node/592
Thales logo | Building a Future We Can All Trust
Search
 
 
 
  • Products
    • Products
    • Products Overview
    • Data Security
      • Data Security
      • Data Security Overview
      • Data Security Platform
      • Data Security Posture Management
      • Data Discovery & Classification
      • Data at Rest Encryption
        • Data at Rest Encryption
        • Data at Rest Encryption
        • Transparent Encryption
        • Encryption for Kubernetes
        • Encryption UserSpace
        • Application Data Protection
        • Data Protection Gateway
        • Database Protection
        • Batch Data Transformation | Static Data Masking
        • Intelligent Protection
        • Selecting the Right Encryption Approach
        • Ransomware Protection
      • Tokenization
      • Key Management
        • Key Management
        • Key Management
        • CipherTrust Manager
        • CipherTrust Cloud Key Manager
        • Enterprise Key Management
        • CipherTrust Platform for DevOps
        • CipherTrust Cloud Key Management Service
      • Secrets Management
      • Hardware Security Modules
        • Hardware Security Modules
        • Hardware Security Modules
        • General Purpose HSMs
        • Payment HSMs
        • Luna Cloud HSM Services
      • Data Protection on Demand
        • Data Protection on Demand
        • Data Protection on Demand
        • Services
        • How it Works
        • Partners
        • Pricing
        • Sign Up Now
      • Network Encryption
      • Risk Analytics & Monitoring
      • Secure File Sharing
      • DevSecOps
      Risk Management Strategies for Digital Processes with HSMs
      Risk Management Strategies for Digital Processes with HSMs

      Security architects are implementing comprehensive information risk management strategies that include integrated Hardware Security Modules (HSMs). Reduce risk and create a competitive advantage.

      Get the White Paper
    • Application Security
        Secure what matters most with Thales and Imperva

        Applications help to drive digital transformation but traditional security approaches can’t keep pace with dynamic environments. See how we can help you protection applications and APIs anywhere.

        Explore Application Security
      Thales and Imperva Have Joined Forces
      Thales and Imperva Join Forces

      Together, we are creating the worldwide leader in cybersecurity, protecting more applications, data and identities than any other company and enabling tens of thousands of organizations to deliver trusted digital services to billions of consumers around the world every day.

      Learn More
    • Identity & Access Management
      • Identity & Access Management
      • Identity Types
        • Identity Types
        • Identity Types
        • Customer Identity
        • Workforce Identity
        • B2B Identity
        • Gig Worker Identity
      • Capabilities
        • Capabilities
        • Capabilities
        • Adaptive Access Control
        • BYOI & Social Login
        • Consent & Preference Management
        • Delegated User Management
        • Externalized Authorization
        • Fraud & Risk Management
        • Identity Verification
        • Multi-Factor Authentication
        • Risk-based Authentication
        • Single Sign-On (SSO)
        • Strong Customer Authentication
        • User Journey Orchestration
      • Product Types
        • Product Types
        • Product Types
        • Digital Banking
        • eHerkenning
        • FIDO Passkeys and Devices
        • On-Prem Management Platforms
        • OneWelcome
        • OTP Authenticators
        • MobilePASS+
        • Passwordless Authentication
        • PKI USB Tokens
        • SafeNet Trusted Access
        • Smart Cards
        • Smart Card Readers
        • Tokenless Authentication
      • Request a Demo
      • Free Trial: SafeNet Trusted Access
      Access Management Handbook
      Access Management Handbook

      Get everything you need to know about Access Management, including the difference between authentication and access management, how to leverage cloud single sign on.

      Get the eBook
    • Software Monetization
      • Software Monetization
      • Software Monetization Overview
      • License Management
      • Entitlement Management
      • Rights Management System
      • Software and IP protection
      • All Software Monetization Products
      • Interactive Product Tours
      How to get SaaS Software Licensing Right the First Time
      How to get SaaS Software Licensing Right the First Time

      Explore the software licensing lifecycle, and how to build a cross-functional licensing team.

      Get the eBook
    How We Can Help

    You can rely on Thales to help protect and secure access to your most sensitive data and software wherever it is created, shared or stored.

