Search
 
 
 
  • Products
    • Products
    • Products Overview
    • Data Protection
      • Data Protection
      • Data Protection Overview
      • Data Discovery & Classification
      • Data at Rest Encryption
        • Data at Rest Encryption
        • Data at Rest Encryption
        • Data Security Platform
        • Transparent Encryption
        • Application Data Protection
        • Tokenization
        • Database Protection
        • Batch Data Transformation | Static Data Masking
      • Key Management
        • Key Management
        • Key Management
        • CipherTrust Manager
        • Data Security Manager
        • CipherTrust Cloud Key Manager
        • Enterprise Key Management
      • Hardware Security Modules
        • Hardware Security Modules
        • Hardware Security Modules
        • General Purpose HSMs
        • Payment HSMs
        • Cloud HSM Services
      • Data Protection on Demand
        • Data Protection on Demand
        • Data Protection on Demand
        • Services
        • How it Works
        • Partners
        • Pricing
        • Sign Up Now
      • Network Encryption
      • Secure File Sharing
      White Paper
      Risk Management Strategies for Digital Processes with HSMs

      Security architects are implementing comprehensive information risk management strategies that include integrated Hardware Security Modules (HSMs). Reduce risk and create a competitive advantage.

      Get the White Paper
    • Access Management & Authentication
      • Access Management & Authentication
      • Access Management & Authentication Overview
      • Access Management
        • Access Management
        • Access Management
        • SafeNet Trusted Access
        • Identity-as-a-Service
        • Authentication as a Service
        • SAML Authentication
        • STA Free Trial
      • Cloud SSO
        • Cloud SSO
        • Cloud SSO
        • SSO Application Catalog
      • Authentication
        • Authentication
        • Authentication
        • Authentication as a Service
        • Authenticators
        • Certificate-Based PKI USB Authenticators
        • Certificate-Based Smart Cards
        • OTP Authenticators
        • Tokenless Authentication
        • On-Prem Management Platforms
        • Security Apps
        • Smart Card Readers
        • Passwordless Authentication
      • Sign up Now
        • Sign up Now
        • Sign up Now
        • STA Free Trial
        • STA Demo
      Access Management Handbook
      Access Management Handbook

      Get everything you need to know about Access Management, including the difference between authentication and access management, how to leverage cloud single sign on.

      Get the eBook
    • Software Monetization
      • Software Monetization
      • Software Monetization Overview
      • Sentinel Rights Management System - RMS
      • Sentinel Entitlement Management System - EMS
      • Sentinel License Development Kit - LDK
      • Automate Software Updates - Sentinel Up
      • Low Footprint Commercial Licensing - Sentinel Fit
      • All Products
      Frost and Sullivan
      Top 10 Predictions for Digital Business Models and Monetization

      How fast are companies moving to recurring revenue models? What are the key software monetization changes in the next 5 years?

      Get the Report
    How We Can Help

    You can rely on Thales to help protect and secure access to your most sensitive data and software wherever it is created, shared or stored.

    READ MORE
    Data Sheets

     

