redundancy, support for multi-tenant environments and sophisticated administrative role separation and key segregation.

  • Delivered in a tamper-resistant and tamper-evident hardware platform certified to the stringent FIPS 140-2 Level 3 standard, keyAuthority 4.0 offers long-term reliable protection of keys on behalf of an organization's most critical applications and sensitive data.

Rich Mogull, analyst and CEO, Securosis, says:
"Increasing privacy concerns, regulations, use of distributed and cloud computing, and even BYOD, are all driving increased use of encryption in more diverse organizations than we have seen before. Sometimes the encryption implementations do a fine job of handling encryption keys themselves, but we see plenty of use cases and specific implementations where it makes far more sense to shift to an external key manager." (Understanding and Selecting a Key Management Solution, Securosis, February 2013).

Jack Rondoni, Sr. Director, Product Management, Brocade Data Center SAN, says:
"The ability to protect as well as dependably recover encryption keys used to secure confidential information is absolutely essential, making the selection of key management solutions a critical component of the encryption system. Brocade enterprise-class data-at-rest encryption platforms with its KMIP-compliant key management client are tightly integrated with keyAuthority to ensure reliability and operational transparency throughout the key management lifecycle. Together, Brocade and Thales enable enterprise and cloud service provider data centers to deploy a comprehensive data encryption strategy with a single point of management for all encryption services."

Eric Bassier, Director, Product Marketing, Quantum Corporation, says:
"Security of digital data is critical to all of our customers, that is why Quantum continues to partner with companies like Thales to support the KMIP standard and give customers the flexibility to choose the right solution for their business. The keyAuthority high-performance appliance, combined with KMIP 1.1 support, provides a reliable and extensible approach for customers seeking a standards-based solution to key lifecycle management."

Laurent Liscia, OASIS Executive Director and CEO, says:
"KMIP is widely acknowledged to be the key management interoperability solution. Its success is a testimony to the hard work and commitment of Thales and the other members of the OASIS KMIP Technical Committee. We applaud Thales for its role in advancing KMIP 1.1 and look forward to its continued contributions on behalf of open standards."

Richard Moulds, vice president strategy, Thales e-Security, says:
"keyAuthority is deployed in some of the most demanding environments, including financial services and government, where high levels of assurance and reliability are critical. Building on our history of developing trusted hardware security modules (HSMs) and key management solutions, and our experience as one of the founders and thought leaders behind KMIP, Thales is ideally positioned to satisfy partner and customer requirements for key management systems that can ultimately support the entire organization."

Supporting resources:

keyAuthority 4.0 will be available in Q2 2013. See demonstrations of keyAuthority at the RSA Conference, February 25 - March 1, 2013 in both the Thales booth #517 and the OASIS KMIP interoperability showcase booth #3012.

For industry insight and views on the latest key management trends check out our blogs www.thales-esecurity.com/blogs

Follow Thales e-Security on Twitter @Thalesesecurity, LinkedIn, Facebook and YouTube

About Thales e-Security
Thales e-Security is a leading global provider of data encryption and cyber security solutions to the financial services, high technology, manufacturing, government and technology sectors. With a 40-year track record of protecting corporate and government information, Thales solutions are used by four of the five largest energy and aerospace companies, 22 NATO countries, and secure more than 80 percent of worldwide payment transactions. Thales e-Security has offices in Australia, France, Hong Kong, Norway, United States and the United Kingdom. http://www.thales-esecurity.com/

About Thales
Thales is a global technology leader for the defence & security and the aerospace & transport markets. In 2011 the company generated revenues of €13 billion with 67,000 employees in 56 countries. With its 22,500 engineers and researchers, Thales has a unique capability to design, develop and deploy equipment, systems and services that meet the most complex security requirements. Thales has an exceptional international footprint, with operations around the world working with customers and local partners. http://www.thalesgroup.com/

Ben Leong
Hotwire PR
[email protected]

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

@CloudExpo Stories
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we’re concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins – the habits, interests, visited websites and so on. On the other hand, our own security is in danger bec...
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and microservices. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your conta...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, wil...
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...
The IoT industry is now at a crossroads, between the fast-paced innovation of technologies and the pending mass adoption by global enterprises. The complexity of combining rapidly evolving technologies and the need to establish practices for market acceleration pose a strong challenge to global enterprises as well as IoT vendors. In his session at @ThingsExpo, Clark Smith, senior product manager for Numerex, will discuss how Numerex, as an experienced, established IoT provider, has embraced a ...
“Media Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. CloudBerry Backup is a leading cross-platform cloud backup and disaster recovery solution integrated with major public cloud services, such as Amazon Web Services, Microsoft Azure and Google Cloud Platform.
In the next forty months – just over three years – businesses will undergo extraordinary changes. The exponential growth of digitization and machine learning will see a step function change in how businesses create value, satisfy customers, and outperform their competition. In the next forty months companies will take the actions that will see them get to the next level of the game called Capitalism. Or they won’t – game over. The winners of today and tomorrow think differently, follow different...
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, will discuss how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team a...
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
What are the successful IoT innovations from emerging markets? What are the unique challenges and opportunities from these markets? How did the constraints in connectivity among others lead to groundbreaking insights? In her session at @ThingsExpo, Carmen Feliciano, a Principal at AMDG, will answer all these questions and share how you can apply IoT best practices and frameworks from the emerging markets to your own business.
Big Data has been changing the world. IoT fuels the further transformation recently. How are Big Data and IoT related? In his session at @BigDataExpo, Tony Shan, a renowned visionary and thought leader, will explore the interplay of Big Data and IoT. He will anatomize Big Data and IoT separately in terms of what, which, why, where, when, who, how and how much. He will then analyze the relationship between IoT and Big Data, specifically the drilldown of how the 4Vs of Big Data (Volume, Variety,...
SYS-CON Events announced today that SoftNet Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. SoftNet Solutions specializes in Enterprise Solutions for Hadoop and Big Data. It offers customers the most open, robust, and value-conscious portfolio of solutions, services, and tools for the shortest route to success with Big Data. The unique differentiator is the ability to architect and ...