Skip to main content
Results from the CPL website cpl.thalesgroup.com

Access Management & Authentication

Access management enables the right user access to the right resource at the right level of trust. IAM solutions address these challenges, and enable secure cloud adoption.

Thales Blogs

Stay up to date with data security best practices and industry news.

Why Data Sovereignty and Privacy Matter to You—Not Just Nations

It started with a well-meaning mistake.Bernie, a project manager at a mid-Atlantic regional health provider, was coordinating a data science initiative with an external partner. As part of the…

Home - Cyber Security Solutions

The world relies on Thales to protect and secure access to your most sensitive data and software wherever created, shared or stored. Building an encryption strategy, licensing software, providing…

Security Sessions Podcast - Thales

Series 3 - Episode 5

Security Sessions Podcast - Episode #5.3

Thales & Red Hat Secure Data in Kubernetes - Solution Brief

Learn how Thales and Red Hat secure data at rest and in transit across hybrid cloud and Kubernetes environments. Improve compliance and reduce risk.

TEMP | CipherTrust Tokenization

CipherTrust Transparent Encryption

Transparent Encryption (Formerly Vormetric Encryption). Data-at-rest, centralized key management, privileged user access control & detailed data access audit logging.

Unstructured Data Security Solutions