Skip to main content
Results from the CPL website cpl.thalesgroup.com

Quantum computing & quantum-safe security - White Paper

This paper looks at the implications of quantum computing on the cybersecurity landscape. It explores what the technology is, alongside its benefits and threats. It also analyzes the need for quantum…

Come see us at RSA Conference™ 2024!

Come visit us at RSA Conference 2023 and see how you can rely on Thales to help you discover, protect, and control access to your sensitive data wherever it is – from the cloud, data centers, or…

Exclusive Networks SL

The Exclusive story We work with thousands of partners around the world to empower their businesses with new opportunities in cybersecurity and cloud, helping them to achieve new benefits in a field…

SM Homepage Revision

Navigate The Process of Licensing, Delivering, and Protecting Your Software - White Paper

How to Get Software Licensing Right The First TimeCheck out our practical guide to navigating the process of licensing, delivering, and protecting your software. Discover the importance of optimizing…

Data security compliance with the ISO/IEC 27001:2022 - information security, cybersecurity, and privacy protection standard - eBook

ISO (International Organization for Standardization) is an independent, non-governmental international organization with a membership of 170 national standards bodies. ISO/IEC 27001 is jointly…

CipherTrust Data Security Platform - New Tech Demo Video

The CipherTrust Data Security Platform integrates data discovery, classification, data protection and unprecedented granular access controls, all with centralized key management. Watch the…

Thales Blogs

Stay up to date with data security best practices and industry news.

DSAR and CIAM: A Strategic Guide for Businesses

Introduction to Data Subject Access Requests and CIAMWhen the GDPR was enforced in 2018, it set out to give individuals control over their data by granting eight data subject rights. One of these…

Access Management & Authentication

Access management enables the right user access to the right resource at the right level of trust. IAM solutions address these challenges, and enable secure cloud adoption.