Thales Trusted Cyber Technologies   Contact Us | Careers

CTO Sessions On Demand: Data Protection at the Edge

web-tn-edge-webinar-social

Core computing functionality, commonly found in data centers and in the cloud, is also being deployed at the edge — data protection capabilities must ...

Read More

On Demand Webinar: Rapid Protection for Teradata Database and Big Data Environments

web-tn-teradata

Teradata databases and big data analytics enable agencies to leverage information to fuel improved decisions, services, and results. However, Teradata...

Read More

On Demand Webinar: No-Excuse Defenses Against Supply Chain Attacks

web-tn-sypplychain

Files from the web are network assassins. Here are no-excuse defenses. As of 2018, supply chain attacks have increased 78%. By infiltrating a supply c...

Read More

On Demand Webinar: Best Practices for Data Visibility

web-tn-data-visibiity

To recap, during this webinar attendees learned how to develop a data classification strategy that enables you to get a clear understanding of what se...

Read More

On Demand Webinar: Best Practices for Cloud Data Protection

web-tn-cloud-dp

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...

Read More

On Demand Webinar – Intelligence Community: Cyber Security is National Security

web-tn-intel-community

In January, the National Security Agency issued its first Cybersecurity Year in Review, detailing the agency’s progress in preventing and removing thr...

Read More

On Demand Webinar: The Key Pillars for Protecting Sensitive Data

web-tn-intel-community (1)

During this webinar, attendees learned how to develop a three-point strategy for protecting sensitive data in their organization. Attendees also learn...

Read More

On Demand Webinar: Fireside Chat: Data Protection for Multi-Domain Operations

web-tn-fireside-chat

The U.S. Military generates data at unprecedented rates, all the time, and in various locations from core data centers to the cloud to the tactical ed...

Read More

On Demand Webinar: Shifting the Mindset from “Breach Prevention” to “Acceptance”

web-tn-breach-acceptance

During this webinar, we discussed what agencies need to do before their networks are compromised. Discussion topics included: Tips for adopting zero ...

Read More

On Demand Webinar: Building a Root of Trust to Secure the Most Sensitive Data

web-tn-rot

Government agencies’ digital transformation has vastly increased the complexity of security. Technologies such as cloud computing, AI, IoT, analytics,...

Read More