Thales Trusted Cyber Technologies   Contact Us | Careers

White Paper: Understanding Data Security for SAP

sap-understanding-data-security-wp-tn

SAP provides the operational lifeblood of many enterprises with SAP modules providing essential functions that run the gamut from enterprise resource ...

Read More

White Paper: Protecting sensitive data in and around SAP HANA

sap-wp-1-tn

On the surface, encrypting the database instance using SAP native encryption would appear to be sufficient to protect data at rest within the SAP HANA...

Read More

White Paper: The Importance of KMIP Standard for Centralized Key Management

kmip-wp-tn

Today, protecting sensitive data is a fundamental requirement in virtually every business. What’s also nearly universal is this: operations and securi...

Read More

White Paper: The Case for Centralized Multicloud Encryption Key Management

multicloud-wp-tn

Is the glass half-full or half-empty? We’ve been publishing the Data Threat Report, and some form of the above statistics, for many years. From the op...

Read More

White Paper: The Key Pillars for Protecting Sensitive Data in Any Organization

key-pillars-wp-tn

This white paper outlines the challenges of data security in this age of data proliferation. It also provides strategies to discover and classify your...

Read More

White Paper: Securing the Keys to the Kingdom with Splunk and Thales

splunk-wp-tn

This paper examines the use of Splunk as the platform to collect and index machine data from virtually any source, regardless of its location. Then, w...

Read More

White Paper: Key Management

km-wp-tn

This white paper looks back at the evolution of encryption and key management systems, and examines the key challenges faced by IT teams around encryp...

Read More

Industry Insight: Supply Chain Risk Management

solution-brief-icon

Supply chain risk management (SCRM) has long been a key element of the manufacturing process, but as technology advances, the risk management challeng...

Read More

White Paper: Splunk and Thales Industry Standard Protection for Your Log Data

solunk-wp-tn

In this paper, we will examine how CipherTrust Transparent Encryption from Thales secures the Splunk log repositories and databases. Then, we will sho...

Read More

Research Study: Security Weaknesses in Data in Motion Identified in Cybersecurity Survey

hse-study-tn

In today’s environment of exponential growth in the volumes of data in motion over networks, increasingly sophisticated and state sponsored cybercrime...

Read More