The Guidelines for the Provision of Information Technology Systems (แนวปฏิบัติในการจัดให้มีระบบเทคโนโลยีสา รสนเทศ นป. 6/2567) issued by the Securities and Exchange Commission of Thailand (SEC) are designed to ensure that financial institutions, securities companies, and other regulated entities maintain secure, reliable, and efficient IT systems. The guidelines are part of Thailand’s broader regulatory framework aimed at strengthening cybersecurity, data protection, and operational resilience in the capital markets.
Explore solutions for the Information Technology Risk Management Guidelines compliance in the financial sector, covering information technology security and more.
Thales’ Cybersecurity Solutions help financial institutions address 6 requirements in Chapter 2 – Information Technology Security by simplifying compliance and automating security with visibility and control, reducing the burden on security and compliance teams.
Protect applications and APIs at scale in the cloud, on-premises, or in a hybrid model. Our market leading product suite includes Web Application Firewall (WAF), protection against Distributed Denial of Service (DDoS) and malicious BOT attacks, security for APIs, a secure Content Delivery Network (CDN), and Runtime Application Self-Protection (RASP).
Discover and classify sensitive data across hybrid IT and automatically protect it anywhere, whether at rest, in motion, or in use, using encryption tokenization and key management. Thales solutions also identify, evaluate, and prioritize potential risks for accurate risk assessment as well as identify anomalous behavior, and monitor activity to verify compliance, allowing organizations to prioritize where to spend their efforts.
Provide seamless, secure and trusted access to applications and digital services for customers, employees and partners. Our solutions limit the access of internal and external users based on their roles and context with granular access policies and Multi-Factor Authentication that help ensure that the right user is granted access to the right resource at the right time.
Identity & Access Management
BYOI & Social Login Identity Verification
Identity & Access Management
Data Security
Identity & Access Management
Identity & Access Management
Data Security
Identity & Access Management
Identity & Access Management
Application Security