Thales banner

๋ฐ์ดํ„ฐ ๋ณด์•ˆ

๋ฐ์ดํ„ฐ ์นจํ•ด๊ฐ€ ๊ณ„์†ํ•ด์„œ ๊ทœ์น™์ ์œผ๋กœ ๋ฐœ์ƒํ•˜๊ณ  ๋ฐ์ดํ„ฐ ๋ณด์•ˆ๊ทœ์ œ๊ฐ€ ๋”์šฑ ์—„๊ฒฉํ•ด์ง์— ๋”ฐ๋ผ ๊ธฐ์—…์€ ์˜จํ”„๋ ˆ๋ฏธ์Šค ํ™˜๊ฒฝ๊ณผ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ ๋ชจ๋‘์—์„œ ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณดํ˜ธํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.

ํƒˆ๋ ˆ์Šค๋Š” ๊ธฐ์—…์ด ์•”ํ˜ธํ™” ๋ฐ ์•”ํ˜ธํ™” ๊ด€๋ จ ์†”๋ฃจ์…˜์˜ ์‚ฌ์ผ๋กœ๋ฅผ ๋„˜์–ด ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ์†”๋ฃจ์…˜์„ ์ค‘์•™์—์„œ ์ผ๊ด€์ ์œผ๋กœ ๋ฐฐํฌํ•˜๊ณ , ์ตœ์ € TCO๋กœ ๋ฏธ๋ž˜์˜ ๋ณด์•ˆ ๋ฌธ์ œ ๋ฐ ์ƒˆ๋กœ์šด ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ๊ทœ์ œ๋ฅผ ์ค€์ˆ˜ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. ํƒˆ๋ ˆ์Šค์—์„œ ์ œ๊ณตํ•˜๋Š” ๊ณ ๊ธ‰ ๋ฐ์ดํ„ฐ ๊ฒ€์ƒ‰, ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”, ํ‚ค ๊ด€๋ฆฌ, ๋„คํŠธ์›Œํฌ ์•”ํ˜ธํ™”, ํ•˜๋“œ์›จ์–ด ๋ณด์•ˆ ๋ชจ๋“ˆ ๋ฐ ์˜จ๋””๋งจ๋“œ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ์†”๋ฃจ์…˜์„ ํ†ตํ•ด ๊ณ ๊ฐ์€ ํด๋ผ์šฐ๋“œ, ์˜จํ”„๋ ˆ๋ฏธ์Šค, ํ•˜์ด๋ธŒ๋ฆฌ๋“œ IT ํ™˜๊ฒฝ ์ „๋ฐ˜์—์„œ ๋ฐ์ดํ„ฐ ์œ„์น˜์™€ ๊ด€๊ณ„์—†์ด ๋ฐ์ดํ„ฐ๋ฅผ ๋ณดํ˜ธํ•˜๊ณ  ์ œ์–ดํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Thales DP Wheel Discover Protect Control

  • ์žฅ์ 

์ง„ํ™”ํ•˜๋Š” ์œ„ํ˜‘์œผ๋กœ๋ถ€ํ„ฐ ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ

ํƒˆ๋ ˆ์Šค ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ์ œํ’ˆ์„ ์ด์šฉํ•˜๋ฉด, ์ง„ํ™”ํ•˜๋Š” ๋ฐ์ดํ„ฐ ์œ„ํ˜‘ ํ™˜๊ฒฝ์—์„œ๋„ ๊ธฐ๋ฐ€์„ฑ, ๋ฌด๊ฒฐ์„ฑ, ๊ฐ€์šฉ์„ฑ์˜ ์ด์ ์„ ๋ˆ„๋ฆฌ๋ฉฐ ๊ธฐ์—…์„ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๋ณด์•ˆ๊ณผ ๊ทœ์ œ ์ค€์ˆ˜ ๊ฐ•ํ™”

๊ฒ€์ฆ๋ฐ›์•˜์œผ๋ฉฐ ํ™•์žฅ ๊ฐ€๋Šฅํ•œ ๊ณ ์„ฑ๋Šฅ ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ ์†”๋ฃจ์…˜์œผ๋กœ, ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ๊ด€๋ จ ๊ทœ์ œ๋ฅผ ์ค€์ˆ˜ํ•˜๊ณ  ๋ชจ๋ฒ” ์‚ฌ๋ก€ ์š”๊ฑด์„ ์ถฉ์กฑํ•ฉ๋‹ˆ๋‹ค.

