Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:57 AM
Dark Reading
Dark Reading
Products and Releases

IBM, Thales Team In Key Management For Storage Encryption

TEMS will be expanded to address the key management requirements of the IBM storage portfolio of products

LAS VEGAS & WESTON, Fla., Feb 22, 2010 (BUSINESS WIRE) -- Thales, leader in information systems and communications security, announces it is working with IBM to integrate IBM Tivoli(R) Key Lifecycle Manager) into Thales Encryption Manager for Storage (TEMS 2.0) to provide customers with a hardened tamper-resistant key management solution that fully exploits IBM Tivoli Key Lifecycle Management capability. TEMS will be expanded to address the key management requirements of the IBM storage portfolio of products, to provide important operational and security benefits to both IBM and Thales customers, including the convenience and assurance of a hardware appliance and standards-based key management controls needed to protect and store data and demonstrate compliance.

"The use of encryption within the switching fabric, back-up tapes, drives, arrays, and host adapters is rapidly becoming a popular security measure to help ensure data privacy and confidentiality, but many organizations are concerned about resilience and data recoverability issues," says Jon Oltsik, senior analyst with Enterprise Strategy Group. "These issues can be addressed by the adoption of best practice key management, which when deployed correctly can unify security practices and reduce operational burden. The integration of Thales Encryption Manager for Storage with IBM Tivoli Key Lifecycle Manager will help customers adopt leading-edge storage encryption with the confidence that their encryption keys are under control and secured in a cost-effective and future proof management system."

TEMS 2.0 is an easily deployed key management solution that consolidates and automates the management of encryption keys for heterogeneous storage environments delivering unified, fine-grained and auditable security controls and therefore greatly simplifies compliance reporting obligations. TEMS is delivered as a hardened tamper-resistant security appliance providing industry leading levels of protection* ensuring that keys are safe from attack and accidental loss and yet available on demand for legitimate data retrieval, emergency recovery and forensic activities. TEMS is the first key manager to support the draft IEEE P1619.3 key management standard and now with the integration of IBM Tivoli Key Lifecycle Manager functionality, customers will be able to manage keys across an even broader range of encryption-enabled storage devices and end-points -- in particular IBM's LTO4 tape and DS8000 disk storage systems.

"Key management provides a cryptographic layer of security that helps clients meet the stringent internal and external compliance mandates that require proper storage and protection of data and information," said Gordon Arnold, security software architect and product manager, IBM Tivoli software. "The integration of Thales Encryption Manager with IBM Tivoli Key Lifecycle Manager will provide our customers with the choice between hardware secured and software key management to help them centralize and better manage their storage security processes."

"We are extremely excited about working with IBM to provide a leading-edge storage encryption key management appliance. We are committed to providing secure and cost effective key management solutions enabling customers to deploy encryption throughout the enterprise whether at the network, storage or application level. For many, performing encryption within the storage environment is an increasingly attractive proposition but with it come the challenges of scalability, security and resilience," says Franck Greverie, vice president, managing director for the information systems security activities of Thales. "TEMS successfully embodies a wide range of key management best practices and this new partnership with IBM is further testament to Thales's commitment to provide encryption key management support for the broadest range of storage encryption endpoints in the market."

Thales will be both speaking and exhibiting at IBM Pulse 2010, the premier service management event, Las Vegas, Nevada February 21-24, 2010. Visit Thales on Booth #E122.

Bob Lockhart, Senior Solutions Architect at Thales will be speaking at the event about key management standards and the adoption of the recently introduced Key Management Interoperability Protocol on a panel entitled 'KMIP Standard Adoption -- Storage and Beyond', Monday February 22, 2010.

About Thales Thales is a global technology leader for the Aerospace and Space, Defence, Security and Transportation markets. In 2008, the company generated revenues of 12.7 billion euros with 68,000 employees in 50 countries. With its 25,000 engineers and researchers, Thales has a unique capability to design, develop and deploy equipment, systems and services that meet the most complex security requirements. Thales has an exceptional international footprint, with operations around the world working with customers as local partners. www.thalesgroup.com

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...