{"id":5840,"date":"2021-10-06T13:02:24","date_gmt":"2021-10-06T13:02:24","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=5840"},"modified":"2021-10-06T13:02:24","modified_gmt":"2021-10-06T13:02:24","slug":"ciphertrust-data-security-platform","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/","title":{"rendered":"CipherTrust Data Security Platform"},"content":{"rendered":"<p>This eBrochure explains that the CipherTrust Data Security Platform integrates data discovery, classification, data protection, and granular access controls, all with centralized key management\u2014removing data security complexity, accelerating time to compliance, and securing cloud migration. Please contact Abrahams Consulting LLC for more information about the CipherTrust Data Security Platform from Thales.<\/p>\n<p><a href=\"https:\/\/stuf.in\/b7hlry\" target=\"_blank\" rel=\"noopener\">View: CipherTrust Data Security Platform<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Get integrated data discovery, classification, data protection, and granular access controls\u2014all with centralized key management. Read this #Thales eBrochure, courtesy of Abrahams Consulting LLC, to learn more about the CipherTrust Data Security Platform.<\/p>\n","protected":false},"author":2,"featured_media":5839,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1138,14,1144,3,1136],"tags":[],"class_list":["post-5840","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciphertrust","category-cloud","category-cloud-migration","category-data-security","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CipherTrust Data Security Platform - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CipherTrust Data Security Platform - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Get integrated data discovery, classification, data protection, and granular access controls\u2014all with centralized key management. Read this #Thales eBrochure, courtesy of Abrahams Consulting LLC, to learn more about the CipherTrust Data Security Platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-06T13:02:24+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"CipherTrust Data Security Platform\",\"datePublished\":\"2021-10-06T13:02:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/\"},\"wordCount\":61,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/10\/CipherTrust_Data_Security_Platform_ds_A4_0_thumb.jpg\",\"articleSection\":[\"CipherTrust\",\"Cloud\",\"Cloud Migration\",\"Data Security\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/\",\"name\":\"CipherTrust Data Security Platform - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/10\/CipherTrust_Data_Security_Platform_ds_A4_0_thumb.jpg\",\"datePublished\":\"2021-10-06T13:02:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/10\/CipherTrust_Data_Security_Platform_ds_A4_0_thumb.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/10\/CipherTrust_Data_Security_Platform_ds_A4_0_thumb.jpg\",\"width\":600,\"height\":776},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CipherTrust Data Security Platform\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CipherTrust Data Security Platform - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/","og_locale":"en_US","og_type":"article","og_title":"CipherTrust Data Security Platform - TechTonic Times","og_description":"Get integrated data discovery, classification, data protection, and granular access controls\u2014all with centralized key management. Read this #Thales eBrochure, courtesy of Abrahams Consulting LLC, to learn more about the CipherTrust Data Security Platform.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/","og_site_name":"TechTonic Times","article_published_time":"2021-10-06T13:02:24+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"CipherTrust Data Security Platform","datePublished":"2021-10-06T13:02:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/"},"wordCount":61,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/10\/CipherTrust_Data_Security_Platform_ds_A4_0_thumb.jpg","articleSection":["CipherTrust","Cloud","Cloud Migration","Data Security","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/","name":"CipherTrust Data Security Platform - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/10\/CipherTrust_Data_Security_Platform_ds_A4_0_thumb.jpg","datePublished":"2021-10-06T13:02:24+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/10\/CipherTrust_Data_Security_Platform_ds_A4_0_thumb.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/10\/CipherTrust_Data_Security_Platform_ds_A4_0_thumb.jpg","width":600,"height":776},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ciphertrust-data-security-platform\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CipherTrust Data Security Platform"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/5840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=5840"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/5840\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/5839"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=5840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=5840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=5840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}