cpl.thalesgroup.com Open in urlscan Pro
54.244.122.2  Public Scan

Submitted URL: http://cpl.thalesgroup.com/
Effective URL: https://cpl.thalesgroup.com/
Submission: On January 29 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET /search

<form method="GET" action="/search">
  <input type="text" class="search-input" name="search" placeholder="Let’s find what you’re looking for...">
  <button type="submit" class="btn-default">Search</button>
</form>

GET /search

<form method="GET" action="/search">
  <input type="text" class="search-input" name="search" placeholder="Let’s find what you’re looking for...">
  <button type="submit" class="btn-default">Search</button>
</form>

Text Content

node/12096

 
 
 
 * Products
    * Products
    * Products Overview
    * Data Protection
       * Data Protection
       * Data Protection Overview
       * Data Discovery & Classification
       * Data at Rest Encryption
          * Data at Rest Encryption
          * Data at Rest Encryption
          * Data Security Platform
          * Transparent Encryption
          * Encryption for Kubernetes
          * Encryption UserSpace
          * Application Data Protection
          * Tokenization
          * Data Protection Gateway
          * Database Protection
          * Batch Data Transformation | Static Data Masking
          * Intelligent Protection
          * Selecting the Right Encryption Approach
      
       * Key Management
          * Key Management
          * Key Management
          * CipherTrust Manager
          * Data Security Manager
          * CipherTrust Cloud Key Manager
          * Enterprise Key Management
          * CipherTrust Platform for Dev/Ops
      
       * Hardware Security Modules
          * Hardware Security Modules
          * Hardware Security Modules
          * General Purpose HSMs
          * Payment HSMs
          * Luna Cloud HSM Services
      
       * Data Protection on Demand
          * Data Protection on Demand
          * Data Protection on Demand
          * Services
          * How it Works
          * Partners
          * Pricing
          * Sign Up Now
      
       * Network Encryption
       * Secure File Sharing
      
      Risk Management Strategies for Digital Processes with HSMs
      
      Security architects are implementing comprehensive information risk
      management strategies that include integrated Hardware Security Modules
      (HSMs). Reduce risk and create a competitive advantage.
      
      Get the White Paper
    * Access Management & Authentication
       * Access Management & Authentication
       * Workforce IAM
          * Workforce IAM
          * Workforce IAM
          * SafeNet Trusted Access
          * Identity-as-a-Service
          * SAML Authentication
      
       * Customer IAM
       * Cloud SSO
          * Cloud SSO
          * Cloud SSO
          * SSO Application Catalog
      
       * Authentication
          * Authentication
          * Authentication
          * Authentication as a Service
          * Authenticators
          * Certificate-Based PKI USB Authenticators
          * Certificate-Based Smart Cards
          * FIDO Devices
          * OTP Authenticators
          * Tokenless Authentication
          * On-Prem Management Platforms
          * Security Apps
          * Smart Card Readers
          * Passwordless Authentication
      
       * Customer Success Stories
       * Sign Up Now - STA Free Trial
       * STA Demo
      
      Access Management Handbook
      
      Get everything you need to know about Access Management, including the
      difference between authentication and access management, how to leverage
      cloud single sign on.
      
      Get the eBook
    * Software Monetization
       * Software Monetization
       * Software Monetization Overview
       * Sentinel Rights Management System - RMS
       * Sentinel Entitlement Management System - EMS
       * Sentinel License Development Kit - LDK
       * Software License & Copy Protection - Sentinel SL and CL
       * All Software Licensing Products
      
      How to Get Software Licensing Right The First Time
      
      Check out our practical guide to navigating the process of licensing,
      delivering, and protecting your software.
      
      Get the White Paper
   
   How We Can Help
   
   You can rely on Thales to help protect and secure access to your most
   sensitive data and software wherever it is created, shared or stored.
   
   payShield 10K
   
   The hardware security module that secures the world's payments.
   
