The insurance industry manages risk, and recent insurance-company data breaches demonstrate cyber security is one of the biggest legal and regulatory risks. However, insurance providers must also reduce the risk of data breaches to retain customers, maintain profitability, and protect executive careers.
Insurance companies are a very appealing target to hackers. According to the Pittsburgh Post Gazette:
“The value of personal financial and health records is two or three times [the value of financial information alone], because there’s so many more opportunities for fraud,” said David Dimond, chief technology officer of EMC Healthcare, a Massachusetts-based technology provider. Combine a Social Security number, birth date and some health history, and a thief can open credit accounts plus bill insurers or the government for fictitious medical care, he noted.
Insurance provider data vulnerabilities include:
Insurance providers have multiple compliance needs, including:
Today’s insurance companies frequently use outdated mix-and-match security solutions while cyber criminals attack them with the most advanced cyber weapons available. Insurance companies need to update their data security with an enterprise-level solution that not only meets the most challenging compliance constraints but also delivers true security from breach. They need a solution that works:
The CipherTrust Data Security Platform is an extensible infrastructure that delivers centralized key and policy management for a suite of data security solutions that secure your organization’s sensitive and regulated data wherever it resides. The result is low total cost of ownership, as well as simple, efficient deployment and operation.
CipherTrust Transparent Encryption provides file and volume level data-at-rest encryption, secure key management and access controls required by regulation and compliance regimes.
CipherTrust Security Intelligence provides another level of protection from malicious insiders, privileged users, APTs and other attacks that compromise data by delivering the access pattern information that can identify an incident in progress.
CipherTrust Application Data Protection enables enterprises to easily build encryption capabilities into internal applications at the field and column level.
CipherTrust Key Management enables centralized management of encryption keys for other environments and devices including KMIP compatible hardware, Oracle and SQL Server TDE master keys and digital certificates.
CipherTrust Tokenization with Dynamic Masking lets administrators establish policies to return an entire field tokenized or dynamically mask parts of a field. With the solution’s format-preserving tokenization capabilities, administrators can restrict access to sensitive assets, yet at the same time, format the protected data in a way that enables many users to do their jobs.
CipherTrust security solutions are designed to help you comply with:
Thales can work with you to install CipherTrust Data Security solutions in weeks rather than months. Thales solutions work with most major operating systems, including Linux, UNIX and Windows servers in physical, virtual, cloud and big data Cardholder Data Environments (CDE).
CipherTrust Data Security from Thales makes it simple to address security and compliance concerns by simultaneously defending data in databases, files and Big Data nodes across public, private, hybrid clouds and traditional infrastructures. Central management of the entire data security platform makes it easy to extend data security protection and satisfy compliance requirements across the entire enterprise, growing as required, without adding new hardware or increasing operational burdens.
Customers typically report no perceptible impact on end-user experience when using Thales solutions. CipherTrust Transparent Encryption performs encryption and decryption operations at the optimal location of the files system or volume manager taking advantage of hardware cryptographic acceleration, such as Intel® Advanced Encryption Standard-New Instructions (Intel® AES-NI) and SPARC Niagara Crypto, to speed the encryption and decryption of data.