Thales Trusted Cyber Technologies   Contact Us | Careers

White Paper: The Importance of KMIP Standard for Centralized Key Management


Today, protecting sensitive data is a fundamental requirement in virtually every business. What’s also nearly universal is this: operations and securi...

Read More

White Paper: The Case for Centralized Multicloud Encryption Key Management


Is the glass half-full or half-empty? We’ve been publishing the Data Threat Report, and some form of the above statistics, for many years. From the op...

Read More

White Paper: The Key Pillars for Protecting Sensitive Data in Any Organization


This white paper outlines the challenges of data security in this age of data proliferation. It also provides strategies to discover and classify your...

Read More

White Paper: Securing the Keys to the Kingdom with Splunk and Thales


This paper examines the use of Splunk as the platform to collect and index machine data from virtually any source, regardless of its location. Then, w...

Read More

White Paper: Key Management


This white paper looks back at the evolution of encryption and key management systems, and examines the key challenges faced by IT teams around encryp...

Read More

Industry Insight: Supply Chain Risk Management


Supply chain risk management (SCRM) has long been a key element of the manufacturing process, but as technology advances, the risk management challeng...

Read More

White Paper: Splunk and Thales Industry Standard Protection for Your Log Data


In this paper, we will examine how CipherTrust Transparent Encryption from Thales secures the Splunk log repositories and databases. Then, we will sho...

Read More

Research Study: Security Weaknesses in Data in Motion Identified in Cybersecurity Survey


In today’s environment of exponential growth in the volumes of data in motion over networks, increasingly sophisticated and state sponsored cybercrime...

Read More

White Paper: Securing SD-WAN


IT networks are growing larger and becoming more widely dispersed. With endpoints stretching across multiple sites, national borders and remote locati...

Read More

White Paper: Securing Network-Attached HSMs


In the security world, the phrase ‘secure network’ is often viewed as an oxymoron; experience has demonstrated that once a device is connected to a ne...

Read More