Pasar al contenido principal
Results from the CPL website cpl.thalesgroup.com

TrustAsia Technologies, Inc.

TrustAsia is a leading and professionally-certified certification authority in China with its focus on trusted, secure and cryptographic communications in the digital world. With nearly 20 years’…

SHI International Corp.

From software and hardware procurement to deployment planning, configuration, data center optimization, IT asset management and cloud computing, SHI offers custom IT solutions for every aspect of…

NIS2 Directive - Enhancing Cybersecurity Across the EU

Thales Blogs

Stay up to date with data security best practices and industry news.

IAM and Passkeys: 4 Steps Towards a Passwordless Future

In the ever-evolving landscape of cybersecurity, Identity and Access Management (IAM) remains a vital link in the cybersecurity chain. However, with World Password Day just around the corner, there’s…

Aujas Cybersecurity Limited

Aujas CodeSign is an automated DevOps ready Software Offering for Cryptographic Code Signing, establishes the integrity of the code and detects any alterations. Code signing certificates are issued…

Luna Network Hardware Security Module - Product Brief

Secure your sensitive data and critical applications by storing, protecting and managing your cryptographic keys in Thales Luna Network Hardware Security Modules (HSMs) - high-assurance, tamper-…

Entitlements for Support and Training - Product Brief

Sentinel EMS has long established itself as a versatile and scalable Entitlement Management platform.  However, the entitlements produced by Sentinel EMS are not just for software products, but they…

The Definitive Guide To Entitlements And Entitlement Management - eBook

In the dynamic world of profitable software growth, entitlements hold the key to more than just access—they're your gateway to unprecedented monetization. If you want to create an efficiency…

Come see us at RSA Conference™ 2024!

Come visit us at RSA Conference 2023 and see how you can rely on Thales to help you discover, protect, and control access to your sensitive data wherever it is – from the cloud, data centers, or…