Cloud Infrastructure Management

Thales Collaborates with Google Cloud to Accelerate Migration of Sensitive Data between Cloud Infrastructures

Thales declared another joint effort with Google Cloud that will quicken the ability of endeavors to securely relocate sensitive information between public cloud, hybrid and private IT infrastructures. Together, the two organizations will offer new capabilities that empower security groups to claim and control their encryption keys while assisting with satisfying uplifted administrative necessities in the midst of the present profoundly disseminated labor force. Expanding on a multi-year history of development around an assortment of cloud security initiatives, Thales and Google Cloud will presently engage clients to use the maximum capacity of Google Cloud innovation for sensitive outstanding tasks at hand while picking up the outer key administration expected to control and make sure about information across hybrid cloud IT conditions.

Securing the New IT Frontier: Hybrid Cloud

This joint effort denotes a critical second for associations to at last hold onto full control of their information and encryption keys, particularly as they seek after hybrid, multi-cloud strategies. Tending to both private and public cloud conditions, Thales and Google Cloud will give a turnkey arrangement that oversees, specialists and stores encryption keys totally constrained by the client, successfully empowering organizations to move information resources for the cloud with certainty. As revealed in the Thales 2020 Data Threat Report-Global Edition, this is progressively getting more critical as more noteworthy than half of the world's corporate information – of which 48% is sensitive – is put away in the cloud.

“New capabilities are critical to cloud migration and security, especially with such accelerated growth in this area,” said Sunil Potti, VP and GM of Google Cloud Security. “True to our mission, we've forged this deeper relationship with Thales to further protect our customer’s most sensitive information. Companies of all shapes and sizes are dealing with an extremely fluid and dynamic business environment where even the best lines of defence are constantly being battle tested. Together with Thales, we acknowledge the current set of circumstances and remain vigilant to provide customers with the most advanced solutions that address today’s cybersecurity needs as well as those that are emerging on the horizon.”

About Thales:

Thales (Euronext Paris: HO) is a global high technology leader investing in digital and “deep tech” innovations –connectivity, big data, artificial intelligence, cybersecurity and quantum technology – to build a future we can all trust, which is vital to the development of our societies. The company provides solutions, services and products that help its customers –businesses, organisations and states – in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions, by placing humans at the heart of the decision-making process.

Spotlight

Excessive permissions in your AWS environment is a common pitfall that exposes your organization to unnecessary risk. IAM policies alone are not enough to achieve the Principle of Least Privilege. Our white paper, "10 Steps to Eliminating Access Risks in AWS," provides a clear step-by-step guide to evaluating permissions and ach


Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Spotlight

Excessive permissions in your AWS environment is a common pitfall that exposes your organization to unnecessary risk. IAM policies alone are not enough to achieve the Principle of Least Privilege. Our white paper, "10 Steps to Eliminating Access Risks in AWS," provides a clear step-by-step guide to evaluating permissions and ach

Resources