Thales Trusted Cyber Technologies   Contact Us | Careers

CTO Sessions On Demand: Protecting Your Data in Their Cloud

web-tn-cloud-webinar

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...

Read More

CTO Sessions On Demand: Are You Quantum Ready?

web-tn-csft-quantum-webinar

Despite large-scale quantum computing being several years away from being a practical reality, federal government experts are deservedly concerned abo...

Read More

CTO Sessions On Demand: Data Protection at the Edge

web-tn-edge-webinar-social

Core computing functionality, commonly found in data centers and in the cloud, is also being deployed at the edge — data protection capabilities must ...

Read More

On Demand Webinar: Rapid Protection for Teradata Database and Big Data Environments

web-tn-teradata

Teradata databases and big data analytics enable agencies to leverage information to fuel improved decisions, services, and results. However, Teradata...

Read More

On Demand Webinar: No-Excuse Defenses Against Supply Chain Attacks

web-tn-sypplychain

Files from the web are network assassins. Here are no-excuse defenses. As of 2018, supply chain attacks have increased 78%. By infiltrating a supply c...

Read More

On Demand Webinar: Best Practices for Data Visibility

web-tn-data-visibiity

To recap, during this webinar attendees learned how to develop a data classification strategy that enables you to get a clear understanding of what se...

Read More

On Demand Webinar: Best Practices for Cloud Data Protection

web-tn-cloud-dp

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...

Read More

On Demand Webinar – Intelligence Community: Cyber Security is National Security

web-tn-intel-community

In January, the National Security Agency issued its first Cybersecurity Year in Review, detailing the agency’s progress in preventing and removing thr...

Read More

On Demand Webinar: The Key Pillars for Protecting Sensitive Data

web-tn-intel-community (1)

During this webinar, attendees learned how to develop a three-point strategy for protecting sensitive data in their organization. Attendees also learn...

Read More

On Demand Webinar: Fireside Chat: Data Protection for Multi-Domain Operations

web-tn-fireside-chat

The U.S. Military generates data at unprecedented rates, all the time, and in various locations from core data centers to the cloud to the tactical ed...

Read More