SlideShare a Scribd company logo
1 Thales © 2019 All rights reserved. Thales Group OpenThales Group Open
First Step To an Effective Data Privacy Program
Specific Dashboards for CEO,
CISO, IT Admin
Reporting & compliance
Data Remediation
Thales Data Discovery and Classification.
Cloud storage
Databases
Files shares, NAS
Big Data
2 Thales © 2019 All rights reserved. Thales Group OpenThales Group Open
Data Privacy and Security Framework: Protect, Extend, Share
MONITOR,REPORT,COMPLY
DELIVERY
MODELS
Hybrid
On-Premises
Hardware or Software
On Demand
Cloud-based | as-a-Service
PROTECT
EVERYWHERE
NetworksVirtualApplications Database Big DataFile Systems Containers Public and Private Cloud
SIMPLIFIEDOPERATIONS
Automation &
Orchestration
Unify policies,
processes and
operations
Centralize security
intelligence
Review and track
Reduce silos
APIs
UNIFIEDDATASECURITY
SOLUTIONS
ENCRYPT OR TOKENIZE
SENSITIVE DATA
• Encryption - data-at-rest,
data-in-motion, applications
• Tokenization, data masking
CENTRALIZED KEY
MANAGEMENT
• Centrally control and
manage key lifecycles
• BYOK/KMIP/TDE
• Root of Trust or Master Keys
IDENTIFY AND CLASSIFY
SENSITIVE DATA
• Data discovery
• Data classification
• Data mapping
• Access management
• Multi-factor authentication
• PKI credential management
AUTHENTICATE IDENTITIES
and AUTHORIZE ACCESS TO
DATA, PROCESSES, APPS

More Related Content

PPTX
Cloud computing for making indonesia 4.0
PPTX
New world software sitefinity presentation
PDF
Html5 workshop part 1
PPTX
Sutedjo - Introduction to Cloud
PPTX
Sutedjo - Digital Transformation for SAP
PDF
Cwin16 tls-partner-hpe-digital economy & Hybrid IT
PDF
Fujitsu World Tour 2017: ServiceNow - Lightspeed Enterprise
Cloud computing for making indonesia 4.0
New world software sitefinity presentation
Html5 workshop part 1
Sutedjo - Introduction to Cloud
Sutedjo - Digital Transformation for SAP
Cwin16 tls-partner-hpe-digital economy & Hybrid IT
Fujitsu World Tour 2017: ServiceNow - Lightspeed Enterprise

What's hot (20)

PDF
WHITE PAPER▶ Insecurity in the Internet of Things
PDF
Cloud native past, present and future, Accenture Technology Workshop, IL
PPTX
150601 gartner cloud_summit_vfinal
PDF
Business Data Lake Best Practices
PDF
Acronis for SAP
PPTX
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
PPTX
Virtual Gov Day - Security Breakout - Deloitte
PPTX
Equinix Customer Presentation
PDF
Data may be the new gold. Can we say the same about data centres?
PPTX
Security and Policing event presentation by Steve lamb from hewlett packard e...
PDF
CWIN17 Singapore / Darmadi komo (microsoft) modern data estate
PDF
Ims at mindtree key concepts and paradigms
PPTX
Cloud & Big Data - Digital Transformation in Banking
PDF
Laurel Group Thought Leaders Print 0213
PPTX
7 Innovations That Will Transform IT Operations
PDF
Cloud-native Data Platform Transformation | Accenture
PPTX
Digital Transformation is Cloud-Powered
PPTX
Optimizing User-Experience with Carrier-Neutral Colocation
PDF
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
PPTX
Overcoming the challenges of multiple data frameworks in a multiple cloud env...
WHITE PAPER▶ Insecurity in the Internet of Things
Cloud native past, present and future, Accenture Technology Workshop, IL
150601 gartner cloud_summit_vfinal
Business Data Lake Best Practices
Acronis for SAP
IT Resilience and Cloud : Seminar Protecting Mission-Critical Application Aga...
Virtual Gov Day - Security Breakout - Deloitte
Equinix Customer Presentation
Data may be the new gold. Can we say the same about data centres?
Security and Policing event presentation by Steve lamb from hewlett packard e...
CWIN17 Singapore / Darmadi komo (microsoft) modern data estate
Ims at mindtree key concepts and paradigms
Cloud & Big Data - Digital Transformation in Banking
Laurel Group Thought Leaders Print 0213
7 Innovations That Will Transform IT Operations
Cloud-native Data Platform Transformation | Accenture
Digital Transformation is Cloud-Powered
Optimizing User-Experience with Carrier-Neutral Colocation
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Overcoming the challenges of multiple data frameworks in a multiple cloud env...
Ad

