Skip to main content

Critical data protection: the keys to security

Cloud computing, virtualisation and growing use of mobile devices are creating new vulnerabilities and more potential points of exposure than ever before. Thales is a global leader in cryptographic security, providing a complete set of products and solutions to protect data confidentiality, integrity and availability.

Organisations are turning increasingly to encryption to protect their sensitive data.[1] But they face two major challenges: knowing which data is sensitive and securely managing their encryption keys.
Thales is a leading global provider of data protection solutions, supporting its customers in the implementation of their encryption policies and systems. Our solutions provide the highest levels of security in the industry while offering significant advantages over other products in terms of ease of deployment and operational efficiency.

40 years of experience

Leveraging 40 years of experience in protecting the most sensitive information, Thales products are designed to integrate seamlessly with a broad range of business processes and applications, enabling services such as encryption and digital signing to be performed on certified, purpose-built trust platforms, rather than on increasingly vulnerable standard application servers.

Key protection and comprehensive lifecycle management are the backbone of any cryptographic system. Stolen keys can lead to data theft, while lost keys can result in lost data and inefficient key management can significantly degrade application performance.
 

Hardware Security Modules (HSMs) provide a hardened, tamper-resistant environment for performing secure cryptographic processing, key protection and key management.
HSMs from Thales provide support for the widest range of cryptographic algorithms, application programming interfaces (APIs) and host operating systems.

Thanks to our unparalleled expertise in key management, delivered across multiple product lines, Thales solutions provide tamper-resistant protection for critical cryptographic keys. They integrate with a wide range of custom and commercial security applications and critical infrastructure, extending and enhancing the level of trust they deliver.
Together, our solutions help thwart today’s targeted attacks and the risk of sensitive data exposure introduced by cloud computing, increased connectivity and the growing use of consumer devices in the workplace. Trusted cryptography ensures maximum security across a broad spectrum of use cases, including encryption and privacy, digital signing and identity (PKI) and conventional and emerging mobile payment technologies.
 
For more information, visit the Thales e-Security website.
 

Market-leading products
From hardware security modules (HSMs) to identity management and key management, our solutions protect the production, storage, management and use of encryption keys for a broad spectrum of use cases. Our market-leading products include:
  • The nShield range of multi-purpose HSMs, which provide high-grade encryption services for a wide range of applications, application programming interfaces (APIs) and host operating systems.
  • The payShield range of HSMs, designed specifically to protect card transactions, payment card issuance and mobile payments. Used in almost 80% of payment card transactions worldwide.
  • keyAuthority® securely manages and archives encryption keys using hardened equipment compatible with the KMIP standard (Key Management Interoperability Protocol).

 

Certified encryption tools
With Thales, benefit from the experience of a trusted partner with a proven track record of protecting government and corporate data worldwide for 40 years. Our key management solutions and hardware security modules are:

 

[1] See the Global Encryption and Key Management Trends report published by Thales and the Ponemon Institute in April 2015.