Thales Trusted Cyber Technologies   Contact Us | Careers

eBook: Thales TCT Solutions for CISA Zero Trust Maturity Model 2.0


The Cybersecurity & Infrastructure Security Agency (CISA) released its Zero Trust Maturity Model Version 2.0 in April 2023. CISA states that “the...

Read More

White Paper: WAAP Buyers Guide


Applications have become mission-critical for organizations looking to drive rapid growth. They help facilitate an organization’s influence around the...

Read More

White Paper: Quantum Resistant Code Signing Secured by Hardware Security Modules


Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant...

Read More

White Paper: How to Choose a Secrets Management Solution


Modern IT environments are powered by an exponentially growing number of secrets. As organizations adopt cloud computing, containers, microservices an...

Read More

White Paper: Understanding Data Security for SAP


SAP provides the operational lifeblood of many enterprises with SAP modules providing essential functions that run the gamut from enterprise resource ...

Read More

White Paper: Protecting sensitive data in and around SAP HANA


On the surface, encrypting the database instance using SAP native encryption would appear to be sufficient to protect data at rest within the SAP HANA...

Read More

White Paper: The Importance of KMIP Standard for Centralized Key Management


Today, protecting sensitive data is a fundamental requirement in virtually every business. What’s also nearly universal is this: operations and securi...

Read More

White Paper: The Case for Centralized Multicloud Encryption Key Management


Cloud consumers face a choice: using the cloud service provider’s (CSP) encryption or bringing their own encryption. Cloud providers make their native...

Read More

White Paper: The Key Pillars for Protecting Sensitive Data in Any Organization


This white paper outlines the challenges of data security in this age of data proliferation. It also provides strategies to discover and classify your...

Read More

White Paper: Securing the Keys to the Kingdom with Splunk and Thales


This paper examines the use of Splunk as the platform to collect and index machine data from virtually any source, regardless of its location. Then, w...

Read More