Data Protection Services (DPS) commenced operations early 2024 in Brisbane, Queensland Australia. DPS has partnered with global vendors and our role is that of a Reseller Partner with Thales and Ascertia.

Whilst additional vendors may join DPS in the future, they will exclusively focus on the protection of data for our clients and their customers. Although DPS is an early stage “start-up”, all the recommended solutions are technically underwritten by the vendors. We can scope new or replacement solutions as well as provide maintenance through each of our nominated partners. DPS is also able to act in a consulting capacity on Australian legislation and Global Standards.

DPS only recommends solutions that have been designed and signed off by the vendors and as such they are responsible for the solutions we sell. This arrangement provides peace of mind to the end user of the products and services, as they are in fact dealing with a recognised global vendor, albeit indirectly. It also means that DPS are able to focus on providing an outstanding experience for all of our customers, something we are passionate about. Vendor Products and Solutions offered:

1.     LUNA GENERAL PURPOSE HSM’s2Designed to provide a balance of security, high performance, and usability

·      Luna Network HSM

·      Luna PCIe HSM

·      Luna USB HSM

·      Protect Server HSM

·      Luna Cloud HSM Services

·      Luna Backup HSM Solutions

Thales is the leading provider of general-purpose hardware security modules (HSMs) worldwide. The Thales Luna HSM product family represents the highest-performing, most secure, and easiest-to-integrate HSM solution available on the market today.

Luna HSMs are purposefully designed to provide a balance of security, high performance, and usability that makes them an ideal choice for enterprise, financial, and government organizations..     payShield PAYMENT HSM’s

Secure card, mobile and online payments:

·      payShield 10k

·      payShield Cloud HSM

·      payShield Manager

·      payShield Monitor

·      payShield Trusted Management Device

Thales Payment HSMs and management tools provide flexible, efficient transaction security for retail payment processing environments, internet payment applications, and web-based PIN delivery. Ensuring the security of consumer data is essential to the integrity of intra-bank network payments, ACH transfers, cheque clearing, mobile payments, and credit card transactions. In addition to meeting today’s government and industry regulations and standards, Thales Payment HSM solutions are designed to anticipate tomorrow’s.


3.     SECRETS MANAGEMENT

Protects and automates access to secrets across DevOps tools and cloud workloads

Enterprise-ready secrets management provides automatic processes for creating, storing, rotating, and removing secrets. Reduce the potential for human error and consistently enforce security policies across your organization with:

·      Centralized management for all secret types

·      Easy to use for DevSecOps

·      SaaS (Software as a Service) scalability for hybrid and multi-cloud environments


4.     DATA AT REST ENCRYPTION

Control sensitive data and address your unique security and compliance requirements

·      Data Security Platform

·      Transparent Encryption

·      Encryption for Kubernetes

·      Encryption UserSpace

·      Application Data Protection

·      Tokenization

·      Data Protection Gateway

Whether storing data in a physical data centre, a private or public cloud, or in a third-party storage application, proper encryption and key management are critical to ensure sensitive data is protected.

Thales offers data-at-rest encryption solutions that deliver granular encryption, tokenization and role-based access control for structured and unstructured data residing in databases, applications, files, and storage containers. With centralized key management and a hardened root of trust, enterprises can ensure their master keys are protected, and data remains secure.


5.     KEY MANAGEMENT

Secure, manage and control encryption keys

·      CipherTrust Manager

·      Data Security Manager

·      CipherTrust Cloud Key Manager

·      Enterprise Key Management

Thales Key Management offerings streamline and strengthen key management in cloud and enterprise environments over a diverse set of use cases. Leveraging FIPS 140-2 and now 140-3 compliant virtual or hardware appliances, Thales key management tools and solutions deliver high security to sensitive environments and centralise key management for your home-grown encryption, as well as your third-party applications. This gives you greater command over your keys while increasing your data security. Thales key management products connect with your applications through standard interfaces and deliver access to robust key management functions.


