Network Communications News (NCN) May 2017 - Page 35

IP SECURITY ‘Security doesn’t just reduce risk, it’s an enabler of the digital initiatives that now permeate our daily lives.’ for customers who need to access their HSMs to ensure they are operating smoothly, without error and at optimum loading. The need to visit distant data centres can make data collection haphazard, complex and time consuming, as well as costly. With these challenges topof-mind, Thales has created CipherTrust Monitor, a solution that allows IT personnel to proactively respond to potential issues and optimise operations – both important requirements with increasing internal and external IT security threats. With its around-the-clock visibility, CipherTrust Monitor 2.0’s benefits include: Identifying performance bottlenecks to improve capacity planning; Enabling immediate response to potential issues through comprehensive alerts; Eliminating the need to physically access HSMs to retrieve important data; Integrating seamlessly with existing HSM hardware and software configurations; and Offering granular control over access to configuration and data through administrator, group manager and auditor roles. modules (HSMs), both payShield and nShield, 24x7 and from one centralised location, giving them instantaneous visibility into alerts, tamper attempts, real-time status and capacity. CipherTrust Monitor can now monitor both Thales payShield and Thales nShield HSMs through a single pane of glass. Additional capabilities to CipherTrust Monitor 2.0 include enhanced monitoring and displays as well as a new auditor role improving separation of duties. HSMs are used to ensure the trust of critical business applications by managing the encryption keys that protect these applications and data. Typically HSMs are housed in unattended, lights-out data centres or private clouds in remote locations. This environment creates a challenge Encryption is a well accepted best practice for securing sensitive data, with HSMs providing the root of trust for critical business applications by protecting and managing the encryption keys. CipherTrust Monitor 2.0 provides customers with the ability to monitor their HSMs from the convenience of their own office, dramatically reducing their ongoing key management costs. The ability to remotely and centrally track HSM operational health, capacity and loading reduces the need to travel to manually retrieve important data. This together with audit logs that can be used as proof of regulatory compliance brings convenience, cost reduction and reduced downtime.” The latest version of CipherTrust Monitor will be available in Q2 2017 and is priced according to the number of hosting workstations and number of HSMs being monitored. May 2017 | 35 IP SECURITY ‘Security doesn’t just reduce risk, it’s an enabler of the digital initiatives that now permeate our daily lives.’ modules (HSMs), both payShield and nShield, 24x7 and from one centralised location, giving them instantaneous visibility into alerts, tamper attempts, real-time status and capacity. CipherTrust Monitor can now monitor both Thales payShield and Thales nShield HSMs through a single pane of glass. Additional capabilities to CipherTrust Monitor 2.0 include enhanced monitoring and displays as well as a new auditor role improving separation of duties. HSMs are used to ensure the trust of critical business applications by managing the encryption keys that protect these applications and data. Typically HSMs are housed in unattended, lights-out data centres or private clouds in remote locations. This environment creates a challenge for customers who need to access their HSMs to ensure they are operating smoothly, without error and at optimum loading. The need to visit distant data centres can make data collection haphazard, complex and time consuming, as well as costly. With these challenges top- of-mind, Thales has created CipherTrust Monitor, a solution that allows IT personnel to proactively respond to potential issues and optimise operations – both important requirements with increasing internal and external IT security threats. With its around-the-clock visibility, CipherTrust Monitor 2.0’s benefits include: I dentifying performance bottlenecks to improve capacity planning; E nabling immediate response to potential issues through comprehensive alerts; E liminating the need to physically access HSMs to retrieve important data; I ntegrating seamlessly with existing HSM hardware and software configurations; and O ffering granular control over access to configuration and data through administrator, group manager and auditor roles. Encryption is a well accepted best &7F6Rf"6V7W&p6V6FfRFFvF40&fFrFR&BbG'W7Bf 7&F6'W6W72Ɩ6F0'&FV7FrBvrFPV7'FW26W%G'W7@F""&fFW27W7FW'0vFFR&ƗGFF"FV 42g&FR6fVV6R`FV"vff6RG&F6ǐ&VGV6rFV"vrWvVVB67G2FR&ƗGF&VFVǒ@6VG&ǒG&64W&FVF66GBFp&VGV6W2FRVVBFG&fVFVǒ&WG&WfR"F@FFF2FvWFW"vFVF@w2FB6&RW6VB2&`b&VwVF'6Ɩ6R'&w06fVV6R67B&VGV7F@&VGV6VBFvFR( ХFRFW7BfW'6`6W%G'W7BF"v&Pf&R"#rB2&6V@66&FrFFRV&W"`7Frv&7FF2BV&W b42&VrF&VB#r3