Advanced technologies

Advanced software architecture

Many Thales systems are “embedded” and need to communicate with each other. Power consumption and response speed are key factors. That is why software architecture has evolved from centralized large ground servers to distributed intelligence on board aircraft, drones, ships, and satellites. The exchange of sensitive data therefore requires a very high level of cybersecurity.

Edge Architectures and Portable Applications

Edge computing brings computation and data storage closer to the sources of data generation. It encompasses a wide range of devices, from IoT sensors to local servers. By reducing data transfers, this technology minimizes latency and improves response times, making it ideal for real-time applications. 

Portable and reusable applications designed for Edge devices are optimized for resource- and energy-constrained environments. They enable a wide range of use cases, such as video surveillance systems that process data locally, and factories that optimize production processes and predict maintenance needs.

Edge computing presents several challenges, such as managing distributed infrastructures, ensuring data consistency, and maintaining security across numerous devices. As the technology evolves, standardization and interoperability become critical.
Edge computing and portable applications are transforming data processing making it faster, more reliable, and more secure. This is essential for Thales products designed for critical environments.

© Thales

© Thales

Open Source Software

Open Source is more than just a software development method: it is a movement built on collaboration, transparency, and sharing. By fostering collective innovation, it enables everyone to contribute, learn, and improve projects used worldwide. At Thales, this strategic approach accelerates innovation, enhances security, and attracts top talent.

Open Source: Building Tomorrow, Together

At Thales, Open Source is more than just a technological choice: it’s a philosophy of openness and collaboration. By sharing code, ideas, and expertise, we develop robust, transparent solutions tailored to future needs. Together, we’re shaping a safer, more innovative digital world. 

Key figures

300+
repositories
400+
contributors
250+
contributions

Product Cybersecurity

Cybersecurity is embedded in all Thales products and solutions, whether civil or military. Regardless of use cases or technologies, Thales aims to ensure end-to-end security. The Group brings comprehensive expertise across cryptography, hardware, AI, and more. 

The potential arrival of quantum computers is set to revolutionize the world of cryptography. It is widely acknowledged that standard cryptographic protections will not withstand quantum computing. However, specialized algorithms capable of providing sufficient protection are already being developed today.

As part of tomorrow’s cryptographic standards, Thales’ post-quantum algorithm Falcon has been selected by the NIST (National Institute of Standards and Technology), positioning us as a key player in the migration toward post-quantum cryptography.

Security starts at the hardware level. Thales designs robust platforms, including Hardware Security Modules (HSMs) and secure chips, which meet the highest security standards.
We are also actively involved in the RISC-V community and have full control over the processors used in our products and solutions ensuring cybersecurity, technological sovereignty, and energy efficiency.

© Kakkoi Studio

© Kakkoi Studio

Memory safety

Memory safety is a fundamental concept in computer science that ensures a program can only access memory locations that have been explicitly allocated to it. This prevents unauthorized or unintended memory access, which can lead to various errors and security vulnerabilities. It represents the vast majority of security vulnerability, as illustrated below on Windows operating system.

In contrast, languages like Rust and Java provide mechanisms to ensure memory safety. Rust, for example, uses a system of ownership with rules checked at compile time to ensure that memory is accessed safely, explaining its widespread usage and growth, despite its steep learning curve. Rust also enable a left-switch in the development process, finding and preventing defects earlier in the software development process.

Become part of our team and help shape the Thales journey.