Thales Trusted Cyber Technologies   Contact Us | Careers

Luna Tablet HSM Product Brief

tablet-hsm-pb-tn

The Luna T-Series Tablet HSM is a small form factor HSM that is widely used by government agencies to protect data, applications, and digital identiti...

Read More

White Paper: Quantum Resistant Code Signing Secured by Hardware Security Modules

lms-wp-tn

Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant...

Read More

CTO Sessions Webcast On Demand: HSM Boot Camp – A Guide to HSM Deployments from the Core to the Cloud to the Edge

web-tn- hsm-boot-camp-webinar

Thales TCT’s Luna T-Series Hardware Security Modules (HSMs) can be deployed either in the cloud as-a-service, on-premises, or across hybrid environmen...

Read More

CTO Sessions Webcast On Demand: Building a Root of Trust in How to Secure the Most Sensitive Data

web-tn-hsm-webinar-ondemand- social

Watch a replay of this webinar to learn: Secure critical data and digital identities Support a variety of well-known and emerging cybersecurity use c...

Read More

Luna as a Service Solution Brief

solution-brief-icon

Learn more about Luna as a Service

Read More

On Demand Webinar: Building a Root of Trust to Secure the Most Sensitive Data

web-tn-rot

Government agencies’ digital transformation has vastly increased the complexity of security. Technologies such as cloud computing, AI, IoT, analytics,...

Read More

Quantum Enhanced Keys Solution Brief

solution-brief-icon

Learn more about Quantum Enhanced Keys.

Read More

Thales TCT Luna HSMs for Commercial Solutions for Classified (CSfC) Solution Brief

solution-brief-icon

With a long history of securing the private key of Certified Authorities, HSMs are a perfect fit into every CSfC solution that uses CAs. Use of an HSM...

Read More

White Paper: Securing Network-Attached HSMs

securing-netowrk-hsm-wp-tn

In the security world, the phrase ‘secure network’ is often viewed as an oxymoron; experience has demonstrated that once a device is connected to a ne...

Read More

White Paper: Roots of Trust

root-of-trust-wp-tn

The term Root of Trust (RoT) is commonly used in information security circles, but what does it mean? Why do we care? How does it apply to cryptograph...

Read More