Thales

Reliable protection for sensitive data

The expert for cloud security, data protection and access management.
The people you trust to protect your data rely on Thales to protect their data, the cloud and their software. When it comes to data security, companies are increasingly faced with key decisions. Whether it’s developing an encryption strategy, licensing software, providing trusted access to the cloud or meeting compliance requirements, you can rely on Thales to secure your digital transformation.

Authentication

Authentication is used to determine whether a person or object is actually who they claim to be. Authentication through knowledge (user name, password), possession (tokens, one-time passwords, certificates) or biometric features (fingerprint, facial recognition) is common.

Identity & Access Management

Identity management refers to the targeted handling of information relating to identity, pseudo-anonymity and anonymity. One of the reasons why companies are concerned with identity management is the requirement to keep personal data consistent, constantly available and reliable. The complexity of one’s own identity and its disclosure via the Internet has become increasingly important, particularly against the background of unauthorised data use.

Data & Device Encryption

Data & device encryption refers to the encryption of data (such as folders, files, databases, etc.) and devices (such as hard drives, USB sticks, cloud storage, etc.). The aim of encryption is to subject the data to a mathematical transformation so that it is not possible for an attacker who gains possession of the data to extract the original data from the transformed data.

Database Security

Database security refers to the use of a wide range of information security controls to protect databases against threats to confidentiality, integrity and availability. It includes different types or categories of control, such as technical, procedural, administrative and physical.