• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Thales Key Manager Lowers Barriers to Encryption

    June 30, 2009 Alex Woodie

    Thales next month will begin delivery of Thales Encryption Manager for Storage (TEMS), a new appliance-based key management offering designed to lower the barriers to encryption by making it easier for organizations to safeguard their encryption keys. By using key management standards, like the new Key Management Interoperability Protocol (KMIP) unveiled earlier this year, TEMS will eliminate the need for organizations to use multiple key management systems for different applications and platforms, the vendor says.

    With the tide of data breaches and identity theft around the world continuing to rise, IT shops everywhere are looking to encryption as a way to safeguard their valuable data. Unfortunately, while industry mandates are pushing organizations to employ data encryption, the security practice is not as widespread as it could be, due to the real and perceived difficulties associated with managing the keys that encrypt and decrypt the data, experts say.

    The problem is exacerbated by the variety of encryption applications currently in use. Many storage vendors offer encryption as an embedded component of their disk arrays, which makes it relatively easy to get started with encryption. When users want to encrypt or decrypt data, they go to the management interface, enter their specific key, and voila: the data is safe and accessible.

    However, the lack of an externally defined key management interface introduces risk, especially when an organization has to juggle multiple and incompatible key management interfaces. If an organization loses the keys to just one of these encryption solutions, they have effectively lost the data they were trying to protect. That’s a scary proposition to any organization, and a real obstacle to the widespread use of encryption.

    But it’s not an insurmountable problem. Today, several groups of security experts and IT vendors are addressing the dilemma by proposing and developing a series of standards for the handling and management of encryption keys. Instead of requiring each embedded or stand-alone encryption application to have its own key management interface, the thinking goes, the applications would just support a standard protocol or specification, and basically outsource the key management function to an application or device that’s dedicated to that task.

    Thales Encryption Manager for Storage (TEMS) delivers a graphical interface for managing encryption keys across disparate applications and platforms.

    This is the thrust behind KMIP, a new encryption key management standard that was proposed by a group of vendors in February. KMIP is designed to provide a single, comprehensive protocol for communication between enterprise key management services and encryption systems. In addition to Thales, other backers of the KMIP effort include Hewlett-Packard, IBM, RSA Security, Brocade, LSI, and Seagate.

    KMIP is one of the protocols that Thales’ new TEMS offering will support. (It won’t, however, offer KMIP support with the first release of the appliance in July.) Another protocol that TEMS will support is IEEE P1619, a specification by the Institute of Electrical and Electronics Engineers for the encryption of stored data. When it ships next month, TEMS will become the first key management solution with IEEE P1619 support, and it will support the final IEEE P1619 specification when it is released, which is expected to occur early next year.

    Because KMIP and IEEE P1619 are so new, they’re not in widespread use. Storage vendors haven’t had a chance to embed support for these protocols into their encryption applications yet. But this shouldn’t slow organizations’ march to standardize their key management tasks, Thales says. To that end, TEMS will also support certain proprietary key management interfaces from storage vendors, thereby allowing customers to get started on the consolidation of encryption key management tasks immediately.

    TEMS is platform neutral, according to Thales’ director of product marketing, Kevin Bocek. “TEMS could be used with a storage encryption application that either runs on or handles data from an IBM System i or any other platform,” Bocek writes in an e-mail. “Storage encryption is increasingly being embedded in storage systems, so the host is not directly performing the encryption. For example, you might use a Fibre Channel switch to encrypt data from/to a System i server headed to/from a storage array or tape drive. TEMS would manage the encryption used with the Fibre Channel switch.”

    Franck Greverie, Thales vice president and managing director for the firm’s information systems security activities, says TEMS should be considered by any organization that has adopted low-cost and easy-to-use encryption offerings. “The Encryption Manager for Storage [TEMS] is the perfect complement to these systems, providing a single key management infrastructure for the storage environment to ensure that encryption keys are always available, when and where they are needed.”

    Thales Group is a €12.7 billion French conglomerate in the aerospace, space, defense, security, and transportation industries. The company acquired U.K.-based nCipher in July 2008 for about $100 million, primarily for its hardware-based encryption offerings, which it added to its information systems security division.

    TEMS will be available next month with a starting price of $35,000. For more information, see Thales’ information systems security Web site at iss.thalesgroup.com.

    RELATED STORY

    New Encryption Key Management Standard Posited by Vendors



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Computer Keyes

    Fax Directly from your IBM i

    KeyesFax is a full function automated IBM i fax system. Spooled files are burst by fax number and auto transmitted with overlays.  It combines both a send and receive facsimile processing system with a complete image package.

    The fax software will edit, send, receive, display, print, and track fax documents or images using any standard IBM i without additional expensive hardware, software or subscriptions.

    Computer Keyes has been developing Software Solutions since 1978!

    www.computerkeyes.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Linoma Software:  Learn how to protect your data and get a free trial
    CNX:  Valence is bringing Web 2.0 to System i. Download a FREE 90-day trial
    ProData Computer Services:  Simplify your iT with DBU, DBU RDB, and RDB Connect

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    Dumb Behavior Spreads as Smart Devices Proliferate Microsoft Virtualization for the i Guys, Revisited

    Leave a Reply Cancel reply

Volume 9, Number 26 -- June 30, 2009
THIS ISSUE SPONSORED BY:

ARCAD Software
Bytware
Seagull Software
Cosyn
Twin Data

Table of Contents

  • Infor Sheds More Light on ‘Flex’ Upgrade and Migration Programs
  • Thales Key Manager Lowers Barriers to Encryption
  • iSecurity Experts: New Name, Familiar Face, Services a Priority
  • iBridge Traverses System i-Windows Divide for ACOM
  • IBM Lotus Brings Connections to the Cloud
  • Truck Routing Software Takes Carbon Emissions Into Account
  • Talend Goes Real Time with Data Integration Software
  • Computer Guidance Goes SaaS with Construction Industry App
  • SafeData Now Protects AIX Data, Too
  • LANSA White Paper Tackles Supply Chain Synchronization

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18
  • Will The Turbulent Economy Downdraft IBM Systems Or Lift It?
  • How IBM Improved The Database With IBM i 7.6
  • Rocket Celebrates 35th Anniversary As Private Equity Owner Ponders Sale
  • 50 Acres And A Humanoid Robot With An AI Avatar
  • IBM i PTF Guide, Volume 27, Number 17

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle