Thales Trusted Cyber Technologies   Contact Us | Careers

Product Demo: Protecting AWS S3 Buckets: AWS KMS vs Transparent Encryption COS S3 from Thales

Thales TCT Video (1)

In this video, Jermaine from Thales TCT demonstrates protecting AWS S3 buckets with AWS KMS vs Transparent Encryption Cloud Object Storage S3 from Tha...

Read More

On Demand Webinar: Best Practices for Cloud Data Protection

Thales TCT webinar

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...

Read More

White Paper: The Case for Centralized Multicloud Encryption Key Management


Is the glass half-full or half-empty? We’ve been publishing the Data Threat Report, and some form of the above statistics, for many years. From the op...

Read More

Microsoft Azure Advanced Data Protection Solution Brief


Learn how Thales TCT integrates with Microsoft Azure for Advanced Data Protection

Read More

Best Security Practices for milCloud Data Migration Solution Brief


Securing data in the cloud properly requires that data owners own—and can prove that they own—their data, from inception to deletion. That means that ...

Read More

White Paper: Top Five Ways to Address Requirements in National Security Memo on Improving Cybersecurity of National Security Systems


This white paper discusses best security practices associated with the aforementioned key components of the NSM. It additionally details how to implem...

Read More

CipherTrust Cloud Key Manager Product Brief


Learn more about CipherTrust Cloud Key Manager.

Read More

White Paper: Best Practices for Implementing the White House Executive Order on Improving the Nation’s Cybersecurity Infrastructure


The Executive Order underscores the importance of protecting the Federal Government’s “computer systems, whether they are cloud-based, on-premises, or...

Read More

White Paper: Best Practices for Secure Cloud Migration


This white paper is intended to aid readers in forming a cloud security strategy and data migration plane when adopting public cloud services. Please ...

Read More

White Paper: Best Practices for Cloud Data Protection and Key Management


This paper describes security best practices for protecting sensitive data in the public cloud and explains concepts such as BYOK, HYOK, key brokering...

Read More