Direkt zum Inhalt
Results from the CPL website cpl.thalesgroup.com

Exclusive Networks SL

The Exclusive story We work with thousands of partners around the world to empower their businesses with new opportunities in cybersecurity and cloud, helping them to achieve new benefits in a field…

SM Homepage Revision

Navigate The Process of Licensing, Delivering, and Protecting Your Software - White Paper

How to Get Software Licensing Right The First TimeCheck out our practical guide to navigating the process of licensing, delivering, and protecting your software. Discover the importance of optimizing…

Data security compliance with the ISO/IEC 27001:2022 - information security, cybersecurity, and privacy protection standard - eBook

ISO (International Organization for Standardization) is an independent, non-governmental international organization with a membership of 170 national standards bodies. ISO/IEC 27001 is jointly…

CipherTrust Data Security Platform - New Tech Demo Video

The CipherTrust Data Security Platform integrates data discovery, classification, data protection and unprecedented granular access controls, all with centralized key management. Watch the…

Thales Blogs

Stay up to date with data security best practices and industry news.

DSAR and CIAM: A Strategic Guide for Businesses

Introduction to Data Subject Access Requests and CIAMWhen the GDPR was enforced in 2018, it set out to give individuals control over their data by granting eight data subject rights. One of these…

Access Management & Authentication

Access management enables the right user access to the right resource at the right level of trust. IAM solutions address these challenges, and enable secure cloud adoption.

SSO Integration in Minutes

Configure your single sign-on - SSO app, policy configuration and multi-factor authentication for all your cloud and web apps with our SSO integration catalog.

Passwordless Authentication

Discover how passwordless authentication works with Single Sign On (SSO), PIN, and OTP - more secure than traditional passwords.