   Learn More
 * Solutions
    * Solutions
    * Solutions Overview
    * By Use Case
       * By Use Case
       * 5G Security
       * Access Security
          * Access Security
          * Access Security
          * Secure Remote Access
          * Secure VPN Access
          * Secure Cloud Access
          * VDI Security Solutions
          * 2FA Solutions
          * Web and Cloud SSO
          * Physical & Logical Access Control
          * MFA for Cyber Insurance
      
       * Blockchain
       * Cloud Security
          * Cloud Security
          * Cloud Security
          * Amazon Web Services
          * Bring Your Own Encryption (BYOE)
          * Cloud Data Encryption
          * Cloud SSO
          * Google Cloud
          * Luna HSMs – Hybrid, On-Premises and Cloud HSM
          * Microsoft Azure
          * Microsoft Double Key Encryption (DKE)
          * Multi-Cloud Security
          * SaaS Security
      
       * Data Security & Encryption
          * Data Security & Encryption
          * Data Security & Encryption
          * Advanced Persistent Threats (APTs)
          * Big Data Security
          * Database Security and Encryption
          * Docker Encryption
          * Encryption for Kubernetes
          * Encryption UserSpace
          * MongoDB Encryption
          * MS SQL Server Encryption
          * NoSQL Encryption
          * Oracle Database Encryption
          * PostgreSQL Database Encryption
          * SAP Data Security
          * Securing Unstructured Files
          * TDE Key Management
          * Virtual Environment Security
      
       * Data Sovereignty
       * Digital Transformation
       * IoT Security
          * IoT Security
          * IoT Security
          * Smart Grid Security
          * IoT Connected Car
          * IoT Secure Manufacturing
          * IoT Healthcare
      
       * Payment & Transactions
          * Payment & Transactions
          * Payment & Transactions
          * Secure Payments
          * Point-to-Point Encryption
          * Document Signing
          * EMV & Payment Card Issuance
          * Host Card Emulation
          * Mobile Card Payments
          * mPOS
          * Payment Processing
          * Secure Credit Card & Pin Management
      
       * PKI Credential Management
          * PKI Credential Management
          * PKI Credential Management
          * PKI Middleware
          * PKI Authentication
          * PKI Security
      
       * PKI Security Solutions
          * PKI Security Solutions
          * PKI Security Solutions
          * TLS/SSL Key Security
          * Code Signing
          * Secure Digital Signatures
          * Electronic Invoicing
          * DNS Security
          * Email Encryption
      
       * Quantum
          * Quantum
          * Quantum
          * Post-Quantum Crypto Agility Tool
      
       * Ransomware Solutions
       * Remote Workforces Challenges
       * Software Monetization
          * Software Monetization
          * Software Monetization
          * Software License Management
          * Entitlement Management
          * Software Packaging & Pricing
          * Software Usage Tracking & Reporting
          * Software Protection & Licensing
          * Capture Revenue Opportunities
      
       * Zero Trust Security
      
      Best Practices for Secure Cloud Migration
      
      It's a Multi-Cloud World. Thales can help secure your cloud migration.
      
      GET THE WHITE PAPER
    * By Industry
       * By Industry
       * Automotive
       * Critical Infrastructure
       * Education
       * Government
          * Government
          * Government
          * Federal Government
          * State and Local Government
          * Law Enforcement
      
       * Financial Services
       * Healthcare
       * Insurance Providers
       * Manufacturing and Industrial
       * Media and Entertainment
       * Retail
       * SaaS Providers / Service Providers
      
      2022 Thales Data Threat Report - Financial Services Edition
      
      2022 Thales data threat report for financial services, summarizes the most
      important findings of a survey of security leaders within the financial
      services industry.
      
      GET THE WHITE PAPER
    * By Compliance
       * By Compliance
       * Global
          * Global
          * Basel Compliance Solutions
          * Data Breach Notification Laws
          * Data Sovereignty
          * GDPR
          * ISO 27799:2016 Compliance
          * ISO/IEC 27002:2013 Compliance
          * PCI DSS
          * PCI HSM
          * Swift CSC
          * Validations and Certifications
      
