1 Thales © 2019 All rights reserved. Thales Group OpenThales Group Open
First Step To an Effective Data Privacy Program
Specific Dashboards for CEO,
CISO, IT Admin
Reporting & compliance
Data Remediation
Thales Data Discovery and Classification.
Cloud storage
Databases
Files shares, NAS
Big Data
2 Thales © 2019 All rights reserved. Thales Group OpenThales Group Open
Data Privacy and Security Framework: Protect, Extend, Share
MONITOR,REPORT,COMPLY
DELIVERY
MODELS
Hybrid
On-Premises
Hardware or Software
On Demand
Cloud-based | as-a-Service
PROTECT
EVERYWHERE
NetworksVirtualApplications Database Big DataFile Systems Containers Public and Private Cloud
SIMPLIFIEDOPERATIONS
Automation &
Orchestration
Unify policies,
processes and
operations
Centralize security
intelligence
Review and track
Reduce silos
APIs
UNIFIEDDATASECURITY
SOLUTIONS
ENCRYPT OR TOKENIZE
SENSITIVE DATA
• Encryption - data-at-rest,
data-in-motion, applications
• Tokenization, data masking
CENTRALIZED KEY
MANAGEMENT
• Centrally control and
manage key lifecycles
• BYOK/KMIP/TDE
• Root of Trust or Master Keys
IDENTIFY AND CLASSIFY
SENSITIVE DATA
• Data discovery
• Data classification
• Data mapping
• Access management
• Multi-factor authentication
• PKI credential management
AUTHENTICATE IDENTITIES
and AUTHORIZE ACCESS TO
DATA, PROCESSES, APPS

First step to an effective data privacy program

  • 1.
    1 Thales ©2019 All rights reserved. Thales Group OpenThales Group Open First Step To an Effective Data Privacy Program Specific Dashboards for CEO, CISO, IT Admin Reporting & compliance Data Remediation Thales Data Discovery and Classification. Cloud storage Databases Files shares, NAS Big Data
  • 2.
    2 Thales ©2019 All rights reserved. Thales Group OpenThales Group Open Data Privacy and Security Framework: Protect, Extend, Share MONITOR,REPORT,COMPLY DELIVERY MODELS Hybrid On-Premises Hardware or Software On Demand Cloud-based | as-a-Service PROTECT EVERYWHERE NetworksVirtualApplications Database Big DataFile Systems Containers Public and Private Cloud SIMPLIFIEDOPERATIONS Automation & Orchestration Unify policies, processes and operations Centralize security intelligence Review and track Reduce silos APIs UNIFIEDDATASECURITY SOLUTIONS ENCRYPT OR TOKENIZE SENSITIVE DATA • Encryption - data-at-rest, data-in-motion, applications • Tokenization, data masking CENTRALIZED KEY MANAGEMENT • Centrally control and manage key lifecycles • BYOK/KMIP/TDE • Root of Trust or Master Keys IDENTIFY AND CLASSIFY SENSITIVE DATA • Data discovery • Data classification • Data mapping • Access management • Multi-factor authentication • PKI credential management AUTHENTICATE IDENTITIES and AUTHORIZE ACCESS TO DATA, PROCESSES, APPS

Editor's Notes

  • #2 Thales Data Discovery and Classification provides a single, automated solution to find sensitive data across heterogeneous environments, classify them in accordance with sensitivity, and apply policy-based remediation to protect them.
  • #3 Comprehensive data protection begins with a flexible framework that allows you to apply multiple layers of defense with full visibility, control and automation. We’ve become a trusted leader by specializing in delivering security the way you want it. With a full stack of solutions that bring centralized security controls, policies, and compliance into heterogeneous and dynamic hybrid cloud environments These solutions complement the IT and security plans you already have in place and are available to be deployed on-premises across all of your environments, or on demand from the cloud. Expect more to come in the next months and years, as we build out our hybrid models to match the demands of our customers cloud migration plans And we add in new technologies of broaden and also deepen our capabilities.