Thales Trusted Cyber Technologies   Contact Us | Careers

Zero Trust: Top 5 Tips

zt-top-5-tn

The rise of cyber-attacks indicates the obvious—the current approach to security isn’t working. Enter Zero Trust. There is not a single blueprint for ...

Read More

The Dual Faces of Quantum Computing: Opportunities and Threats in National Security

dodiis-iig

This interview originally appeared on Innovation in Government from DoDIIS In an engaging interview with Francis Rose, Gina Scinta, Deputy CTO of Thal...

Read More

Video: Thales High Speed Encryptors Demo

Thales TCT Video (1)

Video Courtesy of THales Cloud Protection & Licensing

Read More

Video: Securing 5G Private Networks with Thales High Speed Encryptors

Thales TCT Video (1)

Video Courtesy of Thales Cloud Protection and Licensing

Read More

FCW/NetGov’s Zero Trust Workshop Replay: Zero Trust: Buzzword to Brass Tacks

zt-work-shop-video -23-tn

Watch a replay of Thales TCT’s PM, Evan Pelecky, presentation at FCW/NetGov’s Zero Trust Workshop. https://media.performedia.com/2023/gov...

Read More

Thales TCT: Protecting the Most Vital Data from the Core to the Cloud to the Field

Thales TCT Video (1)

True data protection extends beyond the core. Agencies need to apply the same level of protection deployed at the core to the cloud and to remote or d...

Read More

Luna Credential System Video

Thales TCT Video (1)

The Luna Credential System (LCS) introduces a new, patent pending,  approach to multi-factor authentication by maintaining user credentials in a centr...

Read More

Luna Credential System & UiPath RPA: Addressing Federal CAC/PIV Requirements with PKI Authentication

Thales TCT Video (1)

Traditional multi-factor authentication introduces roadblocks to technologies like Robotic Process Automation (RPA). The OMB Memo M-19-17 outlines a p...

Read More

How to Integrate UiPath with Thales TCT’s Luna Credential System

Thales TCT Video (1)

D’Nan from Thales TCT demonstrates how to integrate Thales TCT’s Luna Credential System with UiPath to provide hardware-protected PKI cred...

Read More

Product Demo: Protecting AWS S3 Buckets: AWS KMS vs Transparent Encryption COS S3 from Thales

Thales TCT Video (1)

In this video, Jermaine from Thales TCT demonstrates protecting AWS S3 buckets with AWS KMS vs Transparent Encryption Cloud Object Storage S3 from Tha...

Read More