       * Americas
          * Americas
          * Brazil - LGPD
          * CCPA (California Consumer Privacy Act)
          * CJIS
          * FDA/DEA - EPCS
          * FedRamp
          * FISMA
          * FIPS 199 and FIPS 200
          * FIPS 140-2
          * FIPS 140-3
          * GLBA
          * HIPAA
          * Mexico - Data Protection Law
          * NAIC Insurance Data Security Model Law Compliance
          * New York State Cybersecurity Requirements for Financial Services
            Companies Compliance
          * NCUA Regulatory Compliance
          * NIST 800-53, Revision 4
          * PIPEDA Compliance
          * SOX
          * STIR/SHAKEN
      
       * EMEA
          * EMEA
          * DEFCON 658
          * ECC
          * eIDAS
          * GDPR
          * NIS2
          * PSD2
          * Schrems II
          * South Africa POPI Act
      
       * APAC
          * APAC
          * Australia Privacy Amendment
          * China Personal Information Security Specification
          * Indonesia Personal Data Protection Law
          * Japan My Number Compliance
          * J-Sox
          * Monetary Authority of Singapore
          * Philippines Data Privacy Act of 2012
          * Singapore Public Sector Data Security
          * Singapore CCoP2.0
          * South Korea's PIPA
          * UIDAI's Aadhaar Number Regulation Compliance
      
      Protect Your Organization from Data Breach Notification Requirements
      
      Data breach disclosure notification laws vary by jurisdiction, but almost
      universally include a "safe harbor" clause.
      
      LEARN MORE
   
   Solutions to Secure Your Digital Transformation
   
   Whether it's securing the cloud, meeting compliance mandates or protecting
   software for the Internet of Things, organizations around the world rely on
   Thales to accelerate their digital transformation.
   
   Implementing Strong Authentication for Office 365
   
   Mitigate the risk of unauthorized access and data breaches.
   
   Learn More
 * Partners
    * Partners
    * Partners Overview
    * Find a Partner
    * Become a Partner
    * Channel Partners
    * Managed Service Providers
    * Technology Partners
    * OEM Partners
    * Advisory Partners
    * Partner Portal Login
   
   Thales Accelerate
   Partner Network
   
   Thales Partner Ecosystem includes several programs that recognize, rewards,
   supports and collaborates to help accelerate your revenue and differentiate
   your business. Provide more value to your customers with Thales's Industry
   leading solutions. Learn more to determine which one is the best fit for you.
   
   The Thales Accelerate Partner Network provides the skills and expertise
   needed to accelerate results and secure business with Thales technologies.
   
   Get the Brochure
 * Developers
 * Resources
    * Area of Interest
    * Encryption
       * Resource Type
       * White Papers
       * eBooks
       * Case Studies
       * Infographics
       * Webinars
       * Videos
       * Security Research
       * Podcasts
       * TalkingTrust Video Series
      
      Gartner Report: Select the Right Key Management as a Service to Mitigate
      Data Security and Privacy Risks in the Cloud
      
      Organizations must review their protection and key management provided by
      each cloud service provider.
      
      Get the Report
    * Access Management
       * Resource Type
       * White Papers
       * eBooks
       * Case Studies
       * Infographics
       * Webinars
       * Videos
       * Security Research
       * Podcasts
      
      Gartner's Market Guide for User Authentication
      
      How does user authentication relate to other identity corroboration
      approaches?
      
      Get the Report
    * Software Monetization
       * Resource Type
       * Blog
       * FAQ
       * White Papers
       * Case Studies
       * Infographics
       * Webinars
       * Learning Hub
       * Business Value Calculator
      
      Navigate The Process of Licensing, Delivering, and Protecting Your
      Software
      
      Check out our practical guide to navigating the process of licensing,
      delivering, and protecting your software.
      
      Get the White Paper
    * Blog
   
   Explore Thales's comprehensive resources for cloud, protection and licensing
   best practices.
   A Global Leader in Data Security
   
   The largest companies and most respected brands in the world rely on Thales
   to protect their most sensitive data.
   
