Thales Trusted Cyber Technologies   Contact Us | Careers

White Paper: Securing SD-WAN

sd-wan-wp-tn

IT networks are growing larger and becoming more widely dispersed. With endpoints stretching across multiple sites, national borders and remote locati...

Read More

White Paper: Securing Network-Attached HSMs

securing-netowrk-hsm-wp-tn

In the security world, the phrase ‘secure network’ is often viewed as an oxymoron; experience has demonstrated that once a device is connected to a ne...

Read More

White Paper: Roots of Trust

root-of-trust-wp-tn

The term Root of Trust (RoT) is commonly used in information security circles, but what does it mean? Why do we care? How does it apply to cryptograph...

Read More

White Paper: Prevent Ransomware Attacks from Disrupting Your Agency with the CipherTrust Platform

ransomware-wp-tn

This white paper helps you understand the anatomy of ransomware attacks and explores the solutions available in the market today to defend against suc...

Read More

White Paper: Own and Manage Your Encryption Keys

own-manager-wp-tn

For agency leaders and IT administrators responsible for data security—from the most basic statistics to highly sensitive documents— understanding the...

Read More

White Paper: NIST 800-57 Recommendations for Key Management Requirements Analysis

nist-800-57-wp-tn

The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-57, Recommendations for Key Management Part 1 (Rev 5) provides ...

Read More

White Paper: NIST 800-53 Mapping to CipherTrust Data Security Platform

nist-800-53-wp-tn

Thales TCT is a key partner in helping organizations to meet the standard. Focusing on protecting data-at-rest, Thales TCT delivers critical data prot...

Read More

White Paper: Network Independent Encryption

network-inde-wp-tn

The introduction of TIM to the CN Series hardware encryptors will help customers meet the increasing demand to protect data flows across multiple netw...

Read More

White Paper: Malicious Macros

malicious-macros-wp-tn

The Holes in Microsoft Software That Hackers Hope You Don’t Know About.

Read More

White Paper: MACsec for WAN and High Assurance Encryptors

macsec-wp-tn

Today the MACsec standard is also used to encrypt WAN communications links. On point-point links over dark fiber or pseudowire circuits, this is equiv...

Read More