Top Categories

Spotlight

todayMarch 13, 2024

Events Admin

Partner Appreciation Night 2024

On the night of February 29, 2024, Partners take the spotlight! We have carefully curated a special evening exclusively for our esteemed Blue Fortress partners, celebrating remarkable accomplishments in Thales product sales. But that’s not all, we’ve infused the celebration with a touch of fun. A big shoutout to our glamorous [...]


Hold the keys to the Sovereignty in Cloud – Featuring AWS , Thales and Giat

Events Admin todayJuly 18, 2023

Background
share close

On July 13th, 2023, an event was held at the Hilton Kuala Lumpur and Hilton Malaysia focusing on data sovereignty in the cloud and the collaboration between Thales Cloud Security and Amazon Web Services (AWS). The event aimed to address the increasing regulatory and data sovereignty requirements faced by organizations as they utilize services in the AWS Cloud.

The guests were welcomed by Giat Infosys General Manager, Mr. Raja Segaran.
During the session, Mr. Ivan Tan, a Thales Sales Engineer, shared the CipherTrust Data Security Platform and AWS xKS, providing a high-level overview of their architecture and emphasizing the importance of maintaining control over sensitive data. The solution was presented as a way to achieve the highest level of security while allowing for separation of duties, increased operational efficiency, and maximizing choices across clouds, key sources, and ownership models.

Ms. Siew Hoon Lim , an AWS Senior Technical Business Development Manager, shared insights into AWS’s sovereign-by-design approach. This approach refers to AWS addressing data sovereignty concerns.

An additional touch closing, Mr. Steven Gan, CISM, Blue Fortress Technical Director presented the key findings from the 2023 Thales Global Data Threat Report, which involved nearly 3,000 respondents from 18 countries.

This event is a collaboration event between Giat Infosys, Blue Fortress, Thales Cloud Security and Amazon Web Services (AWS), offering a solution that addresses data sovereignty and security concerns in the cloud. The event ends with a lucky draw session and networking lunch.

Written by: Admin

Rate it
Previous post

Post comments (0)

Leave a reply

Your email address will not be published. Required fields are marked *