์ด ์šด์˜ ๋น„์šฉ ์ ˆ๊ฐ

ํƒˆ๋ ˆ์Šค ํ†ตํ•ฉ ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ ์ œํ’ˆ๊ณผ ์„œ๋น„์Šค ์ผ์ฒด๋ฅผ ํ™œ์šฉํ•˜์—ฌ ์—…๋ฌด ํšจ์œจ์„ฑ๊ณผ ์ƒ์‚ฐ์„ฑ์„ ๊ทน๋Œ€ํ™”ํ•˜๋Š” ๋™์‹œ์— ์šด์˜ ๋ฐ ์ถ”๊ฐ€ ํˆฌ์ž๋น„์šฉ์„ ์ ˆ๊ฐ์‹œํ‚ค์‹ญ์‹œ์˜ค.

๋ฐ์ดํ„ฐ ๋ณด์•ˆ ์ œํ’ˆ

CipherTrust Data Discovery and Classification

ํƒˆ๋ ˆ์Šค CipherTrust Data Discovery and Classification์€ ๊ธฐ์—…์ด ์ด์šฉํ•˜๋Š” ๋‹ค์–‘ํ•œ ๋ฐ์ดํ„ฐ ์ €์žฅ์†Œ(ํด๋ผ์šฐ๋“œ, ๋น…๋ฐ์ดํ„ฐ, ๊ธฐ์กด ํ™˜๊ฒฝ)์—์„œ ํšจ์œจ์ ์ธ ๋ฐ์ดํ„ฐ ๊ฒ€์ƒ‰, ๋ถ„๋ฅ˜, ์œ„ํ—˜ ๋ถ„์„์„ ์ˆ˜ํ–‰ํ•˜์—ฌ ๊ธฐ์—…์ด ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ์™„์ „ํ•œ ๊ฐ€์‹œ์„ฑ์„ ํ™•๋ณดํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. 

์ž์„ธํžˆ ์•Œ์•„๋ณด๊ธฐ

์ €์žฅ ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”

CipherTrust Data Security Platformd์€ ๋‹จ ํ•˜๋‚˜์˜ ํ”Œ๋žซํผ์—์„œ ๋ฐ์ดํ„ฐ ๊ฒ€์ƒ‰, ๋ถ„๋ฅ˜, ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ๋ฅผ ์ œ๊ณตํ•  ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ, ์ค‘์•™ ์ง‘์ค‘์‹ ํ‚ค ๊ด€๋ฆฌ๋ฅผ ํ†ตํ•ด ์ „๋ก€์—†์ด ์„ธ๋ถ„ํ™”๋œ ๋ฐ์ดํ„ฐ ์ ‘๊ทผ ์ œ์–ด ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๊ทธ ๊ฒฐ๊ณผ, ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ์ž‘์—…์ด๋‚˜ ๋ณดํŽธ์ ์ธ ๊ทœ์ œ ์ค€์ˆ˜ ๊ด€๋ฆฌ์— ํˆฌ์žํ•˜๋Š” ์ „์šฉ ๋ฆฌ์†Œ์Šค๋ฅผ ์ค„์ผ ์ˆ˜ ์žˆ๊ณ , ๋น„์ฆˆ๋‹ˆ์Šค ์ „๋ฐ˜์— ๊ฑธ์นœ ์œ„ํ—˜์ด ํฌ๊ฒŒ ๊ฐ์†Œํ•ฉ๋‹ˆ๋‹ค.

