Cyber Range platform is a powerful tool to organize and deliver cybersecurity trainings (Pentest, Forensic, etc …) offering expert contents.
All Articles in CyberDefence Solutions
From communication, navigation and Earth observation satellites to scientific research and exploration, the space industry is coming to play a crucial role in the daily lives of individuals, businesses and governments.
Everything you need to know about the new wave of unseen threat
Thales and TheGreenBow join forces to offer a high-security encryption solution for network communications
In today’s increasingly connected world, the security of our information systems is more crucial than ever. In response to rapidly changing mobility and security needs, Thales, a leader in the cybersecurity market, and TheGreenBow, a French provider of VPN solutions, ha...
Thales, The First Group to Join The Campus Cyber in Paris, La Défense, And Lend Its Expertise to the Service of This New Ecosystem
April 2022 saw the arrival of about sixty Thales employees, engineers, consultants, and cybersecurity project managers on the Cyber Campus. To mark the occasion, Patrice Caine underlined its role as a catalyst for international cyber excellence in a context of globaliza...
Thales launches its sixth Cyber Security Operations Center in Morocco to serve the African continent
Thales is opening a new Cyber Security Operations Center (SOC) in Morocco, the sixth in its international network. This center will provide real-time protection against cyber-attacks in the country and across the African continent as a whole. ...
Thales and Google Cloud Announce Strategic Partnership to Jointly Develop a Trusted Cloud Offering in France
The jointly developed sovereign cloud offering will meet the French "Trusted Cloud" requirements and enable French organizations to innovate and fully benefit from hyperscale cloud technology, while keeping their data confidential, secure and fully sovereign. This...
A network diode that guarantees total control of the exchanged data to avoid compromise of sensitive data and ensure the protection of secrecy.
Securing transfer of information between classified or critical networks.