    2024 Data Threat Report
    2024 Data Threat Report
    Navigating New Threats and Overcoming Old Challenges

    Discover insights into new technologies, their security implications and the organizational changes for success ahead in our comprehensive annual report.

    Get Your Copy Today
  • Solutions
    • Solutions
    • Solutions Overview
    • By Use Case
      • By Use Case
      • AI Security
      • 5G Security
      • Access Security
        • Access Security
        • Access Security
        • Secure Remote Access
        • Secure VPN Access
        • Secure Cloud Access
        • VDI Security Solutions
        • 2FA Solutions
        • Web and Cloud SSO
        • Physical & Logical Access Control
        • MFA for Cyber Insurance
      • Blockchain
      • Cloud Security
        • Cloud Security
        • Cloud Security
        • Amazon Web Services
        • Bring Your Own Encryption (BYOE)
        • Cloud Data Encryption
        • Cloud SSO
        • Google Cloud
        • Luna HSMs – Hybrid, On-Premises and Cloud HSM
        • Microsoft Azure
        • Microsoft Double Key Encryption (DKE)
        • Multi-Cloud Security
        • Oracle Cloud Infrastructure
        • Your Data Their Cloud
      • Data Security & Encryption
        • Data Security & Encryption
        • Data Security & Encryption
        • Advanced Persistent Threats (APTs)
        • Big Data Security
        • Database Security and Encryption
        • DevSecOps
        • Docker Encryption
        • Encryption for Kubernetes
        • Encryption UserSpace
        • MongoDB Encryption
        • MS SQL Server Encryption
        • NoSQL Encryption
        • Oracle Database Encryption
        • PostgreSQL Database Encryption
        • SAP Data Security
        • Securing Unstructured Files
        • TDE Key Management
        • Virtual Environment Security
      • Data Sovereignty
      • Digital Transformation
      • IoT Security
        • IoT Security
        • IoT Security
        • Smart Grid Security
        • IoT Connected Car
        • IoT Secure Manufacturing
        • IoT Healthcare
      • Payment & Transactions
        • Payment & Transactions
        • Payment & Transactions
        • Secure Payments
        • Point-to-Point Encryption
        • Document Signing
        • EMV & Payment Card Issuance
        • Host Card Emulation
        • Mobile Card Payments
        • mPOS
        • Payment Processing
        • Secure Credit Card & Pin Management
      • PKI Credential Management
        • PKI Credential Management
        • PKI Credential Management
        • PKI Middleware
        • PKI Authentication
        • PKI Security
      • PKI Security Solutions
        • PKI Security Solutions
        • PKI Security Solutions
        • TLS/SSL Key Security
        • Code Signing
        • Secure Digital Signatures
        • Electronic Invoicing
        • DNS Security
        • Email Encryption
      • Quantum
        • Quantum
        • Quantum
        Are You Post-Quantum Ready?
        Are You Post-Quantum Ready?

        Although post-quantum is projected to be a few years away, an enterprise must start planning today to be post-quantum ready. Take this free risk assessment to learn if your organization is at risk of a post-quantum breach.

        TEST YOUR QUANTUM READINESS
      • Ransomware Solutions
      • Remote Workforces Challenges
      • Software Monetization
        • Software Monetization
        • Software Monetization
        • Software License Management
        • Entitlement Management
        • Software Packaging & Pricing
        • Software Usage Tracking & Reporting
        • Software Protection & Licensing
        • Capture Revenue Opportunities
      • Zero Trust Security
      Best Practices For Secure Cloud Migration
      Best Practices for Secure Cloud Migration

      It's a Multi-Cloud World. Thales can help secure your cloud migration.

      GET THE WHITE PAPER
    • By Industry
      • By Industry
      • Automotive
      • Critical Infrastructure
      • Education
      • Government
        • Government
        • Government
        • Federal Government
        • State and Local Government
        • Law Enforcement
      • Financial Services
      • Healthcare
      • Insurance Providers
      • Manufacturing and Industrial
      • Media and Entertainment
      • Retail
      • SaaS Providers and Consumers
      • Telecommunications
      2025 Thales Consumer Digital Trust Index
      2025 Thales Digital Trust Index

      The Thales Consumer Digital Trust Index Report aims to empower individuals and organizations to own their role in protecting their cyberspace from data breaches.