์ž์„ธํžˆ ์•Œ์•„๋ณด๊ธฐ

ํ‚ค ๊ด€๋ฆฌ

ํƒˆ๋ ˆ์Šค ํ‚ค ๊ด€๋ฆฌ๋Š” ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ๊ณผ ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ ํ™˜๊ฒฝ์—์„œ ๋‹ค์–‘ํ•œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์— ๋Œ€ํ•œ ํ‚ค ๊ด€๋ฆฌ ์ž‘์—…์„ ๊ฐ„์†Œํ™”ํ•˜๊ณ  ๊ฐ•ํ™”ํ•ฉ๋‹ˆ๋‹ค. FIPS 140-2๋ฅผ ์ค€์ˆ˜ํ•˜๋Š” CipherTrust Manager๋Š” ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค TDE, KMIP ํด๋ผ์ด์–ธํŠธ, ํƒˆ๋ ˆ์Šค CipherTrust ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ํ”Œ๋žซํผ ์ผ์ฒด๋ฅผ ํฌํ•จํ•œ ์—ฌ๋Ÿฌ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ๋Œ€์‹ ํ•˜์—ฌ ํ‚ค๋ฅผ ๊ด€๋ฆฌํ•˜๊ณ  ๋ณดํ˜ธํ•ฉ๋‹ˆ๋‹ค.

์ž์„ธํžˆ ์•Œ์•„๋ณด๊ธฐ

์˜จ๋””๋งจ๋“œ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ

์˜จ๋””๋งจ๋“œ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ(Data Protection on Demand, DPoD)์€ ๊ฐ„๋‹จํ•œ ์˜จ๋ผ์ธ ๋งˆ์ผ“ํ”Œ๋ ˆ์ด์Šค๋ฅผ ํ†ตํ•ด ๊ด‘๋ฒ”์œ„ํ•œ ํด๋ผ์šฐ๋“œ HSM์™€ ํ‚ค ๊ด€๋ฆฌ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๋Š” ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ํ”Œ๋žซํผ์ž…๋‹ˆ๋‹ค. DPoD๋Š” ๊ตฌ๋งค, ๋ฐฐํฌ, ์œ ์ง€ ๊ด€๋ฆฌํ•  ํ•˜๋“œ์›จ์–ด๊ฐ€ ์—†๋Š” ๋ณด์•ˆ์„ ์ œ๊ณตํ•˜์—ฌ ๋”์šฑ ๊ฐ„ํŽธํ•˜๊ณ  ๋น„์šฉ ํšจ์œจ์ ์ด๋ฉฐ ๊ด€๋ฆฌํ•˜๊ธฐ ์‰ฝ์Šต๋‹ˆ๋‹ค. ํ•„์š”ํ•œ ๋ณด์•ˆ ์„œ๋น„์Šค๋ฅผ ํด๋ฆญํ•˜๊ธฐ๋งŒ ํ•˜๋ฉด ๋ฐฐํฌํ•  ์ˆ˜ ์žˆ๊ณ  ์„œ๋น„์Šค๋ฅผ ํ”„๋กœ๋น„์ €๋‹ํ•˜๊ฑฐ๋‚˜ ๋ณด์•ˆ ์ •์ฑ…์„ ์ถ”๊ฐ€ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ ๋ช‡ ๋ถ„ ์•ˆ์— ์‚ฌ์šฉ๋Ÿ‰ ๋ณด๊ณ ๋ฅผ ๋ฐ›์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ž์„ธํžˆ ์•Œ์•„๋ณด๊ธฐ

