Results from the CPL website cpl.thalesgroup.com
How Thales and AWS Address Advanced Sovereignty Requirements in the Cloud
As regulatory requirements for digital sovereignty continue to evolve, European organizations—particularly in highly regulated sectors—are seeking solutions that address emerging national sovereignty…
NIST CSF 2
What is NIST CSF 2.0
Security Sessions Podcast - Episode #5.3
Explore the Sentinel Licensing and Entitlement Management Platform
End-to-End Data Protection
CipherTrust Transparent Encryption - Product Brief
Safeguarding sensitive data requires much more than just securing a data center’s on-premises databases and files. The typical enterprise today uses three or more IaaS or PaaS providers, along with…
Thales & Red Hat Secure Data in Kubernetes - Solution Brief
Learn how Thales and Red Hat secure data at rest and in transit across hybrid cloud and Kubernetes environments. Improve compliance and reduce risk.
Discover and protect sensitive unstructured data with Thales File Activity Monitoring - Video
How to use the AI Data Security Assistant to investigate unstructured data accessThe AI Data Security Assistant is a generative AI-powered chatbot integrated into Thales File Activity Monitoring (FAM…