Thales Trusted Cyber Technologies   Contact Us | Careers

eBook: Thales TCT Solutions for CISA Zero Trust Maturity Model 2.0

zt-ebook-tn

The Cybersecurity & Infrastructure Security Agency (CISA) released its Zero Trust Maturity Model Version 2.0 in April 2023. CISA states that “the...

Read More

White Paper: WAAP Buyers Guide

waap-buyers-guide-wp-tn

Applications have become mission-critical for organizations looking to drive rapid growth. They help facilitate an organization’s influence around the...

Read More

White Paper: Quantum Resistant Code Signing Secured by Hardware Security Modules

lms-wp-tn

Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant...

Read More

White Paper: How to Choose a Secrets Management Solution

sm-wp-tn

Modern IT environments are powered by an exponentially growing number of secrets. As organizations adopt cloud computing, containers, microservices an...

Read More

White Paper: Understanding Data Security for SAP

sap-understanding-data-security-wp-tn

SAP provides the operational lifeblood of many enterprises with SAP modules providing essential functions that run the gamut from enterprise resource ...

Read More

White Paper: Protecting sensitive data in and around SAP HANA

sap-wp-1-tn

On the surface, encrypting the database instance using SAP native encryption would appear to be sufficient to protect data at rest within the SAP HANA...

Read More

White Paper: The Importance of KMIP Standard for Centralized Key Management

kmip-wp-tn

Today, protecting sensitive data is a fundamental requirement in virtually every business. What’s also nearly universal is this: operations and securi...

Read More

White Paper: The Case for Centralized Multicloud Encryption Key Management

multicloud-wp-tn

Cloud consumers face a choice: using the cloud service provider’s (CSP) encryption or bringing their own encryption. Cloud providers make their native...

Read More

White Paper: The Key Pillars for Protecting Sensitive Data in Any Organization

key-pillars-wp-tn

This white paper outlines the challenges of data security in this age of data proliferation. It also provides strategies to discover and classify your...

Read More

White Paper: Securing the Keys to the Kingdom with Splunk and Thales

splunk-wp-tn

This paper examines the use of Splunk as the platform to collect and index machine data from virtually any source, regardless of its location. Then, w...

Read More