๋ฒ”์šฉ ํ•˜๋“œ์›จ์–ด ๋ณด์•ˆ ๋ชจ๋“ˆ

๋†’์€ ๋ณด์ฆ FIPS 140-3 ๋ ˆ๋ฒจ 3 ์ธ์ฆ์„ ๋ฐ›์€ ๋ณ€์กฐ ๋ฐฉ์ง€ Thales Luna ํ•˜๋“œ์›จ์–ด ๋ณด์•ˆ ๋ชจ๋“ˆ(HSM)๋กœ ์ค‘์š”ํ•œ ๋ฐ์ดํ„ฐ์™€ ๋””์ง€ํ„ธ ์‹ ์›์„ ๋ณดํ˜ธํ•˜์„ธ์š”. ๋””์ง€ํ„ธ ๋ณด์•ˆ์˜ ๊ธฐ๋ฐ˜์ธ Luna HSM์€ ํ•˜๋“œ์›จ์–ด ์‹ ๋ขฐ์ ์„ ํ†ตํ•ด ์•”ํ˜ธํ‚ค๋ฅผ ์ƒ์„ฑ, ๊ด€๋ฆฌ, ์ €์žฅํ•˜์—ฌ ์ „์ฒด ์•”ํ˜ธํ™” ์ธํ”„๋ผ๋ฅผ ๋ณดํ˜ธํ•ฉ๋‹ˆ๋‹ค. ๋ฌธ์„œํ™”๋˜์—ˆ์œผ๋ฉฐ ์ฆ‰์‹œ ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•œ ํ†ตํ•ฉ ๊ธฐ๋Šฅ์„ ๊ฐ–์ถ˜ ๊ด‘๋ฒ”์œ„ํ•œ ํŒŒํŠธ๋„ˆ์‚ฌ ์ƒํƒœ๊ณ„๋ฅผ ํ†ตํ•ด ์—ฌ๋Ÿฌ ํ‘œ์ค€ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ๋น ๋ฅด๊ณ  ์‰ฝ๊ฒŒ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. Luna Network HSM ์•”ํ˜ธํ™” ์ž์›์„ ์ค‘์•™์—์„œ ๊ด€๋ฆฌํ•˜๊ณ , ์ž์›์˜ ์ƒํƒœ์— ๋Œ€ํ•œ ๊ฐ€์‹œ์„ฑ์„ ํ™•๋ณดํ•˜๋ฉฐ ํƒˆ๋ ˆ์Šค Crypto Command Center๋ฅผ ์ด์šฉํ•ด ์„œ๋น„์Šค ์ˆ˜์ค€ ๊ณ„์•ฝ์— ์˜ํ–ฅ์„ ๋ฏธ์น  ๋งŒํ•œ ๋ฌธ์ œ๋ฅผ ๋ฏธ๋ฆฌ ํ•ด๊ฒฐํ•˜์‹ค ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ž์„ธํžˆ ์•Œ์•„๋ณด๊ธฐ

์ง€๋ถˆ๊ฒฐ์ œ ํ•˜๋“œ์›จ์–ด ๋ณด์•ˆ ๋ชจ๋“ˆ

ํƒˆ๋ ˆ์Šค๊ฐ€ ์ œ๊ณตํ•˜๋Š” PayShield 10K๋Š” ๊ฑฐ๋ž˜ ์ฒ˜๋ฆฌ, ๋ฏผ๊ฐ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ, ๊ฒฐ์ œ ์ž๊ฒฉ ์ฆ๋ช… ๋ฐœ๊ธ‰, ๋ชจ๋ฐ”์ผ ์นด๋“œ ์Šน์ธ, ๊ฒฐ์ œ ํ† ํฐํ™” ์—…๋ฌด์— ์ž…์ฆ๋ฐ›์€ ๊ฒฐ์ œ ๋ณด์•ˆ ๊ธฐ๋Šฅ ์ œํ’ˆ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๊ธ€๋กœ๋ฒŒ ๊ฒฐ์ œ ์ƒํƒœ๊ณ„์˜ ๋ฐœํ–‰์ž, ์„œ๋น„์Šค ์ œ๊ณต์—…์ฒด, ์ธ์ˆ˜์ž, ์ฒ˜๋ฆฌ์—…์ฒด, ๊ฒฐ์ œ ๋„คํŠธ์›Œํฌ๊ฐ€ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์ œํ’ˆ์ž…๋‹ˆ๋‹ค. PayShield 10K๋Š” PCI HSM v3์™€ FIPS 140-2 ๋ ˆ๋ฒจ 3 ์ธ์ฆ์„ ๋ฐ›์•˜์Šต๋‹ˆ๋‹ค.

