node/590
Thales logo | Building a Future We Can All Trust
Search
 
 
 
  • Products
    • Products
    • Products Overview
    • Data Protection
      • Data Protection
      • Data Protection Overview
      • Data Discovery & Classification
      • Data at Rest Encryption
        • Data at Rest Encryption
        • Data at Rest Encryption
        • Data Security Platform
        • Transparent Encryption
        • Encryption for Kubernetes
        • Encryption UserSpace
        • Application Data Protection
        • Tokenization
        • Data Protection Gateway
        • Database Protection
        • Batch Data Transformation | Static Data Masking
        • Intelligent Protection
        • Selecting the Right Encryption Approach
      • Key Management
        • Key Management
        • Key Management
        • CipherTrust Manager
        • Data Security Manager
        • CipherTrust Cloud Key Manager
        • Enterprise Key Management
        • CipherTrust Platform for Dev/Ops
      • Hardware Security Modules
        • Hardware Security Modules
        • Hardware Security Modules
        • General Purpose HSMs
        • Payment HSMs
        • Luna Cloud HSM Services
      • Data Protection on Demand
        • Data Protection on Demand
        • Data Protection on Demand
        • Services
        • How it Works
        • Partners
        • Pricing
        • Sign Up Now
      • Network Encryption
      • Secure File Sharing
      Risk Management Strategies for Digital Processes with HSMs
      Risk Management Strategies for Digital Processes with HSMs

      Security architects are implementing comprehensive information risk management strategies that include integrated Hardware Security Modules (HSMs). Reduce risk and create a competitive advantage.

      Get the White Paper
    • Access Management & Authentication
      • Access Management & Authentication
      • Workforce IAM
        • Workforce IAM
        • Workforce IAM
        • SafeNet Trusted Access
        • Identity-as-a-Service
        • SAML Authentication
      • Customer IAM
      • Cloud SSO
        • Cloud SSO
        • Cloud SSO
        • SSO Application Catalog
      • Authentication
        • Authentication
        • Authentication
        • Authentication as a Service
        • Authenticators
        • Certificate-Based PKI USB Authenticators
        • Certificate-Based Smart Cards
        • FIDO Devices
        • OTP Authenticators
        • Tokenless Authentication
        • On-Prem Management Platforms
        • Security Apps
        • Smart Card Readers
        • Passwordless Authentication
      • Customer Success Stories
      • Sign Up Now - STA Free Trial
      • STA Demo
      Access Management Handbook
      Access Management Handbook

      Get everything you need to know about Access Management, including the difference between authentication and access management, how to leverage cloud single sign on.

      Get the eBook
    • Software Monetization
      • Software Monetization
      • Software Monetization Overview
      • License Management
      • Entitlement Management
      • Rights Management System
      • Software License & Copy Protection
      • All Software Monetization Products
      How to get SaaS Software Licensing Right the First Time
      How to get SaaS Software Licensing Right the First Time

      Explore the software licensing lifecycle, and how to build a cross-functional licensing team.

      Get the eBook
    How We Can Help

    You can rely on Thales to help protect and secure access to your most sensitive data and software wherever it is created, shared or stored.

    payShield 10K
    payShield 10K

    The hardware security module that secures the world's payments.

    Learn More
  • Solutions
    • Solutions
    • Solutions Overview
    • By Use Case
      • By Use Case
      • 5G Security
      • Access Security
        • Access Security
        • Access Security
        • Secure Remote Access
        • Secure VPN Access
        • Secure Cloud Access
        • VDI Security Solutions
        • 2FA Solutions
        • Web and Cloud SSO
        • Physical & Logical Access Control
        • MFA for Cyber Insurance
      • Blockchain
      • Cloud Security
        • Cloud Security
        • Cloud Security
        • Amazon Web Services
        • Bring Your Own Encryption (BYOE)
        • Cloud Data Encryption
        • Cloud SSO
        • Google Cloud
        • Luna HSMs – Hybrid, On-Premises and Cloud HSM
        • Microsoft Azure
        • Microsoft Double Key Encryption (DKE)
        • Multi-Cloud Security
        • SaaS Security
      • Data Security & Encryption
        • Data Security & Encryption
        • Data Security & Encryption
        • Advanced Persistent Threats (APTs)
        • Big Data Security
        • Database Security and Encryption
        • Docker Encryption
        • Encryption for Kubernetes
        • Encryption UserSpace
        • MongoDB Encryption
        • MS SQL Server Encryption
        • NoSQL Encryption
        • Oracle Database Encryption
        • PostgreSQL Database Encryption
        • SAP Data Security
        • Securing Unstructured Files
        • TDE Key Management
        • Virtual Environment Security
      • Data Sovereignty
      • Digital Transformation
      • IoT Security
        • IoT Security
        • IoT Security
        • Smart Grid Security
        • IoT Connected Car
        • IoT Secure Manufacturing
        • IoT Healthcare
      • Payment & Transactions
        • Payment & Transactions
        • Payment & Transactions
        • Secure Payments
        • Point-to-Point Encryption
        • Document Signing
        • EMV & Payment Card Issuance
        • Host Card Emulation
        • Mobile Card Payments
        • mPOS
        • Payment Processing
        • Secure Credit Card & Pin Management
      • PKI Credential Management
        • PKI Credential Management
        • PKI Credential Management
        • PKI Middleware
        • PKI Authentication
        • PKI Security
      • PKI Security Solutions
        • PKI Security Solutions
        • PKI Security Solutions
        • TLS/SSL Key Security
        • Code Signing
        • Secure Digital Signatures
        • Electronic Invoicing
        • DNS Security
        • Email Encryption
      • Quantum
        • Quantum
        • Quantum
        • Post-Quantum Crypto Agility Tool
      • Ransomware Solutions
      • Remote Workforces Challenges
      • Software Monetization
        • Software Monetization
        • Software Monetization
        • Software License Management
        • Entitlement Management
        • Software Packaging & Pricing
        • Software Usage Tracking & Reporting
        • Software Protection & Licensing
        • Capture Revenue Opportunities
      • Zero Trust Security
      Best Practices For Secure Cloud Migration
      Best Practices for Secure Cloud Migration

