banner

Cloud Protection & Licensing Resources

Comprehensive information about cloud protection and licensing best practices

Get in Touch

x
  • filter imgWhite Papers
  • filter imgBrochures
  • filter imgCase Studies
  • filter imgData Sheets
  • filter imgeBooks
  • filter imgInfographics
  • filter imgProduct Briefs
  • filter imgSolution Briefs
  • filter imgVideos
  • filter imgWebinars
  • filter imgIntegration Guides
  • filter imgCompliance Briefs

Case Study

Large department store chain protects brand and sensitive credit card

Large Department Store Chain Protects Brand and Sensitive Credit Card and Customer Data With CipherTrust Platform - Case Study

Download Now

Brochure

OneWelcome Gig Worker Identity

OneWelcome Gig Worker Identity - Brochure

Download Now

Case Study

 High Retail grocery chain protects sensitive data in motion with ThalesSpeed Encryptors - TN

Retail grocery chain protects sensitive data in motion with Thales High Speed Encryptors - Case Study

Download Now

Case Study

Major North American retail chain leverages Luna HSMs to implement comprehensive data security and key management best practices - Case Study

Major North American retail chain leverages Luna HSMs to implement comprehensive data security and key management best practices - Case Study

Download Now

Solution Brief

Thales Passwordless FIDO2 Authentication for Azure AD, part of Microsoft Entra

Thales Passwordless FIDO2 Authentication for Azure AD, part of Microsoft Entra - Solution Brief

Download Now

Whitepaper

2022 Thales Access Management Index Global Edition - Report

2022 Thales Access Management Index - Global Edition Report

Download Now

Infographic

2022 Thales Access Management Index Global Edition - Infographic

2022 Thales Access Management Index Global Edition - Infographic

Download Now

Case Study

High-Assurance Encryption Of Man Infrastructure For Smart City

High-Assurance Encryption Of Man Infrastructure For Smart City - Case Study

Download Now

eBook

Addressing of Requirements Personal Information Protection

Addressing Requirements of Personal Information Protection Law - eBook

Download Now