The German armed forces make extensive use of cryptographic keys to ensure the security and discretion of their operational communication systems. To manage these keys efficiently, they need a highly reliable, flexible system that is compatible with the systems in serv...
Thales Alenia Space recently delivered the high-gain antenna (HGA) for the JUICE (Jupiter Icy Moons Explorer) mission to prime contractor Airbus Defence & Space. Despite the coronavirus pandemic, our engineers and technicians continue to perform critical operations for...
For asset intensive organisations, predictive maintenance is regarded as one of the top opportunities and hence priorities and for the coming years. Bernard Roux, CEO of Thales in the UAE, expands on how the benefits of predictive maintenance can be unlocked.
...
Thales has developed a centralised solution to manage security at military sites. Harnessing the latest technologies and operated via an intuitive user interface, the Security Digital Platform enables operators to counter any type of threat and even anticipate threats ...
CWITX is a solid state scalable and versatile Continuous Wave Illumination transmitter for missile guidance support within the successful family of Thales’ Track and illumination systems.
Cybels KMC is the most capable key management platform on the market today. Designed by Thales, a world leader in data protection, this cloud-based Key Management Centre is robust and interoperable and ensures maximum availability and flexibility for users.
...
The AENA airports authority, Iberia, Inetum and Thales partner in this ambitious project, supported by Spain’s Industrial Technology Development Centre (CDTI).
It uses biometric identification of passengers with tablet-type devices.
Project aims to increase securit...
Misoft is one of the leading companies in Information Security in Vietnam. We are a professional information security consulting firm, a major partner and authorized distributor of many of the world'…
Organizations around the world have been rapidly modernizing their IAM infrastructures in response to increased cyberattacks and data breaches, enactment of security and privacy regulations, and a…
We develop the appropriate IT architecture so that our customers can securely shape their future corporate development. In doing so, we adapt to individual needs and accompany all digital processes…