    payShield 10K

    The hardware security module that secures the world's payments

    Learn More
  • Solutions
    • Solutions
    • Solutions Overview
    • By Use Case
      • By Use Case
      • By Use Case Overview
      • 5G Security
      • Access Security
        • Access Security
        • Access Security overview
        • Secure Remote Access
        • Secure VPN Access
        • Secure Cloud Access
        • VDI Security Solutions
        • 2FA Solutions
        • Web and Cloud SSO
        • Physical & Logical Access Control
      • Blockchain
      • Cloud Security
        • Cloud Security
        • Cloud Security Overview
        • BYOE
        • Amazon Web Services
        • Google Cloud Platform
        • Microsoft Azure
        • Cloud SSO
        • Cloud Data Encryption
        • Luna HSMs – Hybrid, On-Premises and Cloud HSM
      • Data Security & Encryption
        • Data Security & Encryption
        • Data Security & Encryption overview
        • Advanced Persistent Threats (APTs)
        • Big Data Security
        • Container Security
        • Database Security | Database Encryption
        • Docker Encryption
        • MongoDB Encryption
        • MS SQL Server Encryption
        • NoSQL Encryption
        • Oracle Database Encryption
        • PostgreSQL Database Encryption
        • Prevent Ransomware Attacks
        • RSA DPM Replacement
        • SAP Data Security
        • Securing Unstructured Files
        • TDE Key Management
        • Selecting the Right Encryption Approach
      • IoT Security
        • IoT Security
        • IoT Security overview
        • Smart Grid Security
        • IoT Connected Car
        • IoT Secure Manufacturing
        • IoT Healthcare
      • Payment & Transactions
        • Payment & Transactions
        • Payment & Transactions
        • Secure Payments
        • Point-to-Point Encryption
        • Secure Digital Signing
        • Code Signing
        • Electronic Invoicing
        • DNS Security
        • Smart Grid Security
        • Document Signing
        • EMV & Payment Card Issuance
        • Host Card Emulation
        • Mobile Card Payments
        • mPOS
        • Payment Processing
        • Secure Credit Card & Pin Management
        • Blockchain
        • SSL Certificate Security
        • Quantum
        • Post-Quantum Crypto Agility Tool
      • PKI Credential Management
        • PKI Credential Management
        • PKI Credential Management overview
        • PKI Middleware
        • PKI Authentication
        • PKI Security
        • Email Encryption
      • PKI Security Solutions
        • PKI Security Solutions
        • PKI Security Solutions overview
        • TLS/SSL Key Security
        • Code Signing
        • Secure Digital Signatures
        • Electronic Invoicing
        • DNS Security
        • Email Encryption
      • Quantum
        • Quantum
        • Quantum
        • Post-Quantum Crypto Agility Tool
      • Software Monetization
        • Software Monetization
        • Software Monetization overview
        • Capture Revenue Opportunities
        • Improve Operational Efficiency
        • Increase Customer Satisfaction
        • Gain Business Insights
      • Zero Trust Security
      Image Digital World
      Best Practices for Secure Cloud Migration

      It's a Multi-Cloud World. Thales can help secure your cloud migration.

      GET THE WHITE PAPER
    • By Industry
      • By Industry
      • By Industry Overview
      • Business Services
      • Education
      • Federal Government
      • Financial Services
      • Government
      • Healthcare
      • Insurance Providers
      • Law Enforcement
      • Managed Services
      • Media and Entertainment
      • Outsourcing
      • Pharmacies
      • Retail
      • SaaS Providers / Service Providers
      • State and Local Government
      Image Digital World
      Best Practices for Secure Cloud Migration

      It's a Multi-Cloud World. Thales can help secure your cloud migration.

      GET THE WHITE PAPER
    • By Compliance
      • By Compliance
      • By Compliance
      • Global
        • Global
        • Global
        • Data Breach Notification Laws
        • Data Residency
        • GDPR
        • ISO 27799:2016 Compliance
        • ISO/IEC 27002:2013 Compliance
        • PCI DSS
        • PCI HSM
        • Swift CSC
        • Validations and Certifications
      • Americas
        • Americas
        • Americas
        • Brazil - LGPD
        • CCPA (California Consumer Privacy Act)
        • CJIS
        • FDA/DEA - EPCS
        • FedRamp
        • FISMA
        • FIPS 199 and FIPS 200
        • FIPS 140-2
        • FIPS 140-3
        • GLBA
        • HIPAA
        • Mexico - Data Protection Law
        • NAIC Insurance Data Security Model Law Compliance
        • New York State Cybersecurity Requirements for Financial Services Companies Compliance
        • NCUA Regulatory Compliance
        • NIST 800-53, Revision 4
        • PIPEDA Compliance
        • SOX
        • STIR/SHAKEN
      • EMEA
        • EMEA
        • EMEA
        • DEFCON 658
        • ECC
        • eIDAS
        • GDPR
        • PSD2
        • Schrems II
        • South Africa POPI Act
      • APAC
        • APAC
        • APAC
        • Australia Privacy Amendment
        • Japan My Number Compliance
        • J-Sox
        • Monetary Authority of Singapore
        • Philippines Data Privacy Act of 2012
        • South Korea's PIPA
        • UIDAI's Aadhaar Number Regulation Compliance
      Data Breach Notifications
      Protect Your Organization from Data Breach Notification Requirements

      Data breach disclosure notification laws vary by jurisdiction, but almost universally include a "safe harbour" clause.

      GET THE WHITE PAPER
    Solutions to Secure Your Digital Transformation

    Whether it's securing the cloud, meeting compliance mandates or protecting software for the Internet of Things, organizations around the world rely on Thales to accelerate their digital transformation.

    READ MORE
    Solution Briefs

     

    Implementing Strong Authentication for Office 365

    Mitigate the risk of unauthorized access and data breaches.

