Thales Trusted Cyber Technologies   Contact Us | Careers

Product Brief: IDPrime 3930

3930-tn

SafeNet IDPrime smart cards are designed for PKI-based applications, and come with a SafeNet minidriver that offers perfect integration with native su...

Read More

Product Brief: IDPrime 940 and 940B

940-tn

SafeNet IDPrime smart cards are designed for PKI-based applications, and come with a SafeNet minidriver that offers perfect integration with native su...

Read More

Product Brief: IDPrime 3940

3940-tn

SafeNet IDPrime smart cards are designed for PKI-based applications, and come with a SafeNet minidriver that offers perfect integration with native su...

Read More

Product Brief: SafeNet OTP 111 and SafeNet OTP 112

otp111-tn

Learn more about SafeNet OTP 111 and SafeNet OTP 112.

Read More

Product Brief: Thales Fusion Authenticators

fusion-pb-tn

Download this product brief to learn more about Thales Fusion Authenticators.

Read More

Product Brief: IDCore 230/3230

idcore-pb-tn

Learn more about the IDCore 230/3230 java-based smart card.

Read More

Infographic: Top 6 Reasons for Choosing SafeNet eToken Fusion Series

fusion-infographic-tn-2

Download this infographic to learn the top 6 reasons for choosing SafeNet eToken Fusion Series.   Please enable JavaScript in your browser to com...

Read More

CTO Sessions On Demand Webcast: Everything You Need to Know About Phishing-Resistant MFA

mfa-webcast-replay-tn

Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold in an agency to steal data or launch ...

Read More

White Paper: Meeting U.S. Government requirements for phishing-resistant MFA

gov-requirements-mfa-wp-tn

Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold in an agency to steal data or launch ...

Read More

eBook: The Comprehensive Guide on Phishing-Resistant MFA, Passkeys and FIDO security keys.

phishing-resistant-mfa-ebook-tn

Phishing-resistant MFA is multi-factor authentication immune from attempts to compromise or subvert the authentication process, commonly achieved thro...

Read More