- Thales reveals today the names of the 9 startups selected to join its 6-month cybersecurity programme at STATION F, the world’s largest startup campus.
Le Groupe La Poste launches trials with Thales to determine optimum response to new cybersecurity legislationLe Groupe La Poste and Thales today announced the start of a 12-month trial aimed at improving implementation of the measures enacted in France's Military Programming Law (LPM) to heighten the security of the information systems deployed by critical infrastructure providers.
When confronted with disruptive technologies and cyberthreats, rely on Thales to ensure the optimal performance, resilience and security for your Critical Information Systems.
As a world leader in cryptographic security products and cutting edge strategies, we work with a number of sectors and businesses to provide complex safeguard solutions for:
- Critical government and military infrastructures
- Satellite networks
- Energy & utilities
- Banking & insurance
- High tech
With our clients including:
Thales experts in cyber-protection work closely with our clients to harbour their data and business. By choosing Thales, you benefit from:
- A team of 5,000 critical IT engineers with 2 000 experts in cybersecurity
- A partner with more than 40 years of experience protecting classified information up to the Top Secret level
- A global actor with products and solutions deployed in more than 50 countries
- A reliable service provider with experience operating and monitoring the critical information systems of over 100 customers
When it comes to critical systems, we have you covered
As of January 2015, there were approximately three billion internet users in the world and more than 1.2 billion websites. The internet has grown exponentially and so have the number of cyberattacks. Today’s hackers are more persistent, more targeted and more threatening. At Thales, we provide the vital end-to-end information security you need to not only prevent and to detect attacks but also to react rapidly if they occur.
Thales enables you to go beyond security and to ensure resilient and high-performance critical information systems that integrate breakthrough technologies. We design, develop and operate fully secured information systems throughout their lifecycle to help you master your critical data. Disruptive technologies such as Cloud computing, Big data and the Internet of Things are now an opportunity to move your business forward.
We offer an end-to-end portfolio of solutions adapted to your specific needs and constraints. More information: Our Global Offer
At Thales, we work hard to remain at the cutting edge of information systems and security technology. Our Thales European Research Centre for Security & Information Systems (ThereSIS) develops and implements differentiating solutions to ensure your legacy systems incorporate the latest technologies. Our research is grouped around nine areas: cybersecurity, data value and Big analytics, video analysis, networking, smart systems, biometric simulation, application security, Cloud computing, and real-time and embedded architecture.
Contact us to find out how we can help you to create high-performing, resilient and secure systems.
Managed Security ServicesConfronting new security challenges
Cloud computingMaximising agility, minimising cost
HySIO (Hybrid Secure IT Outsourcing)A flexible IS environment meets heterogeneous business needs
Cybersecurity Consulting and EvaluationHope for the best. Prepare for the worst.
Trust managementSafeguard your critical data
Mobile SecuritySecurity on the go
Secure NetworksManaging security in a world of open networks
Big dataMining for value in mountains of data
Secure multimedia platformsReliable and secure multimedia at your service
Software SolutionsFrom ready-made to tailor-made software
Transformation for Better CompetitivenessExisting systems must meet new challenges
Military information securityHighly sensitive data meets new challenges
Augmented reality and virtual reality3D innovation to boost competitive performance
Data protection, VormetricEncryption of databases, file systems and even connected objects has become a vital necessity.
Feel free to
download the files