   GET THE BROCHURE

 * 
 * Support
    * Customer Support
    * Software Monetization
       * Drivers & Downloads
       * Security Updates
       * Product Announcements / Training
   
    * Customers
       * Activate a Product / Support Portal
   
    * Data Protection
       * Security Updates
       * Product Announcements
       * Training Services
       * Technical Training Calendar
       * Professional Services

 * About
    * About Us
    * Leadership
    * Newsroom
    * News Coverage
    * Events
    * Customers
    * Industry Associations & Standards Organizations
    * Careers

 * Contact Sales
    * Contact Encryption
    * Contact Access Management
    * Contact Software Monetization

 * EN
    * English (GB)
    * Français
    * Deutsch
    * Italiano
    * Español
    * Português
    * 日本語
    * 한국어
   
    * Microsites
   
    * Polskie
    * Nederlands
    * 中文(繁體)

THALES CLOUD SECURITY


YOUR DATA,
THEIR CLOUD.

Take control of your security in the cloud.

Learn More


TAKE CONTROL OF YOUR
DIGITAL SOVEREIGNTY

Your data, their cloud

Learn More


THALES NAMED LEADER IN SOFTWARE MONETIZATION SOLUTIONS

By

Understand the opportunities that fuel growth with Software Licensing and
Entitlements and find out why we are again recognized as the global leader.

Learn More

 




TOTAL ECONOMIC IMPACT™
OF THALES CIPHERTRUST
DATA SECURITY PLATFORM



Cost Savings And Business Benefits
Enabled By The CipherTrust Data Security Platform



Get the Report


DELIVERING ONE PLATFORM
FOR EVERY IDENTITY

Discover IAM

 



THALES CLOUD SECURITY


YOUR DATA,
THEIR CLOUD.

Take control of your security in the cloud.

Learn More


TAKE CONTROL OF YOUR
DIGITAL SOVEREIGNTY

Your data, their cloud

Learn More
 * 1
 * 2
 * 3
 * 4
 * 5

 


WE PROVIDE SECURITY FOR A WORLD POWERED BY
THE CLOUD, DATA AND SOFTWARE

 


CLOUD
SECURITY

Whether it’s using cloud services or storing data across multiple clouds, you
can rely on Thales to secure access to your entire cloud app ecosystem and
protect sensitive data in any cloud.

Learn More


DATA
SECURITY

Wherever your data is stored, accessed or in use, you can rely on Thales to
deliver effective encryption strategies to protect enterprise from data breaches
and achieve compliance.

Learn More


IDENTITY & ACCESS
MANAGEMENT

As your organization runs more apps in the cloud, you can rely on Thales to
deliver secure, trusted access to all of your cloud services and existing
enterprise apps for your employees.

Learn More


SOFTWARE
MONETIZATION

As your company shifts to a software-based business, you can rely on Thales to
help you generate new revenue streams and gain more valuable insights from your
software.

Learn More

Our Latest Research

 


2022 THALES CONSUMER DIGITAL TRUST INDEX - REPORT

Get the Report


2022 THALES ACCESS MANAGEMENT INDEX - APAC EDITION REPORT

Get the Report


2022 THALES ACCESS MANAGEMENT INDEX - EUROPE AND MIDDLE EAST EDITION REPORT

Get the Report

 





AMERISOURCEBERGEN ENSURES CUSTOMER TRUST IN THE HEALTHCARE INDUSTRY WITH THALES

AmerisourceBergen deploys Ciphertrust Data Security Platform to protect privacy
and comply with regulations.

Read the Case Study    See More Customer Stories

 

Resources and Useful Insights


GARTNER’S MARKET GUIDE FOR USER AUTHENTICATION

Discover Gartner's analysis on how user authentication relates to other identity
corroboration approaches in this complete market analysis.

Get the Report


SECURITY WEAKNESSES IN DATA IN MOTION IDENTIFIED IN CYBERSECURITY SURVEY

With exponential growth of data in motion over networks, serious cybersecurity
issues need to be addressed. 

Get the White Paper


HOW TO GET SOFTWARE LICENSING RIGHT THE FIRST TIME

Check out our practical guide to navigating the process of licensing,
delivering, and protecting your software. 

