Remove Architecture Remove Threat Reports Remove Webinar
article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

Data Defense: Leveraging SaaS Security Tools

Thales Cloud Protection & Licensing

As per the Thales 2024 Data Threat Report , enterprises reported they were using, on average, 84 SaaS apps in their operations. The two most popular approaches for such External Key Management (EKM) architectures are referred to as Bring Your Own Key (BYOK) and Hold Your Own Key (HYOK).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Defense: Leveraging SaaS Security Tools

Security Boulevard

As per the Thales 2024 Data Threat Report , enterprises reported they were using, on average, 84 SaaS apps in their operations. The two most popular approaches for such External Key Management (EKM) architectures are referred to as Bring Your Own Key (BYOK) and Hold Your Own Key (HYOK).

article thumbnail

Turning Aspiration into Action to Protect Financial Institutions

Thales Cloud Protection & Licensing

Data security professionals also make ambitious plans, but implementation rates are too low – a key finding in the 2019 Thales Data Threat Report-Financial Services Edition. Here’s a look at four common issues highlighted in the 2019 Thales Data Threat Report-Financial Services Edition and tips for overcoming them.