Thales Trusted Cyber Technologies   Contact Us | Careers

Infographic: Five key benefits of enhancing IBM Guardium with Imperva Data Security Fabric

guardium-infographic-tn

Download this infographic to learn how Imperva Data Security Fabric integrates with your existing Guardium deployment to do more with less effort and ...

Read More

Data Sheet: Modernize Guardium with Imperva Data Security Fabric

guardium-ds-tn

Contemporary demands for data security and compliance have likely pushed your Guardium Database Activity Monitoring (DAM) program to its limits. Imper...

Read More

CTO Sessions Webcast: Thales TCT + Imperva Trusted End-to-End Data Security

Copy of 24-imperva-dsf-webcast-social

Ongoing government-wide zero trust implementations exemplify the fact that traditional end-point and perimeter-based security are not enough to protec...

Read More

Product Brief: Imperva Web Application Firewall Gateway

waf-gateway-pb-tn

Learn more about Imperva Web Application Firewall Gateway.

Read More

Solution Brief: WAAP Checklist

waap-checklist-tn

Learn about the essential capabilities of a Web Application Firewall and API Security Solution.

Read More

Product Brief: Imperva WAF Hardware Appliances

waf-hw-pb-tn

Learn more about Imperva WAF Hardware Appliances.

Read More

White Paper: WAAP Buyers Guide

waap-buyers-guide-wp-tn

Applications have become mission-critical for organizations looking to drive rapid growth. They help facilitate an organization’s influence around the...

Read More

White Paper: 10 Things Every Web Application Firewall Should Provide

waf-10-things-wp-tn

Because they are easily accessible and often serve as an entry point to valuable data, web applications are now—and always will be—a prime target for ...

Read More

Product Brief: Imperva Application Security

app-sec-pb-tn

Learn more about Imperva Application Security.

Read More

White Paper: Splunk Optimization by Imperva

splunk-optimization-imperva-wp-tn

Learn how Imperva Data Security Fabric reduces Splunk operational costs and improves data-centric security insights.

Read More