Thales Trusted Cyber Technologies   Contact Us | Careers

White Paper: Protecting sensitive data in and around SAP HANA

sap-wp-1-tn

On the surface, encrypting the database instance using SAP native encryption would appear to be sufficient to protect data at rest within the SAP HANA...

Read More

White Paper: The Importance of KMIP Standard for Centralized Key Management

kmip-wp-tn

Today, protecting sensitive data is a fundamental requirement in virtually every business. What’s also nearly universal is this: operations and securi...

Read More

White Paper: The Case for Centralized Multicloud Encryption Key Management

multicloud-wp-tn

Cloud consumers face a choice: using the cloud service provider’s (CSP) encryption or bringing their own encryption. Cloud providers make their native...

Read More

White Paper: The Key Pillars for Protecting Sensitive Data in Any Organization

key-pillars-wp-tn

This white paper outlines the challenges of data security in this age of data proliferation. It also provides strategies to discover and classify your...

Read More

White Paper: Securing the Keys to the Kingdom with Splunk and Thales

splunk-wp-tn

This paper examines the use of Splunk as the platform to collect and index machine data from virtually any source, regardless of its location. Then, w...

Read More

Thales Trusted Cyber Technologies Solutions for Continuous Diagnostics and Mitigation DEFEND

cdm-tn

Learn About Thales Trusted Cyber Technologies Solutions for Continuous Diagnostics and Mitigation DEFEND

Read More

White Paper: Key Management

km-wp-tn

This white paper looks back at the evolution of encryption and key management systems, and examines the key challenges faced by IT teams around encryp...

Read More

White Paper: NIST Cybersecurity Framework and Ransomware Prevention Guidance Mapping

ransomware-solutions-wp

Thales Trusted Cyber Technologies (TCT) data security and access management solutions provide some of the most essential components of the cybersecuri...

Read More

White Paper: Thales TCT Solutions for CMMC

cmmc-wp-tn

The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense’s (DoD) newest verification mechanism designed to ensure that cyber...

Read More

Industry Insight: Supply Chain Risk Management

solution-brief-icon

Supply chain risk management (SCRM) has long been a key element of the manufacturing process, but as technology advances, the risk management challeng...

Read More