Data security solutions for the U.S. Federal Government
Thales Trusted Cyber Technologies provides high assurance data security solutions for the U.S. Federal Government
Thales Trusted Cyber Technologies’ (TCT) mission is to provide innovative solutions to protect the most vital data from the core, to the cloud, to the field for defence, intelligence and civilian agencies across the U.S. Federal Government. As part of the Thales defence and Security Inc. (TDSI) defence Counterintelligence and Security Agency (DCSA) proxy, Thales TCT is protected from Foreign Ownership Control and Influence (FOCI). Thales TCT is also governed by the Committee for Foreign Investment in the U.S. (CFIUS) National Security Agreement (NSA) which provides further FOCI mitigation to the products and services provided to its customers.
We offer best-of-breed solutions to our U.S. Federal customers. From our core solutions developed specifically for the government to Thales Cloud Protection & Licensing commercial-off-the-shelf solutions we sell and support, our offerings address the most stringent federal requirements. Our extensive government data security experience allows us to provide one of the most broad data protection portfolios specifically focused on U.S. Federal agency requirements for protecting mission critical data in data centres, cloud environments and field deployments. Our product portfolio includes:
Insider-implemented breaches, such as those by Edward Snowden and Bradley Manning can not only severely cripple the ability of Federal agencies to achieve their objectives, but can also have a chilling effect on Federal professional and administrative careers.
While insider threats persist, external threats are becoming more menacing and sophisticated. Advanced persistent threats, or APTs, blur the line between insider and external threats by allowing external adversaries to steal the user credentials required to bypass perimeter defences and act as insiders. Due to their sophistication and required resources, APTs are often attributed to nation-states and other highly organised entities.
As cybersecurity threats have proliferated and computer technology has advanced, government data security compliance has become increasingly complex.
The government mandates encryption, and major government security compliance regulations such as FISMA, NIST 800-53, FIPS (up to level 3), and Common Criteria need to be part of the any government data-security solution. And, as data moves to the cloud, government agencies need to comply with FedRAMP. Finally, depending on the government agency, HIPAA-HITECH and PCI DSS may also be important.
Thales government data security solutions address all these issues and truly secure sensitive data for federal government agencies working in the Civilian, defence and Intelligence sectors through enabling an enterprise-level data at rest security strategy that is:
Thales provides government data security solutions to members of the US Intelligence Community, The U.S. National Laboratories, Health and Human Services and many other U.S. Federal Agencies and Departments.
Seventeen of the Fortune 30 rely on Thales data security technology as do more than 1,500 customers in 22 countries across a broad range of industries including healthcare, retail, consumer goods, manufacturing, banking, insurance and cloud service providers. And, industry partners including IBM and Symantec market OEM solutions that incorporate Vormetric product technology.
The White House Executive Order on improving the nation’s cybersecurity infrastructure underscores the importance of protecting the Federal Government’s computer systems. It has led organizations across the nation to review their cybersecurity practices, and it establishes...
The White House issued an Executive Order on improving the Nation’s Cybersecurity on May 12, 2021. The Executive Order gives agencies 180 days to “adopt multi-factor authentication and encryption for data at rest and in transit, to the maximum extent consistent with Federal...
Ransomware attacks have been a problem for years, but they have recently become a lot more damaging, with criminals targeting everything from critical infrastructure to hospitals and retailers, and demanding tens of millions of dollars in ransom. Today, with global leaders...
The sensitive nature of much of the data held by local and central government agencies places a greater-than-average emphasis on effective cyber-security.