top of page
Thales_500rec.png

THALES Gemalto - Identity & Data Protection Solutions

Thales Gemalto's Identity and Data Protection solutions are trusted by the largest and most respected brands around the world to protect their data, identities, and intellectual property. As the world leader in digital security, THALES ensures the authenticity of your banking transactions, safeguards your health records, protects the purchase of your morning cup of coffee, and helps organizations to control risk, manage security, and maintain compliance.

 

WIRD Group has been a long-standing Gemalto SafeNet partner and - after the merger with Thales- continues to be one of the leading ThalesGemalto solution providers for Switzerland.

Thales Gemalto Enterprise Security Solutions

Identity & Access Management Solutions

 

Thales Gemalto's identity and access management products utilize strong authentication to enable enterprises and trust centers to secure access, identities, and interactions.  Gemalto's solutions include cloud-based or server-based management platforms, advanced development tools, and the broadest range of authenticators.

  • Identity-as-a-Service: Thales Gemalto Trusted Access offers identity-as-a-service, combining the convenience of cloud single sign-on with granular access security. More info at the producer's website >>

  • Authentication-as-a-Service: Thales Gemalto Authentication Service delivers fully automated strong authentication from the cloud, enabling an organization to protect cloud-based and on-premises applications, from any device with user-friendly token options. More info >>

  • Authentication Management Platforms: Thales Gemalto's enterprise-grade authentication management platform enables secure access, network access, and PKI digital signing as well as extensive certificate lifecycle management. More info >>

  • Further IAM Solutions comprise:

    • OTP Authenticators

    • Out-of-Band Authentication

    • Pattern-Based Authentication

    • PKI Smart Cards

    • Remote Access Solutions

    • Security Applications

    • Smart Card Readers

    • Software and Mobile Authenticators

    • USB PKI Tokens

Enterprise Cloud Security Solutions

 

The cloud is helping your business move forward, faster. But this digital transformation doesn’t come without risk. Wherever your data goes, from public, private, hybrid, or virtual cloud environments, you need to know that it will remain secure and your business will be compliant.  Maximize security and control in the cloud with Gemalto’s portfolio of Thales Gemalto access management, authentication, encryption and key management solutions. These flexible solutions can be deployed on-premises or on demand from the cloud and integrate with a growing ecosystem of today’s leading technologies, so your data stays secure now and into the future as your business continues its digital transformation.

  • Cloud-Based Security as a Service: With Data Protection on Demand, deploy and manage encryption, key management, and hardware security modules services from a cloud-based platform. Focus on services, not hardware, deploy in minutes, purchase only what you need to reduce costs, protect data anywhere, report in real-time, and integrate easily with existing apps, IT infrastructure & services. More info >>

  • Secure Migration to the Cloud and Virtual Data Centers: Maintain ownership and control of your sensitive information, manage privileged user access, safeguard against the damage of exposure of data, and ensure compliance as you migrate to virtual data centers or multi-tenant public cloud environments. More info >>

  • Secure Encryption for Sensitive Data in the Cloud: Ensure transparent, efficient, and unmatched data protection with Gemalto's portfolio of encryption solutions that secure sensitive data in databases, applications, file servers, virtual instances and machines, and storage in your virtual, public cloud, and hybrid environments. More info >>

  • Cloud Access Control Center: Centrally control and manage access to network and cloud applications with the ability to verify a user’s identity, assess and apply the appropriate access policy, and enforce access controls using single sign-on. More info >>

  • Secure Cryptographic Keys in the Cloud: Deliver on-demand, elastic crypto services for data protection via cloud environments. Manage crypto and encryption services, including storage of cryptographic keys and centralized key and policy management simply, efficiently and securely. More info >>

Crypto Management Solutions

 

When encryption is used, the risk is transferred from the data itself to the cryptographic keys. The ability to securely manage, store, and use keys is essential. With a copy of the private key, an attacker could decrypt data, create fraudulent identities, and generate certificates at will. Deploying a high-assurance crypto management platform is the best way to protect your cryptographic keys. This approach is built on a foundation of strong keys, enterprise key management, centralized crypto resource management, and the use of a hardware root of trust.

  • Thales Gemalto Hardware Security Modules: THALES Gemalto Hardware Security Modules (HSMs) provide reliable protection for transactions, identities, and applications by securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services, by storing encryption keys in a FIPS 140-2 hardware root of trust. More info at the producer's website >>

  • Thales Gemalto KeySecure: With THALES Gemalto KeySecure, organizations can centrally, efficiently, and securely manage cryptographic keys and policies—across the key management lifecycle and throughout the enterprise—in the cloud or on-premises. More info >>

  • Thales Gemalto Crypto Command Center: Virtually managing HSMs is now not only possible, but easy for administrators. With Thales Gemalto Crypto Command Center, organizations can quickly and securely provision and monitor Thales Gemalto Luna Network HSM crypto resources and reduce IT infrastructure costs, and receive alerts for critical THALES Gemalto Crypto Command Center activities and failures. More info >>

Enterprise Encryption Solutions

 

To reduce the risk posed by hackers, insider threats, and other malicious attacks, your organization must utilize encryption to protect sensitive data wherever it is found across your on-premises, virtual, public cloud, and hybrid environments.

  • Thales Gemalto Data-at-Rest Encryption Solutions: THALES Gemalto's portfolio of data-at-rest encryption solutions delivers transparent, efficient, and unmatched data protection at all levels of the enterprise data stack, including the application, database (column or file), file system, full disk (virtual machine), and network attached storage levels. In addition to working across on-premises, virtual, and cloud environments, these solutions are deployed with the Thales Gemalto KeySecure enterprise key manager for centralized key and policy management.

  • Thales Gemalto Data-in-Motion Solutions: A powerful safeguard for data in motion, SafeNet High-Speed Encryptors deliver proven and certified Layer 2 encryption capabilities that meet secure network performance demands for real-time, low latency and near zero overhead to provide security without compromise.

WIRD Data Protection on Demand: Overview

Data Protection On Demand is a cloud-based platform that provides a wide range of on demand HSM and key management services through a simple online marketplace. With Data Protection On Demand, security is made simpler, more cost effective and easier to manage because there is no hardware to buy, deploy and maintain. Click and deploy the protection you need, provision services, add security policies and get usage reporting. Data Protection On Demand offers a one-stop data protection marketplace, with a menu of security applications ranging from securing your keys to digital signing and ensuring the root of trust.

Interested? Find more information about Data Protection on Demand DPoD on the next page >> 

bottom of page