Thales Trusted Cyber Technologies   Contact Us | Careers

CTO Sessions Webcast: A Guide to BYOK and HYOK for AWS, Azure, Google, Oracle and More

_cloud23-webinar-tn

Cloud Security Alliance best practices require that keys be stored and managed outside of the cloud service provider and the associated encryption ope...

Read More

CTO Sessions On Demand: Protecting Your Data in Their Cloud

web-tn-cloud-webinar

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...

Read More

Solution Brief: Best Security Practices for milCloud Data Migration

milcloud-tn

Securing data in the cloud properly requires that data owners own—and can prove that they own—their data, from inception to deletion. That means that ...

Read More

White Paper: Best Practices for Secure Cloud Migration

best-pract-secure-cloud-migration-wp-tn

This white paper is intended to aid readers in forming a cloud security strategy and data migration plane when adopting public cloud services. Please ...

Read More

White Paper: Best Practices for Cloud Data Protection and Key Management

cloud-key-mgmt-wp-tn

This paper describes security best practices for protecting sensitive data in the public cloud and explains concepts such as BYOK, HYOK, key brokering...

Read More

Advanced data protection for AWS S3 with CipherTrust Transparent Encryption Solution Brief

solution-brief-icon

To fully secure data in an untrusted and multi-tenant cloud environment, organizations must secure sensitive data and maintain complete governance and...

Read More

Avoiding Amazon S3 Data Leaks with Scalable Encryption and Access Controls Solution Brief

aws-data-leaks-wp-2

To fully secure data in an untrusted and multi-tenant cloud environment, organizations must maintain complete governance and control of their data. Th...

Read More