Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Thales_LOGO_.png
Thales Trusted Cyber Technologies (TCT)

CTO Sessions: A Guide to BYOK and HYOK for AWS, Azure, Google and More


Event Date: November 30, 2023
Hosted By: Thales TCT & Carahsoft

Cloud Security Alliance best practices require that keys be stored and managed outside of the cloud service provider and the associated encryption operations. Cloud Service Providers therefore offer Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) services to enable customer control of the keys used to encrypt their data. Customer control of the keys allows for the separation, creation, ownership and control, including revocation, of encryption keys or tenant secrets used to create the keys.

This webinar covered how to control cloud encryption keys for deployments in AWS/AWS GovCloud, Google Cloud, Azure/Azure for Government, and more. Thales TCT’s Cloud Security Expert discussed how to:

  • Leverage the value of BYOK and HYOK services with full-lifecycle cloud encryption key management
  • Gain higher efficiency with centralized key management across hybrid, single- and multi-cloud environments, including key discovery, management of native cloud keys and automated key rotation
  • Comply with the most stringent data protection mandates with secure key origination
  • Amplify the benefits of native keys by using a robust multi-cloud platform with outstanding UI

Fill out the form below to view this archived event.


Resources


Streamlining Cloud Migration with AWS’s 3-Phase Approach and GTS’s Expertise
Blog

Streamlining Cloud Migration with AWS’s 3-Phase Approach and GTS’s Expertise

Migrating to the cloud offers businesses advantages like faster time to market, cost optimization, and enhanced security. AWS and GTS collaboration takes this further, aiding in application reviews, infrastructure assessment, and skill development for a seamless transition. Key steps encompass infrastructure assessment, goal definition, security planning, data migration preparation, and automation. GTS recommends strategic management, human-focused approach, and thorough readiness. The migration process follows a 3-phase structure: Assessment, Mobilization, and Migration & Modernization, with GTS's expertise ensuring successful transitions and benefits like scalability and efficiency.


Fill out the form below to view this Resource.