    Learn More
  • Partners
    • Partners
    • Partners Overview
    • Find a Partner
    • Become a Partner
    • Channel Partners
    • Managed Service Providers
    • OEM Partners
    • Technology Partners
    • Partner Portal Login
    Thales Accelerate
    Partner Network

    Thales Partner Ecosystem includes several programs that recognize, rewards, supports and collaborates to help accelerate your revenue and differentiate your business. Provide more value to your customers with Thales's Industry leading solutions. Learn more to determine which one is the best fit for you.

    READ MORE
    Thales Accelerate Partner Network

    The Thales Accelerate Partner Network provides the skills and expertise needed to accelerate results and secure business with Thales technologies.

    Get the Brochure
  • Resources
    • Area of Interest
    • Encryption
      • Resource Type
      • White Papers
      • eBooks
      • Case Studies
      • Infographics
      • Webinars
      • Videos
      • Security Research
      • Podcasts
      • TalkingTrust Video Series
      Frost and Sullivan
      Gartner Report: Select the Right Key Management as a Service to Mitigate Data Security and Privacy Risks in the Cloud

      Organizations must review their protection and key management provided by each cloud service provider.

      Get the Report
    • Access Management
      • Resource Type
      • White Papers
      • eBooks
      • Case Studies
      • Infographics
      • Webinars
      • Videos
      • Security Research
      • Podcasts
      Frost and Sullivan
      Gartner's Market Guide for User Authentication

      How does user authentication relate to other identity corroboration approaches?

      Get the White Paper
    • Software Monetization
      • Resource Type
      • White Papers
      • eBooks
      • Case Studies
      • Infographics
      • Webinars
      • Videos
      Frost and Sullivan
      Navigate The Process of Licensing, Delivering, and Protecting Your Software

      Check out our practical guide to navigating the process of licensing, delivering, and protecting your software.

      Get the White Paper
    Explore Thales's comprehensive resources for cloud, protection and licensing best practices.
    CPL Corporate Brochure

     

    A Global Leader in Data Security

    The largest companies and most respected brands in the world rely on Thales to protect their most sensitive data.

    GET THE BROCHURE
  • Search Search
  • Support
    • Support
    • Support Overview
    • Product Announcements
      • Data Protection
      • Software Monetization
    • Activate a Product
    • Customer Support
    • Software Monetization Drivers & Downloads
    • Security Updates
      • Security Updates
      • Software Monetization Security Updates
    • Professional Services
      • Deployment Services
      • Development Services
      • Consulting Services
    • Training Services
      • Training Services
      • Software Monetization
    • Technical Training Calendar
  • About
    • About Overview
    • Leadership
    • Newsroom
    • News Coverage
    • Events
    • Customers
    • Industry Associations & Standards Organizations
    • Information Security Research
  • Contact Us
    • Contact Overview
    • Contact Encryption
    • Contact Access Management
    • Contact Software Monetization
  • DownloadEN
    • English GB
    • Français
    • Deutsch
    • Italiano
    • Español
    • Português
    • 日本語
    • 한국어
News Coverage

Thales in the News

Search News Coverage

August 13, 2019

What Happens When Cyber Attackers Reach Quantum-advantage?

August 5, 2019

11 Top Cybersecurity Trends To Watch For At Black Hat 2019

July 20, 2019

Providers Move To Healthcare Multicloud, Despite Security Concerns

July 18, 2019

Why 70% Of Healthcare Orgs Have Suffered Data Breaches

July 18, 2019

U.S. Healthcare Organizations Face New And Unique Data Security Risks With Digital Transformation Initiatives

July 18, 2019

Security Leader: Graeme Pyper, Thales

Pagination

  • First page « First
  • Previous page ‹ Previous
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Current page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • …
  • Next page Next ›
  • Last page Last »
Check out the latest Press Releases
Thales Newsroom
footer logo

cpl.thalesgroup.com

LinkedIn logoTwitter logoFacebook logoYouTube logoThales BlogPodcasts

Visit our parent site at

www.thalesgroup.com
  • Products
    • Data Protection
    • Access Management & Authentication
    • Software Monetization
  • Solutions
    • By Use Case
    • By Industry
    • By Compliance
  • Partners
    • Find a Partner
    • Become a Partner
    • Partner Portal Login
  • Resources
    • Resources Library
    • FAQ
    • Blogs
    • Podcasts
  • Support
    • Customer Support
    • Training Services
  • About
    • Contact Us
    • India E-Waste Program
    • Investor Relations
    • Newsroom
Copyright © Thales. All Rights Reserved
    • Privacy Policy
    •   Disclaimer
    •   EU Commitments
    •   Sitemap
    •   Cookie Policy
    •   Terms & Conditions
    •  Do Not Sell My Personal Information
Seach Icon
Looking for partners? Looking for resources?