IT Security Breakfast – Wednesday 8th of May 2019

IT Security Breakfast – Wednesday 8th of May 2019

Simply protect your on-premise or cloud data with transparent encryption More details Compliance with data privacy and security requirements is one of the main drivers for the intensive use of encryption in companies. The benefits of Thales Vormetric and how these technologies can be reflected in an enterprise-wide encryption strategy. Kyos will present you with different use cases, especially for GDPR compliance. Topics covered Advantages of...

Read More

Terranova Security named Consumer Choice for Security Awareness – see Gartner Magic Quadrant

Terranova Security named Consumer Choice for Security Awareness – see Gartner Magic Quadrant

Security awareness and learning (IS/IT) is at the heart of Terranova’s activity with a high level of expertise. Terranova’s solutions and Kyos’ services can – deliver a complete action plan – to raise awareness among your employees over time. Full program: Evaluation questionnaire, e-learning, standard/personalized phishing, standard/personalized social engineering, plenary session & workshop session using...

Read More

Cyber threat protection targeting industrial networks – Kaspersky ICS (KICS)

Industrial networks are very often the most forgotten aspects of IT security, even though they are a vital part of our modern life. There are many reasons for this, but the main ones are: Business and approaches are historically separated from standard IT, Often mistaken idea that industrial networks are completely isolated from the rest of the world, Software that has been running for a very long time on obsolete operating systems that are...

Read More

How to protect, backup, audit and synchronize your private encryption keys stored in an Azure Key Vault (Software or HSM)

How to protect, backup, audit and synchronize your private encryption keys stored in an Azure Key Vault (Software or HSM)

Thanks to the Thales CipherTrust Cloud Key Manager (CCKM) solution, we can now have control over the private encryption keys used in Azure and Office 365 stored in Azure Key Vault. The CCKM solution allows you to manage the life cycle of private keys. Private keys are stored in a Vormetric DSM (On-premises Hardware, Cloud and On-premises Software) digital safe The Thales CCKM appliance is deployed either on site or as a cloud service. Here is...

Read More

Good practice in using Azure Information Protection to protect your data

Good practice in using Azure Information Protection to protect your data

At the end of 2016 Microsoft officialized the release of the Azure Information Protection solution. This cloud-driven solution is a kind of evolution of the RMS (Rights Management System) suite. It will allow you to create a document classification policy and then apply protection profiles to encrypt sensitive documents. At Kyos we started evaluating the tool in July 2017. We quickly realized that this solution would provide even better...

Read More