Thales Trusted Cyber Technologies   Contact Us | Careers

White Paper: WAAP Buyers Guide

waap-buyers-guide-wp-tn

Applications have become mission-critical for organizations looking to drive rapid growth. They help facilitate an organization’s influence around the...

Read More

White Paper: 10 Things Every Web Application Firewall Should Provide

waf-10-things-wp-tn

Because they are easily accessible and often serve as an entry point to valuable data, web applications are now—and always will be—a prime target for ...

Read More

White Paper: Splunk Optimization by Imperva

splunk-optimization-imperva-wp-tn

Learn how Imperva Data Security Fabric reduces Splunk operational costs and improves data-centric security insights.

Read More

White Paper: Quantum Resistant Code Signing Secured by Hardware Security Modules

lms-wp-tn

Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant...

Read More

White Paper: How to Choose a Secrets Management Solution

sm-wp-tn

Modern IT environments are powered by an exponentially growing number of secrets. As organizations adopt cloud computing, containers, microservices an...

Read More

White Paper: Meeting U.S. Government requirements for phishing-resistant MFA

gov-requirements-mfa-wp-tn

Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold in an agency to steal data or launch ...

Read More

eBook: The Comprehensive Guide on Phishing-Resistant MFA, Passkeys and FIDO security keys.

phishing-resistant-mfa-ebook-tn

Phishing-resistant MFA is multi-factor authentication immune from attempts to compromise or subvert the authentication process, commonly achieved thro...

Read More

White Paper: Understanding Data Security for SAP

sap-understanding-data-security-wp-tn

SAP provides the operational lifeblood of many enterprises with SAP modules providing essential functions that run the gamut from enterprise resource ...

Read More

White Paper: Protecting sensitive data in and around SAP HANA

sap-wp-1-tn

On the surface, encrypting the database instance using SAP native encryption would appear to be sufficient to protect data at rest within the SAP HANA...

Read More

White Paper: The Importance of KMIP Standard for Centralized Key Management

kmip-wp-tn

Today, protecting sensitive data is a fundamental requirement in virtually every business. What’s also nearly universal is this: operations and securi...

Read More