Thales Trusted Cyber Technologies   Contact Us | Careers

eBook: Five Things to Consider when Choosing a DSPM Solution

dspm-ebook-tn

The modern enterprise has become a sprawling ecosystem of cloud services, data lakes, third-party integrations, and AI-infused applications. With this...

Read More

Solution Brief: Data Security Posture Management

dspm-sb-tn

The emphasis on DSPM reflects a broader shift in data security from perimeter-based defenses to data-centric approaches. As data continues to prolifer...

Read More

White Paper: Securing the Blind Spot: Unstructured Data Risk and Thales File Activity Monitoring

fam-wp-tn

Unstructured data—everything from Office documents to chat logs, Gen AI outputs, and medical images—now accounts for roughly 80 – 90 % of enterprise i...

Read More

Product Brief: CipherTrust Secrets Management

secrets-mgmt-tn

CipherTrust Secrets Management (CSM) is a state-ofthe- art Secrets Management solution, powered by the Akeyless Vault Platform, which protects and aut...

Read More

Solution Brief: Thales TCT Post-Quantum Cryptography Implementation

quantun-sb-tn

Download this solution brief to learn about Thales TCT’s Post-Quantum Cryptography Implementation.

Read More

White Paper: Protect LLMs with CipherTrust Transparent Encryption

llm-wp-tn

The exponential growth of data in digital environments has brought about an urgent need for robust protection strategies, particularly regarding sensi...

Read More

Solution Brief: Thales and Intel Collaborate to Enhance Trust in Confidential Computing By Enabling End-to-End Data Protection

intel-sb-tn

Learn more about Thales and Intel Collaborate to Enhance Trust in Confidential Computing By Enabling End-to-End Data Protection

Read More

Solution Brief: Securely Share CUI, SBU, and Secret Data with Coalition Partners with Thales TCT CipherTrust Data Security Platform

share-data-tn

Military operations often require unique, situational data to be shared between the U.S. and its coalition partners. Department of Defense (DoD) Zero ...

Read More

White Paper: How to Choose a Secrets Management Solution

sm-wp-tn

Modern IT environments are powered by an exponentially growing number of secrets. As organizations adopt cloud computing, containers, microservices an...

Read More

Solution Brief: CipherTrust Cloud Key Management for Oracle Cloud Infrastructure

oracle-sb-tn

Learn more about CipherTrust Cloud Key Management for Oracle Cloud Infrastructure.

Read More