Get the White Paper

View All Resources

Contact a specialist about Cloud Protection & Licensing
Contact Us


SEE THE ADVANTAGE OF THE THALES ACCELERATE PARTNER NETWORK

2000

Partners Worldwide

350+

Technology Partners

500+

Technology Integrations
Become a Partner
 * 
 * 
 * 
 * 
 * Find a Partner

 
Upcoming Events
View More
February 2, 2023

KEY FINDINGS FROM 2022 DATA THREAT REPORT – FINANCIAL SERVICES EDITION

Virtual

February 2, 2023

DIGITAL SOVEREIGNTY – YOUR DATA, THEIR CLOUD

Virtual

February 9, 2023

UNBLOCKING MULTI-CLOUD MIGRATIONS - OVERCOMING RISKS THROUGH DIGITAL SOVEREIGNTY

Virtual

December 14, 2022

THALES AWARDED THE 2022 FROST & SULLIVAN GLOBAL SOFTWARE LICENSE AND ENTITLEMENT
MARKET LEADERSHIP AWARD

Thales is at the forefront of innovation and growth in the software monetization
industry, driving a growth strategy…

November 30, 2022

THALES COLLABORATES WITH AWS TO SUPPORT DIGITAL SOVEREIGNTY FOR CLOUD CUSTOMERS
VIA CIPHERTRUST CLOUD KEY MANAGER INTEGRATION

Thales launches CipherTrust Cloud Key Manager integrated with the AWS External
Key Store (XKS) General availability of…

News
View All

Get in contact with a specialist
Contact Us


cpl.thalesgroup.com



Visit our parent site at

www.thalesgroup.com
 * Products
   * Data Protection
   * Access Management & Authentication
   * Software Monetization

 * Solutions
   * By Use Case
   * By Industry
   * By Compliance

 * Partners
   * Find a Partner
   * Become a Partner
   * Partner Portal Login

 * Resources
   * Resources Library
   * Blog
   * Podcasts

 * Support
   * Customer Support
   * Training Services

 * About
   * Contact Us
   * India E-Waste Program
   * Newsroom
   * Careers

SUBSCRIBEGet the latest data protection and access management resources and
insights delivered right to your inbox.
Copyright © 2023 Thales. All Rights Reserved
 * * Privacy Policy
   *   Disclaimer
   *   EU Commitments
   *   Sitemap
   *   Cookie Policy
   *   Terms & Conditions
   *  Do Not Sell My Personal Information

Search
Partners Resources Blogs Sentinel Drivers







By clicking “Accept Cookies”, you agree that Thales and its partners will
deposit cookies on your device to enhance site navigation, analyze site usage,
and assist in our marketing efforts. If you click "Continue without accepting",
only the technical cookies necessary for the proper functioning of the site will
be used and if you continue browsing without making a choice, this will be
considered as a refusal to deposit cookies. You may modify your choice and
withdraw your consent using the cookie setting icon at the bottom left of the
screen. For more information, you can consult ourCookie policy.

Accept All Cookies
Cookies Settings
Continue without Accepting
404 Page | Thales
node/4

 
 
 
 * Products
    * Products
    * Products Overview
    * Data Protection
       * Data Protection
       * Data Protection Overview
       * Data Discovery & Classification
       * Data at Rest Encryption
          * Data at Rest Encryption
          * Data at Rest Encryption
          * Data Security Platform
          * Transparent Encryption
          * Encryption for Kubernetes
          * Encryption UserSpace
          * Application Data Protection
          * Tokenization
          * Data Protection Gateway
          * Database Protection
          * Batch Data Transformation | Static Data Masking
          * Intelligent Protection
          * Selecting the Right Encryption Approach
      
       * Key Management
          * Key Management
          * Key Management
          * CipherTrust Manager
          * Data Security Manager
          * CipherTrust Cloud Key Manager
          * Enterprise Key Management
          * CipherTrust Platform for Dev/Ops
      
       * Hardware Security Modules
          * Hardware Security Modules
          * Hardware Security Modules
          * General Purpose HSMs
          * Payment HSMs
          * Luna Cloud HSM Services
      
       * Data Protection on Demand
          * Data Protection on Demand
          * Data Protection on Demand
          * Services
          * How it Works
          * Partners
          * Pricing
          * Sign Up Now
      
       * Network Encryption
       * Secure File Sharing
      
      Risk Management Strategies for Digital Processes with HSMs
      
      Security architects are implementing comprehensive information risk
      management strategies that include integrated Hardware Security Modules
      (HSMs). Reduce risk and create a competitive advantage.
      