      GET THE REPORT
    • By Compliance
      • By Compliance
      • Global
        • Global
        • Basel Compliance Solutions
        • Cybersecurity Maturity Model - CMMC
        • Data Breach Notification Laws
        • Data Sovereignty
        • GDPR
        • ISO 27799:2016 Compliance
        • ISO/IEC 27001:2022 Compliance
        • ISO/IEC 27002:2013 Compliance
        • PCI DSS
        • PCI HSM
        • Swift CSC
        • Validations and Certifications
      • Americas
        • Americas
        • Brazil - LGPD
        • CCPA (California Consumer Privacy Act)
        • CJIS
        • FDA/DEA - EPCS
        • FedRamp
        • FISMA
        • FIPS 199 and FIPS 200
        • FIPS 140-2
        • FIPS 140-3
        • GLBA
        • HIPAA
        • Mexico - Data Protection Law
        • NAIC Insurance Data Security Model Law Compliance
        • New York State Cybersecurity Requirements for Financial Services Companies Compliance
        • NCUA Regulatory Compliance
        • NIST 800-53, Revision 4
        • PIPEDA Compliance
        • SOX
        • STIR/SHAKEN
      • EMEA
        • EMEA
        • DEFCON 658
        • DORA
        • ECC
        • eIDAS
        • GDPR
        • NIS2
        • PSD2
        • Schrems II
        • South Africa POPI Act
      • APAC
        • APAC
        • Australia ASIC Market Integrity Rules
        • Australia APRA CPS234
        • Australia Privacy Amendment
        • Australia SOCI Act
        • Bangladesh ICT Security Guideline
        • China Personal Information Security Specification
        • Hong Kong CI Bill
        • Hong Kong Digital Assets Guidelines
        • Hong Kong Practice Guide for Cloud Computing Security
        • Hong Kong Secure Tertiary Data Backup (STDB) Guideline
        • Hong Kong Virtual Asset Trading Platforms Operators Guideline
        • India CSCRF by SEBI
        • India Digital Personal Data Protection Act
        • India Framework for Adoption of Cloud Services by SEBI
        • India IRDAI ICS Guidelines
        • India RBI Outsourcing of IT Services Directions
        • Indonesia Personal Data Protection Law
        • Japan Act on Protection of Personal Information
        • Japan My Number Compliance
        • J-Sox
        • Korea Personal Information and Information Security Management System (ISMS-P)
        • Monetary Authority of Singapore
        • Philippines Data Privacy Act of 2012
        • Philippines NPC Circular 2023-06
        • Risk Management in Technology (RMiT) Policy
        • Singapore MAS Advisory On Quantum
        • Singapore Public Sector Data Security
        • Singapore CCoP2.0
        • South Korea's PIPA
        • UIDAI's Aadhaar Number Regulation Compliance
        • Vietnam Personal Data Protection Decree
      Data Breach Notifications Map
      Protect Your Organization from Data Breach Notification Requirements

      Data breach disclosure notification laws vary by jurisdiction, but almost universally include a "safe harbor" clause.

      LEARN MORE
    Solutions to Secure Your Digital Transformation

    Whether it's securing the cloud, meeting compliance mandates or protecting software for the Internet of Things, organizations around the world rely on Thales to accelerate their digital transformation.

    Implementing Strong Authentication for Office 365
    Implementing Strong Authentication for Office 365

    Mitigate the risk of unauthorized access and data breaches.

    Learn More
  • Partners
    • Partners
    • Partners Overview
    • Find a Partner
    • Become a Partner
    • Channel Partners
    • Managed Service Providers
    • Technology Partners
    • OEM Partners
    • Advisory Partners
    • Cloud Partners
    • Partner Portal Login
    Thales Accelerate
    Partner Network

    Thales Partner Ecosystem includes several programs that recognize, rewards, supports and collaborates to help accelerate your revenue and differentiate your business. Provide more value to your customers with Thales's Industry leading solutions. Learn more to determine which one is the best fit for you.

    Thales Accelerate Partner Network

    The Thales Accelerate Partner Network provides the skills and expertise needed to accelerate results and secure business with Thales technologies.