      It's a Multi-Cloud World. Thales can help secure your cloud migration.

      GET THE WHITE PAPER
    • By Industry
      • By Industry
      • Automotive
      • Critical Infrastructure
      • Education
      • Government
        • Government
        • Government
        • Federal Government
        • State and Local Government
        • Law Enforcement
      • Financial Services
      • Healthcare
      • Insurance Providers
      • Manufacturing and Industrial
      • Media and Entertainment
      • Retail
      • SaaS Providers / Service Providers
      2022 Thales Data Threat Report - Financial Services Edition
      2022 Thales Data Threat Report - Financial Services Edition

      2022 Thales data threat report for financial services, summarizes the most important findings of a survey of security leaders within the financial services industry.

      GET THE WHITE PAPER
    • By Compliance
      • By Compliance
      • Global
        • Global
        • Basel Compliance Solutions
        • Data Breach Notification Laws
        • Data Sovereignty
        • GDPR
        • ISO 27799:2016 Compliance
        • ISO/IEC 27002:2013 Compliance
        • PCI DSS
        • PCI HSM
        • Swift CSC
        • Validations and Certifications
      • Americas
        • Americas
        • Brazil - LGPD
        • CCPA (California Consumer Privacy Act)
        • CJIS
        • FDA/DEA - EPCS
        • FedRamp
        • FISMA
        • FIPS 199 and FIPS 200
        • FIPS 140-2
        • FIPS 140-3
        • GLBA
        • HIPAA
        • Mexico - Data Protection Law
        • NAIC Insurance Data Security Model Law Compliance
        • New York State Cybersecurity Requirements for Financial Services Companies Compliance
        • NCUA Regulatory Compliance
        • NIST 800-53, Revision 4
        • PIPEDA Compliance
        • SOX
        • STIR/SHAKEN
      • EMEA
        • EMEA
        • DEFCON 658
        • ECC
        • eIDAS
        • GDPR
        • NIS2
        • PSD2
        • Schrems II
        • South Africa POPI Act
      • APAC
        • APAC
        • Australia Privacy Amendment
        • China Personal Information Security Specification
        • Hong Kong Practice Guide for Cloud Computing Security
        • Indonesia Personal Data Protection Law
        • Japan My Number Compliance
        • J-Sox
        • Monetary Authority of Singapore
        • Philippines Data Privacy Act of 2012
        • Singapore Public Sector Data Security
        • Singapore CCoP2.0
        • South Korea's PIPA
        • UIDAI's Aadhaar Number Regulation Compliance
      Data Breach Notifications Map
      Protect Your Organization from Data Breach Notification Requirements

      Data breach disclosure notification laws vary by jurisdiction, but almost universally include a "safe harbor" clause.

      LEARN MORE
    Solutions to Secure Your Digital Transformation

    Whether it's securing the cloud, meeting compliance mandates or protecting software for the Internet of Things, organizations around the world rely on Thales to accelerate their digital transformation.

    Implementing Strong Authentication for Office 365
    Implementing Strong Authentication for Office 365

    Mitigate the risk of unauthorized access and data breaches.

    Learn More
  • Partners
    • Partners
    • Partners Overview
    • Find a Partner
    • Become a Partner
    • Channel Partners
    • Managed Service Providers
    • Technology Partners
    • OEM Partners
    • Advisory Partners
    • Cloud Partners
    • Partner Portal Login
    Thales Accelerate
    Partner Network

    Thales Partner Ecosystem includes several programs that recognize, rewards, supports and collaborates to help accelerate your revenue and differentiate your business. Provide more value to your customers with Thales's Industry leading solutions. Learn more to determine which one is the best fit for you.