      Get the White Paper
    * Access Management & Authentication
       * Access Management & Authentication
       * Workforce IAM
          * Workforce IAM
          * Workforce IAM
          * SafeNet Trusted Access
          * Identity-as-a-Service
          * SAML Authentication
      
       * Customer IAM
       * Cloud SSO
          * Cloud SSO
          * Cloud SSO
          * SSO Application Catalog
      
       * Authentication
          * Authentication
          * Authentication
          * Authentication as a Service
          * Authenticators
          * Certificate-Based PKI USB Authenticators
          * Certificate-Based Smart Cards
          * FIDO Devices
          * OTP Authenticators
          * Tokenless Authentication
          * On-Prem Management Platforms
          * Security Apps
          * Smart Card Readers
          * Passwordless Authentication
      
       * Customer Success Stories
       * Sign Up Now - STA Free Trial
       * STA Demo
      
      Access Management Handbook
      
      Get everything you need to know about Access Management, including the
      difference between authentication and access management, how to leverage
      cloud single sign on.
      
      Get the eBook
    * Software Monetization
       * Software Monetization
       * Software Monetization Overview
       * Sentinel Rights Management System - RMS
       * Sentinel Entitlement Management System - EMS
       * Sentinel License Development Kit - LDK
       * Software License & Copy Protection - Sentinel SL and CL
       * All Software Licensing Products
      
      How to Get Software Licensing Right The First Time
      
      Check out our practical guide to navigating the process of licensing,
      delivering, and protecting your software.
      
      Get the White Paper
   
   How We Can Help
   
   You can rely on Thales to help protect and secure access to your most
   sensitive data and software wherever it is created, shared or stored.
   
   payShield 10K
   
   The hardware security module that secures the world's payments.
   
   Learn More
 * Solutions
    * Solutions
    * Solutions Overview
    * By Use Case
       * By Use Case
       * 5G Security
       * Access Security
          * Access Security
          * Access Security
          * Secure Remote Access
          * Secure VPN Access
          * Secure Cloud Access
          * VDI Security Solutions
          * 2FA Solutions
          * Web and Cloud SSO
          * Physical & Logical Access Control
          * MFA for Cyber Insurance
      
       * Blockchain
       * Cloud Security
          * Cloud Security
          * Cloud Security
          * Amazon Web Services
          * Bring Your Own Encryption (BYOE)
          * Cloud Data Encryption
          * Cloud SSO
          * Google Cloud
          * Luna HSMs – Hybrid, On-Premises and Cloud HSM
          * Microsoft Azure
          * Microsoft Double Key Encryption (DKE)
          * Multi-Cloud Security
          * SaaS Security
      
       * Data Security & Encryption
          * Data Security & Encryption
          * Data Security & Encryption
          * Advanced Persistent Threats (APTs)
          * Big Data Security
          * Database Security and Encryption
          * Docker Encryption
          * Encryption for Kubernetes
          * Encryption UserSpace
          * MongoDB Encryption
          * MS SQL Server Encryption
          * NoSQL Encryption
          * Oracle Database Encryption
          * PostgreSQL Database Encryption
          * SAP Data Security
          * Securing Unstructured Files
          * TDE Key Management
          * Virtual Environment Security
      
       * Data Sovereignty
       * Digital Transformation
       * IoT Security
          * IoT Security
          * IoT Security
          * Smart Grid Security
          * IoT Connected Car
          * IoT Secure Manufacturing
          * IoT Healthcare
      
       * Payment & Transactions
          * Payment & Transactions
          * Payment & Transactions
          * Secure Payments
          * Point-to-Point Encryption
          * Document Signing
          * EMV & Payment Card Issuance
          * Host Card Emulation
          * Mobile Card Payments
          * mPOS
          * Payment Processing
          * Secure Credit Card & Pin Management
      
