Aller au contenu principal
Résultats à partir du site CPL cpl.thalesgroup.com

FIPS 140-3

Thales helps you meet your needs for data security compliance with FIPS 140-3 certified products

Secure Your Data Analytics with the Thales Data Security Platform - Video

 Find out how to secure Data Analytics with a Data Security Approach.

Hung Phat Investment and Development Joint Stock Company (HPID)

Hung Phat Investment Development Corporation (HPID) is a leading IT distributor in Vietnam specializing in Cybersecurity Solutions. With over 15 years of experience and strong global partnerships,…

Data Protection Demos

2022 Thales Access Management Index - Global Edition Report

The impact of remote work throughout the COVID-19 pandemic has caused both security professionals and the average technology user to be more aware of security concerns and how to address them. The…

2022 Thales Access Management Index - APAC Edition - Report

The impact of remote work throughout the COVID-19 pandemic has caused both security professionals and the average technology user to be more aware of security concerns and how to address them. The…

2022 Thales Access Management Index - Europe and Middle East Edition - Report

The impact of remote work throughout the COVID-19 pandemic has caused both security professionals and the average technology user to be more aware of security concerns and how to address them. The…

4 Steps to Cloud Access Management - eBook

Cloud Access Challenges in the EnterpriseLeveraging cloud-based applications comes with challenges. As organizations embrace cloud apps for their quick time to value and best of breed technology,…

Access Management Primer - Fact Sheet

  What is Cloud Access Management and Who Needs It? Cloud applications are excellent at providing organizations the best technology at a quick time to value, zero maintenance overhead and…

Access Management Handbook – eBook

Identity and access management key concepts, technologies and standards compiled for you in this Access Management ebook . You will learn: • Authentication and access management differences •…