Skip to main content
Results from the CPL website cpl.thalesgroup.com

IIFL's Cybersecurity Journey: Addressing SEBI Mandates and Improving Security Posture - Video

 Discover how IIFL Group seized a competitive edge by becoming one of India’s first financial firms to fully implement SEBI’s cloud-security and encryption mandates.

Cloud Encryption: What Your Cloud Provider Covers -- and What’s Still on You

The Thales 2025 Data Threat Report revealed that cloud assets such as SaaS applications, cloud-based storage, and cloud infrastructure management were the greatest targets for attack. Hence, 64% of…

Thales Blogs

Stay up to date with data security best practices and industry news.

Unstructured Data Security Solutions

Discover and protect sensitive unstructured data with Thales File Activity Monitoring - Video

How to use the AI Data Security Assistant to investigate unstructured data accessThe AI Data Security Assistant is a generative AI-powered chatbot integrated into Thales File Activity Monitoring (FAM…

Amazon Web Services (AWS)

Amazon Web Services (AWS) is the world's most comprehensive and broadly adopted cloud platform, providing on-demand cloud computing platforms and APIs to individuals, companies, and governments on a…

Security Sessions Podcast - Episode #5.4

Multi-Factor Authentication (MFA)

Learn what multi-factor authentication (MFA) is, how to strengthen your authentication, and what MFA offers Thales has to fit your needs. 

IIFL Group Differentiates Itself with Early Adoption of Mandatory Security Regulations - Case Study

How Thales helped a leading financial conglomerate become one of the first Regulated Entities to initiate compliance with a new government security regulation — reinforcing the conglomerate’s…

Achieve Digital Sovereignty with Thales - eBook

When thinking about a successful cloud strategy, Thales sees 3 major pillars that support digital sovereignty objectives: data sovereignty, operational sovereignty, and software sovereignty.Why are…