       * PKI Credential Management
          * PKI Credential Management
          * PKI Credential Management
          * PKI Middleware
          * PKI Authentication
          * PKI Security
      
       * PKI Security Solutions
          * PKI Security Solutions
          * PKI Security Solutions
          * TLS/SSL Key Security
          * Code Signing
          * Secure Digital Signatures
          * Electronic Invoicing
          * DNS Security
          * Email Encryption
      
       * Quantum
          * Quantum
          * Quantum
          * Post-Quantum Crypto Agility Tool
      
       * Ransomware Solutions
       * Remote Workforces Challenges
       * Software Monetization
          * Software Monetization
          * Software Monetization
          * Software License Management
          * Entitlement Management
          * Software Packaging & Pricing
          * Software Usage Tracking & Reporting
          * Software Protection & Licensing
          * Capture Revenue Opportunities
      
       * Zero Trust Security
      
      Best Practices for Secure Cloud Migration
      
      It's a Multi-Cloud World. Thales can help secure your cloud migration.
      
      GET THE WHITE PAPER
    * By Industry
       * By Industry
       * Automotive
       * Critical Infrastructure
       * Education
       * Government
          * Government
          * Government
          * Federal Government
          * State and Local Government
          * Law Enforcement
      
       * Financial Services
       * Healthcare
       * Insurance Providers
       * Manufacturing and Industrial
       * Media and Entertainment
       * Retail
       * SaaS Providers / Service Providers
      
      2022 Thales Data Threat Report - Financial Services Edition
      
      2022 Thales data threat report for financial services, summarizes the most
      important findings of a survey of security leaders within the financial
      services industry.
      
      GET THE WHITE PAPER
    * By Compliance
       * By Compliance
       * Global
          * Global
          * Basel Compliance Solutions
          * Data Breach Notification Laws
          * Data Sovereignty
          * GDPR
          * ISO 27799:2016 Compliance
          * ISO/IEC 27002:2013 Compliance
          * PCI DSS
          * PCI HSM
          * Swift CSC
          * Validations and Certifications
      
       * Americas
          * Americas
          * Brazil - LGPD
          * CCPA (California Consumer Privacy Act)
          * CJIS
          * FDA/DEA - EPCS
          * FedRamp
          * FISMA
          * FIPS 199 and FIPS 200
          * FIPS 140-2
          * FIPS 140-3
          * GLBA
          * HIPAA
          * Mexico - Data Protection Law
          * NAIC Insurance Data Security Model Law Compliance
          * New York State Cybersecurity Requirements for Financial Services
            Companies Compliance
          * NCUA Regulatory Compliance
          * NIST 800-53, Revision 4
          * PIPEDA Compliance
          * SOX
          * STIR/SHAKEN
      
       * EMEA
          * EMEA
          * DEFCON 658
          * ECC
          * eIDAS
          * GDPR
          * NIS2
          * PSD2
          * Schrems II
          * South Africa POPI Act
      
       * APAC
          * APAC
          * Australia Privacy Amendment
          * China Personal Information Security Specification
          * Indonesia Personal Data Protection Law
          * Japan My Number Compliance
          * J-Sox
          * Monetary Authority of Singapore
          * Philippines Data Privacy Act of 2012
          * Singapore Public Sector Data Security
          * Singapore CCoP2.0
          * South Korea's PIPA
          * UIDAI's Aadhaar Number Regulation Compliance
      
      Protect Your Organization from Data Breach Notification Requirements
      
      Data breach disclosure notification laws vary by jurisdiction, but almost
      universally include a "safe harbor" clause.
      
      LEARN MORE
   
   Solutions to Secure Your Digital Transformation
   
   Whether it's securing the cloud, meeting compliance mandates or protecting
   software for the Internet of Things, organizations around the world rely on
   Thales to accelerate their digital transformation.
   
   Implementing Strong Authentication for Office 365
   
   Mitigate the risk of unauthorized access and data breaches.
   
