Skip to main content
Results from the CPL website cpl.thalesgroup.com

Home - Cyber Security Solutions

The world relies on Thales to protect and secure access to your most sensitive data and software wherever created, shared or stored. Building an encryption strategy, licensing software, providing…

Security Sessions Podcast - Thales

Series 3 - Episode 5

Security Sessions Podcast - Episode #5.3

Thales & Red Hat Secure Data in Kubernetes - Solution Brief

Learn how Thales and Red Hat secure data at rest and in transit across hybrid cloud and Kubernetes environments. Improve compliance and reduce risk.

Why Data Sovereignty and Privacy Matter to You—Not Just Nations

It started with a well-meaning mistake.Bernie, a project manager at a mid-Atlantic regional health provider, was coordinating a data science initiative with an external partner. As part of the…

TEMP | CipherTrust Tokenization

CipherTrust Transparent Encryption

Transparent Encryption (Formerly Vormetric Encryption). Data-at-rest, centralized key management, privileged user access control & detailed data access audit logging.

Unstructured Data Security Solutions

Securing Unstructured Data with FAM - White Paper

Thales NFC Reader for Contactless Access - Product Brief