Story image

PHOTO GALLERY: Thales holds media event calling attention to cybersecurity

12 Apr 18

Today in Paris Thales opened its doors to international media to effectively flex its muscles and reveal some of the cybersecurity technologies it has developed for the future.

The company has invested more than 1 billion euros in developing its expertise and footprint across four key digital technologies - connectivity, big data, artificial intelligence, and cybersecurity.

Throughout the day Thales demonstrated with concrete examples how cybersecurity impacts the daily lives of enterprises, organisations and ultimately each citizen, in addition to announcing several important developments in the sector.

Some of the highlights of the day included a representation of what a world would be like without cybersecurity, a live ethical hacker breaking into a completely oblivious person’s smartphone, some of the amazing technology on offer from the company as well as the noteworthy insights from Thales CEO Patrice Caine.

There will be more stories to come from the day, but for now have a look at some of the photos

Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.