Similar to First step to an effective data privacy program (20)

PPTX
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
PDF
Hyperconverged: The Future of Data Centers Presentation
PPTX
Thales e-Security corporate presentation
PPTX
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
PDF
Secure Data Management 7th Vldb Workshop Sdm 2010 Singapore September 17 2010...
PDF
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
PDF
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
PDF
Encrypt-Everything-eB.pdf
PPT
Data Governance in a big data era
PPTX
Why Your Approach To Data Governance Needs a Major Update
PDF
Data sharing principles for Digital Transformation
PPTX
Unlock the potential of data security 2020
PDF
Delivering analytics at scale with a governed data lake
PDF
BAR360 open data platform presentation at DAMA, Sydney
PPTX
Tools for improving data publication and use
PPTX
Advanced threat protection and big data
PDF
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
PDF
Literature survey andrei_manta_0
PDF
Enabling a Culture of Self-Service Analytics
PDF
eBook: 5 Steps to Secure Cloud Data Governance
Two Become One Conference Keynote: When Two Become One: A New leader in Data ...
Hyperconverged: The Future of Data Centers Presentation
Thales e-Security corporate presentation
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Secure Data Management 7th Vldb Workshop Sdm 2010 Singapore September 17 2010...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
TNS Infographic - Data Security Still Not a Top Priority for Some - August 2016
Encrypt-Everything-eB.pdf
Data Governance in a big data era
Why Your Approach To Data Governance Needs a Major Update
Data sharing principles for Digital Transformation
Unlock the potential of data security 2020
Delivering analytics at scale with a governed data lake
BAR360 open data platform presentation at DAMA, Sydney
Tools for improving data publication and use
Advanced threat protection and big data
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Literature survey andrei_manta_0
Enabling a Culture of Self-Service Analytics
eBook: 5 Steps to Secure Cloud Data Governance
Ad

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
Teaching material agriculture food technology
PDF
Modernizing your data center with Dell and AMD
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Empathic Computing: Creating Shared Understanding
PPTX
A Presentation on Artificial Intelligence
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Monthly Chronicles - July 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
Teaching material agriculture food technology
Modernizing your data center with Dell and AMD
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
The Rise and Fall of 3GPP – Time for a Sabbatical?
Empathic Computing: Creating Shared Understanding
A Presentation on Artificial Intelligence
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation

First step to an effective data privacy program

  • 1. 1 Thales © 2019 All rights reserved. Thales Group OpenThales Group Open First Step To an Effective Data Privacy Program Specific Dashboards for CEO, CISO, IT Admin Reporting & compliance Data Remediation Thales Data Discovery and Classification. Cloud storage Databases Files shares, NAS Big Data
  • 2. 2 Thales © 2019 All rights reserved. Thales Group OpenThales Group Open Data Privacy and Security Framework: Protect, Extend, Share MONITOR,REPORT,COMPLY DELIVERY MODELS Hybrid On-Premises Hardware or Software On Demand Cloud-based | as-a-Service PROTECT EVERYWHERE NetworksVirtualApplications Database Big DataFile Systems Containers Public and Private Cloud SIMPLIFIEDOPERATIONS Automation & Orchestration Unify policies, processes and operations Centralize security intelligence Review and track Reduce silos APIs UNIFIEDDATASECURITY SOLUTIONS ENCRYPT OR TOKENIZE SENSITIVE DATA • Encryption - data-at-rest, data-in-motion, applications • Tokenization, data masking CENTRALIZED KEY MANAGEMENT • Centrally control and manage key lifecycles • BYOK/KMIP/TDE • Root of Trust or Master Keys IDENTIFY AND CLASSIFY SENSITIVE DATA • Data discovery • Data classification • Data mapping • Access management • Multi-factor authentication • PKI credential management AUTHENTICATE IDENTITIES and AUTHORIZE ACCESS TO DATA, PROCESSES, APPS

Editor's Notes

  • #2: Thales Data Discovery and Classification provides a single, automated solution to find sensitive data across heterogeneous environments, classify them in accordance with sensitivity, and apply policy-based remediation to protect them.
  • #3: Comprehensive data protection begins with a flexible framework that allows you to apply multiple layers of defense with full visibility, control and automation. We’ve become a trusted leader by specializing in delivering security the way you want it. With a full stack of solutions that bring centralized security controls, policies, and compliance into heterogeneous and dynamic hybrid cloud environments These solutions complement the IT and security plans you already have in place and are available to be deployed on-premises across all of your environments, or on demand from the cloud. Expect more to come in the next months and years, as we build out our hybrid models to match the demands of our customers cloud migration plans And we add in new technologies of broaden and also deepen our capabilities.