insurance-providers-banner

Data Security for Insurance Providers

Thales helps insurance companies meet security requirements for their most sensitive data wherever it is created, shared, and stored.

Insurance Providers

The insurance industry manages risk, and recent insurance-company data breaches demonstrate cyber security is one of the biggest legal and regulatory risks. However, insurance providers must also reduce the risk of data breaches to retain customers, maintain profitability, and protect executive careers.

CipherTrust Data Security Platform

 

  • Challenges
  • Solutions
  • Benefits

Insurance Data is a High-Value Target

Insurance companies are a very appealing target to hackers. According to the Pittsburgh Post Gazette:

“The value of personal financial and health records is two or three times [the value of financial information alone], because there’s so many more opportunities for fraud,” said David Dimond, chief technology officer of EMC Healthcare, a Massachusetts-based technology provider. Combine a Social Security number, birth date and some health history, and a thief can open credit accounts plus bill insurers or the government for fictitious medical care, he noted.

Multiple Vulnerabilities

Insurance provider data vulnerabilities include:

  • Customer portals
  • Credit card transactions
  • Insider threats
  • External hackers (credential acquisition)
  • Big data warehousing and applications
  • Cloud data storage
  • Employees using content management solutions
  • The need to consolidate operations and data (e.g. acquisitions)

Compliance

Insurance providers have multiple compliance needs, including:

Advanced Threats and Outdated Protection

Today’s insurance companies frequently use outdated mix-and-match security solutions while cyber criminals attack them with the most advanced cyber weapons available. Insurance companies need to update their data security with an enterprise-level solution that not only meets the most challenging compliance constraints but also delivers true security from breach. They need a solution that works:

  • With all kinds of data
  • On multiple operating systems
  • In multiple environments
  • With limited human resources, funds, hardware and software.

CipherTrust Data Security Platform

The CipherTrust Data Security Platform is an extensible infrastructure that delivers centralized key and policy management for a suite of data security solutions that secure your organization’s sensitive and regulated data wherever it resides. The result is low total cost of ownership, as well as simple, efficient deployment and operation.

CipherTrust Transparent Encryption

CipherTrust Transparent Encryption provides file and volume level data-at-rest encryption, secure key management and access controls required by regulation and compliance regimes.

CipherTrust Security Intelligence

CipherTrust Security Intelligence provides another level of protection from malicious insiders, privileged users, APTs and other attacks that compromise data by delivering the access pattern information that can identify an incident in progress.

CipherTrust Application Data Protection

CipherTrust Application Data Protection enables enterprises to easily build encryption capabilities into internal applications at the field and column level.

CipherTrust Key Management

CipherTrust Key Management enables centralized management of encryption keys for other environments and devices including KMIP compatible hardware, Oracle and SQL Server TDE master keys and digital certificates.

CipherTrust Tokenization with Dynamic Masking

CipherTrust Tokenization with Dynamic Masking lets administrators establish policies to return an entire field tokenized or dynamically mask parts of a field. With the solution’s format-preserving tokenization capabilities, administrators can restrict access to sensitive assets, yet at the same time, format the protected data in a way that enables many users to do their jobs.

Compliance

CipherTrust security solutions are designed to help you comply with:

  • Payment Card Industry Data Security Standard (PCI DSS)
  • State Data Breach Notification Laws
  • National Data Protection and Privacy Laws
  • Sarbanes-Oxley, GLBA, Basel III
  • USA Patriot Act
  • The US Federal government’s mandate for encryption
  • Common Criteria
  • Others that will arise

Quick and Easy to Install No Matter what your OS

Thales can work with you to install CipherTrust Data Security solutions in weeks rather than months. Thales solutions work with most major operating systems, including Linux, UNIX and Windows servers in physical, virtual, cloud and big data Cardholder Data Environments (CDE).

Easy to Use

CipherTrust Data Security from Thales makes it simple to address security and compliance concerns by simultaneously defending data in databases, files and Big Data nodes across public, private, hybrid clouds and traditional infrastructures. Central management of the entire data security platform makes it easy to extend data security protection and satisfy compliance requirements across the entire enterprise, growing as required, without adding new hardware or increasing operational burdens.

Doesn't Slow System Performance

Customers typically report no perceptible impact on end-user experience when using Thales solutions. CipherTrust Transparent Encryption performs encryption and decryption operations at the optimal location of the files system or volume manager taking advantage of hardware cryptographic acceleration, such as Intel® Advanced Encryption Standard-New Instructions (Intel® AES-NI) and SPARC Niagara Crypto, to speed the encryption and decryption of data.