    Get the Brochure
  • Resources
    • Area of Interest
    • Data Security
      • Resource Type
      • White Papers
      • eBooks
      • Case Studies
      • Infographics
      • Webinars
      • Videos
      • Security Research
      • Podcasts
      • TalkingTrust Video Series
      Gartner® Report: Market Guide for Data Security Platforms
      Gartner® Report: Market Guide for Data Security Platforms

      Download the 2025 guide for Data Security Platforms, and learn how combining data security controls and fine-grained authorization leads to more efficient data security.

      Get the Report
    • Access Management
      • Resource Type
      • White Papers
      • eBooks
      • Case Studies
      • Infographics
      • Webinars
      • Videos
      • Security Research
      • Podcasts
      • Magazine
      KuppingerCole Leadership Compass: Market Report and Guide for CIAM Solutions
      KuppingerCole Leadership Compass: Market Report and Guide for CIAM Solutions

      This report analyzes the CIAM market, and guides you to find the best solution for user registration, authentication, and compliance, enhancing customer experience.

      Get the Report
    • Software Monetization
      • Resource Type
      • Blog
      • Product Tours
      • FAQ
      • White Papers
      • Case Studies
      • Product Briefs
      • Infographics
      • Webinars
      • Learning Hub
      How to get SaaS Software Licensing Right the First Time
      How to get SaaS Software Licensing Right the First Time

      Explore the software licensing lifecycle, and how to build a cross-functional licensing team.

      Get the eBook
    • Blog
    Explore Thales' comprehensive resources for cloud, protection and licensing best practices.
    Thales CPL Corporate Brochure
    A Global Leader in Data Security

    Thales, together with Imperva, is a global leader in cybersecurity, helping the most trusted brands in the world protect their most critical applications, data, identities, and software anywhere at scale.

    GET THE BROCHURE
  • Search
  • Support
    • Customer Support
    • Software Monetization
      • Drivers & Downloads
      • Product Announcements / Training
    • Customers
      • Activate a Product / Support Portal
    • Data Protection
      • Product Announcements
      • Training Services
      • Technical Training Calendar
      • Professional Services
    • Security Updates
  • About
    • About Us
    • Leadership
    • Newsroom
    • News Coverage
    • Events
    • Customers
    • Industry Associations & Standards Organizations
    • Careers
    • Thales + Imperva
  • Contact Us
    • Contact Data Security
    • Contact Access Management
    • Contact Software Monetization
  • EN
    • English (GB)
    • Français
    • Deutsch
    • Italiano
    • Español
    • Português
    • 日本語
    • 한국어
    • Microsites

    • Polskie
    • Nederlands
    • 中文(繁體)
Thales banner

Thales 고객들

고객 성공 사례 살펴보기

Select an Industry
  • Select an Industry
Clean Energy Provider
Siemens Energy Automation
Major European Energy Utility
Canadian Energy Utility
Fortune 500 biotech firm
US Healthcare Organization
Redcentric
Latin American Financial Institution
Resonance Australia
Large European Financial Institution
NAVER Cloud
Major North American Bank
Global Automotive Manufacturer
Vaxtor logo
Quadrac Co logo
Independent Software Vendor
Reduce Operational Costs and Increase Customer Satisfaction with Sentinel Up - Case Study
Leading Financial Security Group in Asia Pacific
PrimeKey

Pagination

  • First page « First
  • Previous page ‹ Previous
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Current page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Next page Next ›
  • Last page Last »
Thales logo - white

cpl.thalesgroup.com

홈페이지 바로가기

www.thalesgroup.com
  • 제품
    • 암호화
    • 애플리케이션 보안
    • ID 및 액세스 관리
    • 소프트웨어 수익화
  • 솔루션
    • 산업별
    • 규제별
    • 활용사례 별
  • 파트너
    • 파트너
    • 파트너 찾기
  • 리소스
    • 리소스 라이브러리
    • 블로그
    • 팟 캐스트
  • 지원
    • 탈레스 고객 지원
    • 트레이닝 서비스
  • 소개
    • 연락처
    • 인도 전자쓰레기 프로그램
    • 뉴스룸
Copyright © Thales. All Rights Reserved
    • 개인정보보호
    •   공지사항
    •   사이트맵
    •   쿠키 정책
    •   용어 및 계약사항
Partners Resources Blogs Sentinel Drivers