Story image

Thales boost security for Kakao, Korea's 'digital only' bank

19 Sep 17

South Korean digital-only bank Kakao Bank has deployed Thales security technologies as part of its efforts to boost the foundation of its banking systems.

The bank opened in July and according to reports,  more than one million users signed up in the space of five days.

Thales is deploying its nShield hardware security modules, which are FIPS 140-2 Level 3 certified. The company says they can deliver key management, data encryption and mobile user authentication.

Thales says that Kakao’s financial services are conducted solely through its mobile applications, which means there is an urgent need for robust data protection.

nShield hardware security modules were built with hardened, tamper-resistant platforms for encryption, digital signatures, key generation and protection.

A statement from Kakao bank says that nShield was an optimal choice because of its reputation for protecting data across devices, processes, platforms and environments.

"As the financial service industry continues to evolve from physical financial services, to mobile payments to digital-only banking, the requirements have only become more stringent for data security and privacy. This is one of many reasons why Thales is at the forefront of delivering advanced security services for new and innovative financial services organizations like Kakao Bank,” comments Kee Tae Kim, director for Thales eSecurity in Korea.

nShield hardware security modules also support certificate authorities, code signing and any application that uses digital keys across cloud, virtual and on-premise environments.

Foreigners are unable to use Kakao bank because they can’t receive verification codes on their devices.

Earlier this year Thales strengthened its data security across multi-cloud platforms through integration with providers such as Amazon Web Services, Google, Microsoft and Salesforce.

The company made enhancements to its Vormetric Data Security Manager, which offers centralised key and policy management.

““Ultimately, organizations operating in multi-cloud environments benefit most when they have a consistent, integrated solution that offers comprehensive data security and the ability to effectively manage encryption keys across diverse environments. Thales cloud security and key management allow companies to achieve both aims, which is vital as organizations are responsible for keeping their data secure, and can’t default to holding the cloud provider solely responsible if and when something goes awry,” comments Peter Galvin, VP of strategy for Thales eSecurity.

The newest version of Vormetric Data Security Manager also offers support for Vormetric Transparent Encryption Live Data Transformation which is able to mitigate the need for downtime when transforming or rekeying encrypted data.

How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.