์ž์„ธํžˆ ์•Œ์•„๋ณด๊ธฐ

Network Encryptors

Thales High Speed Encryptors๋Š” ๋„คํŠธ์›Œํฌ์— ์˜์กดํ•˜์ง€ ์•Š๋Š” ์ด๋™ ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”(2~4๊ฐœ ๊ณ„์ธต)๋ฅผ ์ œ๊ณตํ•˜์—ฌ, ์‚ฌ์ดํŠธ ๊ฐ„ ๋ฐ์ดํ„ฐ ์ด๋™ ์‹œ ๋˜๋Š” ์˜จํ”„๋ ˆ๋ฏธ์Šค์—์„œ ํด๋ผ์šฐ๋“œ๋กœ ๋ฐ์ดํ„ฐ๋ฅผ ์ด๋™ํ•  ๋•Œ ๋ฐ์ดํ„ฐ๋ฅผ ์•ˆ์ „ํ•˜๊ฒŒ ๋ณดํ˜ธํ•ฉ๋‹ˆ๋‹ค. Thales High Speed Encryptors๋Š” ๋ฌผ๋ฆฌ์  ์žฅ์น˜์™€ ๊ฐ€์ƒ ์žฅ์น˜ ํ˜•ํƒœ๋กœ ์ œ๊ณต๋˜๋ฉฐ ๋‹จ์ผ ํฌํŠธ์™€ ๋ฉ€ํ‹ฐ ํฌํŠธ ์žฅ์น˜์— ์ด๋ฅด๋Š” ๋‹ค์–‘ํ•œ ํ”Œ๋žซํผ์—์„œ 10Mbps~100Gbps์˜ ๊ด‘๋ฒ”์œ„ํ•œ ๋„คํŠธ์›Œํฌ ์†๋„๋ฅผ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค.

์ž์„ธํžˆ ์•Œ์•„๋ณด๊ธฐ

ํŒŒ์ผ ๊ณต์œ  ๋ณด์•ˆ

SureDrop์€ ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ๊ธ‰, ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ๋˜๋Š” ์˜จํ”„๋ ˆ๋ฏธ์Šค ์†”๋ฃจ์…˜์œผ๋กœ, ์ข…๋‹จ๊ฐ„ ์•”ํ˜ธํ™”๋ฅผ ํ†ตํ•œ ์•ˆ์ „ํ•œ ํŒŒ์ผ ๊ณต์œ ์™€ ๊ณต๋™ ์ž‘์—…์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค. SureDrop์€ ๊ฐ•๋ ฅํ•œ ํŒŒ์ผ ์ €์žฅ, ๋™๊ธฐํ™”, ๊ณต์œ  ๊ด€๋ จ ๋ณด์•ˆ ์ •์ฑ…์„ ๊ฐ€์ง„ ๊ธฐ์—…์„ ์œ„ํ•ด ๊ฐœ๋ฐœ๋˜์—ˆ์œผ๋‚˜ ๋™์‹œ์— ์™„์ „ํ•œ ๊ณต๋™ ํŒŒ์ผ ์ž‘์—… ์†”๋ฃจ์…˜์—์„œ ์–ป์„ ์ˆ˜ ์žˆ๋Š” ์ƒ์‚ฐ์„ฑ ๋˜ํ•œ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

์ž์„ธํžˆ ์•Œ์•„๋ณด๊ธฐ

๋‹น์‚ฌ์˜ ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ ๋ฆฌ์†Œ์Šค

Thales Data Protection Portfolio - Brochure

Thales Data Protection Portfolio - Brochure

As security breaches continue with alarming regularity and compliance mandates get more stringent, companies need to discover and protect sensitive data across on-premises, hybrid and multi-cloud environments.The industry-leading portfolio of data protection products from...

Unshare and Secure Sensitive Data - Encrypt Everything - eBook

Unshare and Secure Sensitive Data - Encrypt Everything - eBook

Business critical data is flowing everywhere. The boundaries are long gone. As an enterprise-wide data security expert, you are being asked to protect your organizationโ€™s valuable assets by setting and implementing an enterprise-wide encryption strategy. IT security teams are...

CipherTrust Data Security Platform

CipherTrust Data Security Platform ๊ฒ€์ถœ, ๋ณดํ˜ธ, ํ†ต์ œ - Product Brief

IT ํŒ€์€ ๋„คํŠธ์›Œํฌ์—์„œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ํด๋ผ์šฐ๋“œ๋กœ ์ „์†ก๋˜๋Š” ๋ฐ์ดํ„ฐ๋ฅผ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•œ ๋ฐ์ดํ„ฐ ์ค‘์‹ฌ ์†”๋ฃจ์…˜์„ ๋ฌผ์ƒ‰ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์˜ค๋Š˜๋‚  ๊ฒฝ๊ณ„ ๋„คํŠธ์›Œํฌ ํ†ต์ œ ๋ฐ ์—”๋“œํฌ์ธํŠธ ๋ณด์•ˆ ์ฒด์ œ๊ฐ€ ๋ฌด๋„ˆ์ง€๋Š” ๊ฐ€์šด๋ฐ ๊ธฐ์—…์ด ์ง„ํ™”ํ•˜๋Š” ๊ฐœ์ธ์ •๋ณด ๋ณดํ˜ธ ๊ทœ์ •์„ ์ค€์ˆ˜ํ•˜๋Š” ๋™์‹œ์— ๊ธ‰์ฆํ•˜๋Š” ์›๊ฒฉ ๊ทผ๋ฌด ์ง์›๋“ค์„ ์ง€์›ํ•˜๋ ค๋ฉด ๋ฐ์ดํ„ฐ ์ค‘์‹ฌ ์†”๋ฃจ์…˜์ด ํ•„์š”ํ•˜๊ธฐ ๋•Œ๋ฌธ์ž…๋‹ˆ๋‹ค.

Thales Hardware Security Modules - Brochure

Thales Hardware Security Modules - Brochure

The Foundation of Digital Trust A hardware security module (HSM) is a dedicated device that is specifically designed for the protection of the cryptographic keys. HSMs act as trust anchors that protect the cryptographic infrastructure of some of the most security-conscious...

Thales High Speed Encryptor- ์ตœ์ƒ์˜ ๋ฐ์ดํ„ฐ ์ „์†ก ๋ณด์•ˆ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

Thales High Speed Encryptor- ์ตœ์ƒ์˜ ๋ฐ์ดํ„ฐ ์ „์†ก ๋ณด์•ˆ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.

๋„คํŠธ์›Œํฌ๋Š” ํ•ด์ปค๋“ค์˜ ์ง€์†์ ์ธ ๊ณต๊ฒฉ๋Œ€์ƒ์œผ๋กœ ๋ฏผ๊ฐํ•œ ์ž์‚ฐ์ด ๋…ธ์ถœ๋  ์œ„ํ˜‘์— ๋†“์—ฌ์žˆ์Šต๋‹ˆ๋‹ค. ๋„คํŠธ์›Œํฌ์—์„œ ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ•  ๋•Œ ์•”ํ˜ธํ™”๋ฅผ ํ™œ์šฉํ•˜๋Š” ๊ฒƒ์€ ์œ„ํ˜‘ ์š”์†Œ์— ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•œ ํ•„์ˆ˜ ์š”๊ฑด์ž…๋‹ˆ๋‹ค ํƒˆ๋ ˆ์Šค์˜ Thales High Speed Encryptor ์†”๋ฃจ์…˜์€ ๋ฐ์ดํ„ฐ ์„ผํ„ฐ์™€ ๋ณธ์‚ฌ ๊ฐ„์˜ ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ๋ถ€ํ„ฐ ๋ฐฑ์—… ๋ฐ ์žฌํ•ด ๋ณต๊ตฌ ์‚ฌ์ดํŠธ์— ์ด๋ฅด๊ธฐ๊นŒ์ง€, ์‚ฌ๋‚ด ๋„คํŠธ์›Œํฌ์™€ ํด๋ผ์šฐ๋“œ๋ฅผ ๋น„๋กฏํ•˜์—ฌ ์–ด๋””์—์„œ๋“  ์•”ํ˜ธํ™”๊ฐ€ ๊ฐ€๋Šฅํ•œ ๋‹จ์ผ ํ”Œ๋žซํผ์„ ๊ณ ๊ฐ์—๊ฒŒ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ํƒˆ๋ ˆ์Šค์˜ ํฌ๊ด„์ ์ธ ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ ์•”ํ˜ธํ™” ์†”๋ฃจ์…˜์€ ๋ ˆ์ด์–ด...

Transaction processing using payShield HSMs - Brochure

Transaction processing using payShield HSMs - Brochure

payShield from Thales is the worldโ€™s leading payment HSM, helping to secure an estimated 80% of global point of sale (POS) transactions. As the HSM of choice for payment solution providers and payment technology vendors, it delivers proven integration with all of the leading...