    Thales Accelerate Partner Network

    The Thales Accelerate Partner Network provides the skills and expertise needed to accelerate results and secure business with Thales technologies.

    Get the Brochure
  • Developers
  • Resources
    • Area of Interest
    • Encryption
      • Resource Type
      • White Papers
      • eBooks
      • Case Studies
      • Infographics
      • Webinars
      • Videos
      • Security Research
      • Podcasts
      • TalkingTrust Video Series
      Gartner Report Key Management
      Gartner Report: Select the Right Key Management as a Service to Mitigate Data Security and Privacy Risks in the Cloud

      Organizations must review their protection and key management provided by each cloud service provider.

      Get the Report
    • Access Management
      • Resource Type
      • White Papers
      • eBooks
      • Case Studies
      • Infographics
      • Webinars
      • Videos
      • Security Research
      • Podcasts
      Gartner's Market Guide for User Authentication
      Gartner's Market Guide for User Authentication

      How does user authentication relate to other identity corroboration approaches?

      Get the Report
    • Software Monetization
      • Resource Type
      • Blog
      • FAQ
      • White Papers
      • Case Studies
      • Infographics
      • Webinars
      • Learning Hub
      • Business Value Calculator
      How to get SaaS Software Licensing Right the First Time
      How to get SaaS Software Licensing Right the First Time

      Explore the software licensing lifecycle, and how to build a cross-functional licensing team.

      Get the eBook
    • Blog
    Explore Thales's comprehensive resources for cloud, protection and licensing best practices.
    CPL Corporate Brochure
    A Global Leader in Data Security

    The largest companies and most respected brands in the world rely on Thales to protect their most sensitive data.

    GET THE BROCHURE
  • Search
  • Support
    • Customer Support
    • Software Monetization
      • Drivers & Downloads
      • Security Updates
      • Product Announcements / Training
    • Customers
      • Activate a Product / Support Portal
    • Data Protection
      • Security Updates
      • Product Announcements
      • Training Services
      • Technical Training Calendar
      • Professional Services
  • About
    • About Us
    • Leadership
    • Newsroom
    • News Coverage
    • Events
    • Customers
    • Industry Associations & Standards Organizations
    • Careers
  • Contact Sales
    • Contact Encryption
    • Contact Access Management
    • Contact Software Monetization
  • EN
    • English (GB)
    • Français
    • Deutsch
    • Italiano
    • Español
    • Português
    • 日本語
    • 한국어
    • Microsites

    • Polskie
    • Nederlands
    • 中文(繁體)
Banner Image

Thales Newsroom

Thales Completes Acquisition of OneWelcome, a Customer IAM Leader

OneWelcome

OneWelcome’s strong digital identity lifecycle management capabilities will complement Thales’s existing Identity services, allowing us to offer the most comprehensive Identity Platform in the market.
Read More

Search News Release

March 15, 2023

Thales expands OneWelcome Identity Platform global footprint with new United States zone

December 14, 2022

Thales Awarded the 2022 Frost & Sullivan Global Software License and Entitlement Market Leadership Award

November 30, 2022

Thales Collaborates with AWS to Support Digital Sovereignty for Cloud Customers via CipherTrust Cloud Key Manager Integration

October 18, 2022

Thales and IP4Sure Enhance Cybersecurity with Passwordless Access for Users

October 12, 2022

Thales Encryption Key Management Innovations Help Organizations Achieve Digital Sovereignty Across Hybrid and Multi-Cloud Environments

October 6, 2022

Thales named as an Overall Leader in KuppingerCole Analysts Leadership Compass for Passwordless Authentication

Pagination

  • Current page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • …
  • Next page Next ›
  • Last page Last »
Check out Thales in the News
Thales News Coverage
Thales logo - white

cpl.thalesgroup.com

LinkedIn logoTwitter logoFacebook logoYouTube logoThales BlogPodcasts

Visit our parent site at

www.thalesgroup.com
  • Products
    • Data Protection
    • Access Management & Authentication
    • Software Monetization
  • Solutions
    • By Use Case
    • By Industry
    • By Compliance
  • Partners
    • Find a Partner
    • Become a Partner
    • Partner Portal Login
  • Resources
    • Resources Library
    • Blog
    • Podcasts
  • Support
    • Customer Support
    • Training Services
  • About
    • Contact Us
    • India E-Waste Program
    • Newsroom
    • Careers
SUBSCRIBEGet the latest data protection and access management resources and insights delivered right to your inbox.
Copyright © Thales. All Rights Reserved
    • Privacy Policy
    •   Disclaimer
    •   EU Commitments
    •   Sitemap
    •   Cookie Policy
    •   Terms & Conditions
    •  Do Not Sell My Personal Information
Partners Resources Blogs Sentinel Drivers