{"id":6572,"date":"2022-09-26T15:12:21","date_gmt":"2022-09-26T15:12:21","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=6572"},"modified":"2022-09-26T15:12:21","modified_gmt":"2022-09-26T15:12:21","slug":"leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/","title":{"rendered":"Leveraging SafeNet Trusted Access and CipherTrust Transparent Encryption to Prevent Ransomware"},"content":{"rendered":"<p><iframe width=\"560\" height=\"315\" src=\"\/\/www.youtube.com\/embed\/qjyBpvyiSfM\" frameborder=\"0\" allowfullscreen><\/iframe><br \/>\n    As you probably know, most ransomware attacks typically come through privileged accounts. Watch this walkthrough video to see how Thales&#8217; SafeNet Trusted Access Identity and Access Management solution and CipherTrust Transparent Encryption work together to protect RDP and Windows logon access with MFA and eliminate privilege escalation with encryption and access controls. <\/p>\n<p>When you are ready to put up a more robust defense against ransomware attacks, call on  <\/p>\n<p>Abrahams Consulting LLC to get started with Thales.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s probably no surprise to you that most #ransomware attacks come through privileged access accounts. Fortunately, @Thales has a sure-fire solution to prevent unauthorized access, privileged or otherwise. Watch \ud83d\udc47<\/p>\n","protected":false},"author":2,"featured_media":6571,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1138,1136],"tags":[],"class_list":["post-6572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciphertrust","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Leveraging SafeNet Trusted Access and CipherTrust Transparent Encryption to Prevent Ransomware - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Leveraging SafeNet Trusted Access and CipherTrust Transparent Encryption to Prevent Ransomware - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"It&#039;s probably no surprise to you that most #ransomware attacks come through privileged access accounts. Fortunately, @Thales has a sure-fire solution to prevent unauthorized access, privileged or otherwise. Watch \ud83d\udc47\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-26T15:12:21+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Leveraging SafeNet Trusted Access and CipherTrust Transparent Encryption to Prevent Ransomware\",\"datePublished\":\"2022-09-26T15:12:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/\"},\"wordCount\":87,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/hqdefault-1.jpg\",\"articleSection\":[\"CipherTrust\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/\",\"name\":\"Leveraging SafeNet Trusted Access and CipherTrust Transparent Encryption to Prevent Ransomware - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/hqdefault-1.jpg\",\"datePublished\":\"2022-09-26T15:12:21+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/hqdefault-1.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/hqdefault-1.jpg\",\"width\":480,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Leveraging SafeNet Trusted Access and CipherTrust Transparent Encryption to Prevent Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Leveraging SafeNet Trusted Access and CipherTrust Transparent Encryption to Prevent Ransomware - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Leveraging SafeNet Trusted Access and CipherTrust Transparent Encryption to Prevent Ransomware - TechTonic Times","og_description":"It's probably no surprise to you that most #ransomware attacks come through privileged access accounts. Fortunately, @Thales has a sure-fire solution to prevent unauthorized access, privileged or otherwise. Watch \ud83d\udc47","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/","og_site_name":"TechTonic Times","article_published_time":"2022-09-26T15:12:21+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Leveraging SafeNet Trusted Access and CipherTrust Transparent Encryption to Prevent Ransomware","datePublished":"2022-09-26T15:12:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/"},"wordCount":87,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/hqdefault-1.jpg","articleSection":["CipherTrust","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/","name":"Leveraging SafeNet Trusted Access and CipherTrust Transparent Encryption to Prevent Ransomware - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/hqdefault-1.jpg","datePublished":"2022-09-26T15:12:21+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/hqdefault-1.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/09\/hqdefault-1.jpg","width":480,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/leveraging-safenet-trusted-access-and-ciphertrust-transparent-encryption-to-prevent-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Leveraging SafeNet Trusted Access and CipherTrust Transparent Encryption to Prevent Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=6572"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6572\/revisions"}],"predecessor-version":[{"id":6573,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6572\/revisions\/6573"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/6571"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=6572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=6572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=6572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}