Pasar al contenido principal
Results from the CPL website cpl.thalesgroup.com

eHerkenning

Why architects should rethink authorizations - Webinar

How to future proof authorization with policy-based accessRecorded June 2, 2022In the digital era, organizations are increasingly interacting online with contractors, partners, and customers.…

Bouncing Back: How to Investigate and Recover After a Ransomware Attack

You've likely seen the headlines about ransomware attacks and the monumental challenges they pose for organizations. But what should you do when an attack occurs, even if you have a ransomware…

Home - Cloud Protection & Licensing Solutions

The world relies on Thales to protect and secure access to your most sensitive data and software wherever created, shared or stored. Building an encryption strategy, licensing software, providing…

IIFL Group Differentiates Itself with Early Adoption of Mandatory Security Regulations in Appropriate Places - Case Study

How Thales helped a leading financial conglomerate become one of the first Regulated Entities to initiate compliance with a new government security regulation — reinforcing the conglomerate’s…

Identity Verification

What is PSD2?

The European Union’s Revised Payment Services Directive (PSD2), was designed to push the financial services market in Europe in a safe and secure way by amending the ground rules for financial…

Navigating GDPR Compliance with CIAM: A Quick Guide

Pres Node | IAM Homepage

Luna Network HSM - Product Brief

Secure your sensitive data and critical applications by storing, protecting and managing your cryptographic keys in Thales Luna Network Hardware Security Modules (HSMs) - high-assurance, tamper-…