   Learn More
 * Partners
    * Partners
    * Partners Overview
    * Find a Partner
    * Become a Partner
    * Channel Partners
    * Managed Service Providers
    * Technology Partners
    * OEM Partners
    * Advisory Partners
    * Partner Portal Login
   
   Thales Accelerate
   Partner Network
   
   Thales Partner Ecosystem includes several programs that recognize, rewards,
   supports and collaborates to help accelerate your revenue and differentiate
   your business. Provide more value to your customers with Thales's Industry
   leading solutions. Learn more to determine which one is the best fit for you.
   
   The Thales Accelerate Partner Network provides the skills and expertise
   needed to accelerate results and secure business with Thales technologies.
   
   Get the Brochure
 * Developers
 * Resources
    * Area of Interest
    * Encryption
       * Resource Type
       * White Papers
       * eBooks
       * Case Studies
       * Infographics
       * Webinars
       * Videos
       * Security Research
       * Podcasts
       * TalkingTrust Video Series
      
      Gartner Report: Select the Right Key Management as a Service to Mitigate
      Data Security and Privacy Risks in the Cloud
      
      Organizations must review their protection and key management provided by
      each cloud service provider.
      
      Get the Report
    * Access Management
       * Resource Type
       * White Papers
       * eBooks
       * Case Studies
       * Infographics
       * Webinars
       * Videos
       * Security Research
       * Podcasts
      
      Gartner's Market Guide for User Authentication
      
      How does user authentication relate to other identity corroboration
      approaches?
      
      Get the Report
    * Software Monetization
       * Resource Type
       * Blog
       * FAQ
       * White Papers
       * Case Studies
       * Infographics
       * Webinars
       * Learning Hub
       * Business Value Calculator
      
      Navigate The Process of Licensing, Delivering, and Protecting Your
      Software
      
      Check out our practical guide to navigating the process of licensing,
      delivering, and protecting your software.
      
      Get the White Paper
    * Blog
   
   Explore Thales's comprehensive resources for cloud, protection and licensing
   best practices.
   A Global Leader in Data Security
   
   The largest companies and most respected brands in the world rely on Thales
   to protect their most sensitive data.
   
   GET THE BROCHURE

 * 
 * Support
    * Customer Support
    * Software Monetization
       * Drivers & Downloads
       * Security Updates
       * Product Announcements / Training
   
    * Customers
       * Activate a Product / Support Portal
   
    * Data Protection
       * Security Updates
       * Product Announcements
       * Training Services
       * Technical Training Calendar
       * Professional Services

 * About
    * About Us
    * Leadership
    * Newsroom
    * News Coverage
    * Events
    * Customers
    * Industry Associations & Standards Organizations
    * Careers

 * Contact Sales
    * Contact Encryption
    * Contact Access Management
    * Contact Software Monetization

 * EN
    * English (GB)
    * Français
    * Deutsch
    * Italiano
    * Español
    * Português
    * 日本語
    * 한국어
   
    * Microsites
   
    * Polskie
    * Nederlands
    * 中文(繁體)


THE REQUESTED PAGE COULD NOT BE FOUND.

 


THE URL MAY BE MISTYPED OR THE PAGE YOU'RE LOOKING FOR IS NO LONGER AVAILABLE.


WE INVITE YOU TO RETURN TO THE HOMEPAGE:

Go to the Homepage

cpl.thalesgroup.com



Visit our parent site at

www.thalesgroup.com
 * Products
   * Data Protection
   * Access Management & Authentication
   * Software Monetization

 * Solutions
   * By Use Case
   * By Industry
   * By Compliance

 * Partners
   * Find a Partner
   * Become a Partner
   * Partner Portal Login

 * Resources
   * Resources Library
   * Blog
   * Podcasts

 * Support
   * Customer Support
   * Training Services

 * About
   * Contact Us
   * India E-Waste Program
   * Newsroom
   * Careers

SUBSCRIBEGet the latest data protection and access management resources and
insights delivered right to your inbox.
Copyright © Thales. All Rights Reserved
 * * Privacy Policy
   *   Disclaimer
   *   EU Commitments
   *   Sitemap
   *   Cookie Policy
   *   Terms & Conditions
   *  Do Not Sell My Personal Information

Search
Partners Resources Blogs Sentinel Drivers




PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices