Thales Trusted Cyber Technologies   Contact Us | Careers

White Paper: Understanding Data Security for SAP

sap-understanding-data-security-wp-tn

SAP provides the operational lifeblood of many enterprises with SAP modules providing essential functions that run the gamut from enterprise resource ...

Read More

White Paper: Protecting sensitive data in and around SAP HANA

sap-wp-1-tn

On the surface, encrypting the database instance using SAP native encryption would appear to be sufficient to protect data at rest within the SAP HANA...

Read More

CipherTrust Data Security Platform Product Brief

product-brief-icon

Learn more about CipherTrust Data Security Platform.

Read More

CTO Sessions: Top 10 Reasons to Protect Your Agency with CipherTrust Data Security Platform

Thales TCT webinar

In this installment of Thales TCT’s CTO Sessions Webcast Series, our Deputy CTO shared the Top 10 Reasons to Protect your Agency with CipherTrus...

Read More

CTO Sessions On Demand: Protecting Your Data in Their Cloud (On Demand Webcast)

Thales TCT webinar

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...

Read More

CipherTrust Cloud Key Management Solutions for Amazon Web Services Solution Brief

solution-brief-icon

Learn More About CipherTrust Cloud Key Management Solutions for Amazon Web Services

Read More

Multi-Factor Authentication for CipherTrust Transparent Encryption

solution-brief-icon

Learn more about Multi-Factor Authentication for CipherTrust Transparent Encryption

Read More

CipherTrust Transparent Encryption for Teradata Vantage Solution Brief

solution-brief-icon

Learn More About CipherTrust Transparent Encryption for Teradata Vantage

Read More

CipherTrust Data Security Platform Self Guided Tour

Thales TCT Video (1)

Read More

On Demand Webinar: The Key Pillars for Protecting Sensitive Data

Thales TCT webinar

During this webinar, attendees learned how to develop a three-point strategy for protecting sensitive data in their organization. Attendees also learn...

Read More