Click here to close now.


@CloudExpo Authors: Liz McMillan, Steve Watts, Elizabeth White, Pat Romanski, Flint Brenton

Blog Feed Post

Thales Delivers Comprehensive Enterprise Key Management Capabilities with keyAuthority 4.0

Hardened key manager sets new standard for widely interoperable key management with high levels of assurance using OASIS KMIP

RSA Conference, San Francisco - February 25, 2013 - Thales, leader in information systems and communications security, announces keyAuthority 4.0, the industry's most comprehensive hardened key manager, providing full support for Key Management Interoperability Protocol (KMIP) version 1.1. Developed by the OASIS standards body, KMIP will be a critical enabler of broad enterprise key management that can span numerous encryption use cases and cryptographic applications.

Enterprises today understand the importance of cryptography to ensure the security of critical data - both on premise and in the cloud. However this creates a significant key management challenge, particularly as the number of applications and devices, often from different vendors, increases. To combat complexity, unnecessary operational costs and to ease compliance, valuable operational efficiencies can be gained by centralizing and automating key management. The value of separating key management tasks from the applications that use the keys is further increased in virtualized and cloud environments, where organizations can retain in-house control of keys and still take advantage of cloud-based encryption and data storage. KMIP is the first widely accepted industry standard for key management allowing organizations to gain these benefits while applying consistent controls and security policies.

News facts:

  • With KMIP 1.1 protocol support, enterprises are now able to expand the numbers and types of encryption applications supported under a single, unified key management system to achieve consistent security policy, simplified administration, auditing/reporting and economies of scale.

  • With the broad industry acceptance of KMIP, customers can deploy key management solutions to solve immediate needs with the confidence that they can be extended to support future use cases with minimal impact. keyAuthority 4.0 provides KMIP-enabled interoperability for encryption-enabled products from leading vendors including Brocade, NetApp and Quantum.

  • keyAuthority 4.0 offers the broadest and most complete support for KMIP 1.1, combined with market-proven enterprise capabilities such as the automation of key lifecycle management controls, high scalability, redundancy, support for multi-tenant environments and sophisticated administrative role separation and key segregation.

  • Delivered in a tamper-resistant and tamper-evident hardware platform certified to the stringent FIPS 140-2 Level 3 standard, keyAuthority 4.0 offers long-term reliable protection of keys on behalf of an organization's most critical applications and sensitive data.

Rich Mogull, analyst and CEO, Securosis, says:
"Increasing privacy concerns, regulations, use of distributed and cloud computing, and even BYOD, are all driving increased use of encryption in more diverse organizations than we have seen before. Sometimes the encryption implementations do a fine job of handling encryption keys themselves, but we see plenty of use cases and specific implementations where it makes far more sense to shift to an external key manager." (Understanding and Selecting a Key Management Solution, Securosis, February 2013).

Jack Rondoni, Sr. Director, Product Management, Brocade Data Center SAN, says:
"The ability to protect as well as dependably recover encryption keys used to secure confidential information is absolutely essential, making the selection of key management solutions a critical component of the encryption system. Brocade enterprise-class data-at-rest encryption platforms with its KMIP-compliant key management client are tightly integrated with keyAuthority to ensure reliability and operational transparency throughout the key management lifecycle. Together, Brocade and Thales enable enterprise and cloud service provider data centers to deploy a comprehensive data encryption strategy with a single point of management for all encryption services."

Eric Bassier, Director, Product Marketing, Quantum Corporation, says:
"Security of digital data is critical to all of our customers, that is why Quantum continues to partner with companies like Thales to support the KMIP standard and give customers the flexibility to choose the right solution for their business. The keyAuthority high-performance appliance, combined with KMIP 1.1 support, provides a reliable and extensible approach for customers seeking a standards-based solution to key lifecycle management."

Laurent Liscia, OASIS Executive Director and CEO, says:
"KMIP is widely acknowledged to be the key management interoperability solution. Its success is a testimony to the hard work and commitment of Thales and the other members of the OASIS KMIP Technical Committee. We applaud Thales for its role in advancing KMIP 1.1 and look forward to its continued contributions on behalf of open standards."

Richard Moulds, vice president strategy, Thales e-Security, says:
"keyAuthority is deployed in some of the most demanding environments, including financial services and government, where high levels of assurance and reliability are critical. Building on our history of developing trusted hardware security modules (HSMs) and key management solutions, and our experience as one of the founders and thought leaders behind KMIP, Thales is ideally positioned to satisfy partner and customer requirements for key management systems that can ultimately support the entire organization."

Supporting resources:

keyAuthority 4.0 will be available in Q2 2013. See demonstrations of keyAuthority at the RSA Conference, February 25 - March 1, 2013 in both the Thales booth #517 and the OASIS KMIP interoperability showcase booth #3012.

For industry insight and views on the latest key management trends check out our blogs

Follow Thales e-Security on Twitter @Thalesesecurity, LinkedIn, Facebook and YouTube

About Thales e-Security
Thales e-Security is a leading global provider of data encryption and cyber security solutions to the financial services, high technology, manufacturing, government and technology sectors. With a 40-year track record of protecting corporate and government information, Thales solutions are used by four of the five largest energy and aerospace companies, 22 NATO countries, and secure more than 80 percent of worldwide payment transactions. Thales e-Security has offices in Australia, France, Hong Kong, Norway, United States and the United Kingdom.

About Thales
Thales is a global technology leader for the defence & security and the aerospace & transport markets. In 2011 the company generated revenues of €13 billion with 67,000 employees in 56 countries. With its 22,500 engineers and researchers, Thales has a unique capability to design, develop and deploy equipment, systems and services that meet the most complex security requirements. Thales has an exceptional international footprint, with operations around the world working with customers and local partners.

Ben Leong
Hotwire PR
[email protected]

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

@CloudExpo Stories
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at, explored the value of Kibana 4 for log analysis and provided a hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He examined three use cases: IT operations, business intelligence, and security and compliance. Asaf Yigal is co-founder and VP of Product at log analytics software company In the past, he was co-founder of social-trading platform Currensee, which...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem"...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
I recently attended and was a speaker at the 4th International Internet of @ThingsExpo at the Santa Clara Convention Center. I also had the opportunity to attend this event last year and I wrote a blog from that show talking about how the “Enterprise Impact of IoT” was a key theme of last year’s show. I was curious to see if the same theme would still resonate 365 days later and what, if any, changes I would see in the content presented.
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Sam McIntyre, Partner Enablement Specialist at eFolder, presented how organizations can use eFolder Cloudfinder to automate backups of cloud application data. He also demonstrated how easy it is to search and restore cloud application data using Cloudfinder.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty ...
Internet of @ThingsExpo, taking place June 7-9, 2016 at Javits Center, New York City and Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 18th International @CloudExpo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo New York Call for Papers is now open.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, explored the IoT cloud-based platform technologies driving t...
There are over 120 breakout sessions in all, with Keynotes, General Sessions, and Power Panels adding to three days of incredibly rich presentations and content. Join @ThingsExpo conference chair Roger Strukhoff (@IoT2040), June 7-9, 2016 in New York City, for three days of intense 'Internet of Things' discussion and focus, including Big Data's indespensable role in IoT, Smart Grids and Industrial Internet of Things, Wearables and Consumer IoT, as well as (new) IoT's use in Vertical Markets.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.