Votiro and Thales are expanding their partnership to provide enhanced zero trust security solutions and the full lifecycle protection of inbound, outbound, and at-rest data. Votiro will integrate Votiro’s Zero Trust CDR solution, Votiro Cloud, with the Thales CipherTrust Data Security Platform.
The Thales CipherTrust Data Security Platform combines data discovery, classification, data protection, and unprecedented granular access controls with centralized key management, all on a single platform. When combined with Votiro Cloud technology, organizations can include data sanitation alongside Thales’s data discovery, protection, and control offerings.
Ravi Srinivasan, CEO of Votiro commented, “The increased reliance on cloud storage environments, such as S3 buckets, and file transfer capabilities have underscored the growing need for ransomware prevention and content security. In a world where digital files need to cross multiple networks and trust boundaries for productive work, these files must be secure and safely delivered, to not disrupt the business processes. We’re excited to partner with Thales to further our joint mission of enabling companies to operate freely without risk of any hidden threats delivered through malicious files or losing sensitive data and intellectual property in the process.”
Votiro’s technology scans and sanitizes user data before classifying, encrypting, and storing it in cloud environments like S3 buckets. By incorporating Votiro’s advanced CDR capabilities into Thales’ workflow, Votiro and Thales will provide a joint end-to-end data security solution that proactively prevents ransomware and zero-day attacks.
Votiro’s Zero Trust content security architecture provides users with safe file content wherever it is accessed while also proactively preventing evasive and unknown cyber threats. Zero Trust is applied to a customer’s automated file processing or application-to-application file transfer process by Votiro. Votiro’s scalability, speed, and depth/breadth of accepted file formats place them in an excellent position to assist enterprises in achieving file security. For high-volume operations, files are processed at scale, and the entire process occurs in milliseconds, completely invisible to the end-user.
Read more articles: