Thales Trusted Cyber Technologies   Contact Us | Careers

Solution Brief: Thales TCT Post-Quantum Cryptography Implementation

quantun-sb-tn

Download this solution brief to learn about Thales TCT’s Post-Quantum Cryptography Implementation.

Read More

White Paper: Protect LLMs with CipherTrust Transparent Encryption

llm-wp-tn

The exponential growth of data in digital environments has brought about an urgent need for robust protection strategies, particularly regarding sensi...

Read More

Solution Brief: Thales and Intel Collaborate to Enhance Trust in Confidential Computing By Enabling End-to-End Data Protection

intel-sb-tn

Learn more about Thales and Intel Collaborate to Enhance Trust in Confidential Computing By Enabling End-to-End Data Protection

Read More

Solution Brief: Securely Share CUI, SBU, and Secret Data with Coalition Partners with Thales TCT CipherTrust Data Security Platform

share-data-tn

Military operations often require unique, situational data to be shared between the U.S. and its coalition partners. Department of Defense (DoD) Zero ...

Read More

White Paper: How to Choose a Secrets Management Solution

sm-wp-tn

Modern IT environments are powered by an exponentially growing number of secrets. As organizations adopt cloud computing, containers, microservices an...

Read More

Solution Brief: CipherTrust Cloud Key Management for Oracle Cloud Infrastructure

oracle-sb-tn

Learn more about CipherTrust Cloud Key Management for Oracle Cloud Infrastructure.

Read More

Solution Brief: Top 10 Reasons to Migrate to the CipherTrust Data Security Platform For Vormetric Customers

vormetirc-to-10

You relied on the Vormetric DSM platform over many years to provide centralized key management and data protection throughout your enterprise — on pre...

Read More

Solution Brief: Top 10 Reasons to Migrate to the CipherTrust Data Security Platform For KeySecure Customers

keysecure-top-10-tn

You relied on the KeySecure platform over many years to provide centralized key management and data protection throughout your enterprise. To stay a s...

Read More

White Paper: Understanding Data Security for SAP

sap-understanding-data-security-wp-tn

SAP provides the operational lifeblood of many enterprises with SAP modules providing essential functions that run the gamut from enterprise resource ...

Read More

White Paper: Protecting sensitive data in and around SAP HANA

sap-wp-1-tn

On the surface, encrypting the database instance using SAP native encryption would appear to be sufficient to protect data at rest within the SAP HANA...

Read More