Skip to main content
Results from the CPL website cpl.thalesgroup.com

IIFL Group Differentiates Itself with Early Adoption of Mandatory Security Regulations in Appropriate Places - Case Study

How Thales helped a leading financial conglomerate become one of the first Regulated Entities to initiate compliance with a new government security regulation — reinforcing the conglomerate’s…

Access Management & Authentication

Access management enables the right user access to the right resource at the right level of trust. IAM solutions address these challenges, and enable secure cloud adoption.

Single Sign-On (SSO)

IAM Solutions Demo

Software Monetization Solutions by Thales

Pres Node | IAM Homepage

SM Homepage Revision

Thales Blogs

Stay up to date with data security best practices and industry news.

Bouncing Back: How to Investigate and Recover After a Ransomware Attack

You've likely seen the headlines about ransomware attacks and the monumental challenges they pose for organizations. But what should you do when an attack occurs, even if you have a ransomware…

eHerkenning