Thales Trusted Cyber Technologies   Contact Us | Careers

White Paper: Data Protection at the Edge

dp-at-edge-wp-tn

True data protection extends to edge. Agencies need to apply the same level of security deployed in the core and the cloud to edge environments. Edge-...

Read More

White Paper: Top Five Ways to Address Requirements in National Security Memo on Improving Cybersecurity of National Security Systems

nsm-wp-tn

This white paper discusses best security practices associated with the aforementioned key components of the NSM. It additionally details how to implem...

Read More

White Paper: Best Practices for Cryptographic Key Management

best-practices-for-km-wp-tn

The proliferation of cloud applications, mobile devices and virtualization have created many shared environments and an unlimited number of endpoints,...

Read More

White Paper: Secure Multicast Transmission

secure-multicast-transmission-white-paper-PDF_page-1

This white paper discusses the encryption of multicast data traffic at Layer 2 to provide secure data transmission through high-speed networks. Thales...

Read More