6.     ACCESS MANAGEMENT & AUTHENTICATION

Ensure the right user has access to the right resource at the right level of trust

·      Workforce Identity and Access Management (IAM)

·      Customer Identity and Access Management (IAM)

·      B2B Identity and Access Management (IAM)

·      Multi-Factor Authentication

From the moment we engage with a platform or service, our identity shapes the experience: how we’re recognised, the level of personalisation we receive, and the trust we place in the interaction. That’s why Thales is committed to providing you with everything necessary to manage identities successfully.

Thales’ Identity and Access Management solutions ensure the right individuals have access to the right resources at the right times for the right reasons. We’re here to deliver the expertise, capabilities, and support you need to make IAM processes straightforward, frictionless, and more dependable.


7.     DATA PROTECTION ON DEMAND

It’s Not Just Data Protection. It’s Data Protection On Demand

·      Cloud Based Security as a Service

The award-winning Thales Data Protection on Demand (DPoD) is a cloud‑based platform providing a wide range of cloud HSM and key management services through a simple online marketplace. Deploy and manage key management and hardware security module services, on‑demand and from the cloud.


8.     DATA DISCOVERY AND CLASSIFICATION

Thales CipherTrust Data Discovery and Classification helps your organisation get complete visibility into your sensitive data with efficient data discovery, classification, and risk analysis across heterogeneous data stores – the cloud, big data, and traditional environments – in your enterprise.

Simple to deploy and use, it provides you with a single pane of glass that allows you to get a clear understanding of what sensitive data you have, where it’s located, and its risks of exposure. With rich visualisations and detailed reports, you can more easily uncover and close your gaps, make better decisions about third-party data sharing and cloud migration, and proactively respond to data privacy and security regulations including GDPR, CCPA, LGPD, PCI DSS and HIPAA.



9.     SECURE FILE SHARING

Store, share and sync all files to the cloud or on premises. Thales SureDrop® enables any organization to participate in secure file sharing and collaboration across the Internet.

No matter where or how the people in your organization work, there is always the need to share and sync files – both internally and externally. While you want to enable collaboration, data security should always be the priority. If it’s not, the risk of non-compliance and data breaches become a serious problem.

Thales SureDrop allows people to store, share and sync all their files in the Cloud or on premises with an enterprise-class solution and defence-grade security.

10. DATA IN MOTION ENCRYPTION

Establish high performance, end-to-end encryption in Layer 2 and IP networks

·      Network Encryptors

·      Virtual High-Speed Encryption

·      Network Encryptor Management Platforms

Ensuring compliance with stringent mandates using Thales products certified to global standards like:

·      FIPS 140-2

·      FIPS 140-3

·      Common Criteria

·      NIST

·      PCI-DSS

·      PCI-PIN

Ascertia delivers digital trust products and services globally for Enterprises, Governments and Trust Service Providers. Ascertia solutions enable digital business processes which are fundamentally underpinned by digital trust to ensure that identities are proven, and business transactions are both authentic and trustworthy.

Ascertia’s digital signature platform and PKI products deliver digital trust across people, devices, data, and documents. At the heart of their ecosystem is a wide-reaching customer base, 100+ expert partners and integrators which have been delivering Ascertia products, cloud services and apps since 2001. Ascertia Products include:


1.     ELECTRONIC SIGNATURES


·      Electronic Signatures and Document Workflow

·      Remote Signature

·      Cloud Signature

·      Automated Bulk eSealing for Documents

·      Signing and Authorising from a Mobile Device

·      eID Validation & eSignature Verification


2.     PKI PRODUCTS & TRUST SERVICES


·      PKI – Public Key Infrastructure

·      Certificate Issuance and PKI Management

·      Online Real Time Certificate Validation

·      Certificate Validation for Complex Multi-PKI’s

·      Timestamping of Documents and Data

·      Evidence Archiving for Long Term Preservation

·      Long Term Document Archiving


3.     DIGITAL IDENTITY


·      Digital Identity & Registration

·      ePassport ICAO Border Solution

·      Trusted Onboarding Platform (TOP)

·      Certificate Lifecycle Management


All great business relationships are based on trust! Triber come to Data Protection Services to provide their Digital Trust. Triber use Signing Hub by Ascertia to enable the end to end Digital Processes for their Tendering Platform. This is a business relationship quite literally based on trust!