Thales Trusted Cyber Technologies   Contact Us | Careers

White Paper: Securing the Keys to the Kingdom with Splunk and Thales

splunk-wp-tn

This paper examines the use of Splunk as the platform to collect and index machine data from virtually any source, regardless of its location. Then, w...

Read More

White Paper: Key Management

km-wp-tn

This white paper looks back at the evolution of encryption and key management systems, and examines the key challenges faced by IT teams around encryp...

Read More

Industry Insight: Supply Chain Risk Management

solution-brief-icon

Supply chain risk management (SCRM) has long been a key element of the manufacturing process, but as technology advances, the risk management challeng...

Read More

White Paper: Splunk and Thales Industry Standard Protection for Your Log Data

solunk-wp-tn

In this paper, we will examine how CipherTrust Transparent Encryption from Thales secures the Splunk log repositories and databases. Then, we will sho...

Read More

Research Study: Security Weaknesses in Data in Motion Identified in Cybersecurity Survey

hse-study-tn

In today’s environment of exponential growth in the volumes of data in motion over networks, increasingly sophisticated and state sponsored cybercrime...

Read More

White Paper: Securing SD-WAN

sd-wan-wp-tn

IT networks are growing larger and becoming more widely dispersed. With endpoints stretching across multiple sites, national borders and remote locati...

Read More

White Paper: Securing Network-Attached HSMs

securing-netowrk-hsm-wp-tn

In the security world, the phrase ‘secure network’ is often viewed as an oxymoron; experience has demonstrated that once a device is connected to a ne...

Read More

White Paper: Roots of Trust

root-of-trust-wp-tn

The term Root of Trust (RoT) is commonly used in information security circles, but what does it mean? Why do we care? How does it apply to cryptograph...

Read More

White Paper: Prevent Ransomware Attacks from Disrupting Your Agency with the CipherTrust Platform

ransomware-wp-tn

This white paper helps you understand the anatomy of ransomware attacks and explores the solutions available in the market today to defend against suc...

Read More

White Paper: Own and Manage Your Encryption Keys

own-manager-wp-tn

For agency leaders and IT administrators responsible for data security—from the most basic statistics to highly sensitive documents— understanding the...

Read More