- By Use Case
- By Industry
- By Compliance
- Services & Support
- Contact Us
Data Security & Data Communication
ISO/IEC 27002:2013 is designed for organizations to use as a reference for selecting controls within the process of implementing an Information Security Management System (ISMS) based on ISO/IEC 27001 or as a guidance document for organizations implementing commonly accepted information security controls.
Thales e-Security provides many of the solutions you need to comply with this ISO.
Among the best practices called for in ISO/IEC 27002 are:
Dymar’s solution can help you meet the standards in ISO/IEC 27002:2013 through:
Vormetric’s Data Security Platform provides state of the art user access control.
Vormetric protects the data itself through Vormetric Transparent Encryption with integrated Key Management for data at rest, Application Encryption, Tokenization with Dynamic Masking and more. These techniques make the data meaningless and worthless without the tools to decrypt it.
Unified Key Management
Integrated Key Management from Thales e-Security provides a robust, standards-based platform for managing encryption keys from disparate sources across the enterprise. It simplifies the management and administrative challenges around encryption key management to ensure that keys are secure and always provisioned to authorized encryption services.
Security Intelligence Logs
Thales e-Security lets the enterprise monitor and identify extraordinary data access. Vormetric Security Intelligence Logs are detailed management logs that specify which processes and users have accessed protected data. They specify when users and processes accessed which data, under which policies, and if access requests were allowed or denied. The management logs will even expose when a privileged user submits a command like ‘switch users’ in order to attempt to imitate, and potentially exploit, the credentials of another user. Sharing these logs with a security information and event management (SIEM) platform helps uncover anomalous patterns in processes and user access, which can prompt further investigation. For example, an administrator or process may suddenly access much larger volumes of data than normal, or attempt to do an unauthorized download of files. These events could point to an APT attack or malicious insider activities.
Hardware Security Modules (HSMs)
nShield HSMs from Thales e-Security provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more. Available in three FIPS 140-2 certified form factors, nShield HSMs can be deployed in many ways. nShield Connect and Solo HSMs also provide a secure environment for running sensitive applications. The CodeSafe option lets you execute code within nShield boundaries, protecting your applications and the data they process.
In addition nShield HSMs:
As security teams struggle to contend with more frequent, costly, and sophisticated attacks, data-at-rest encryption becomes an increasingly critical safeguard. This white paper offers an overview of the different encryption approaches available today.
The Thales nShield family of general purpose hardware security modules (HSMs) enhances the security and performance of server-based applications that handle your most sensitive data.