|
Products
|
Intern |
doFollow |
|
REQUEST A DEMO
|
Intern |
doFollow |
|
Get Your Copy Today
|
Intern |
doFollow |
|
Data Security Platform
|
Intern |
doFollow |
|
Data Security Posture Management
|
Intern |
doFollow |
|
Data Discovery & Classification
|
Intern |
doFollow |
|
Data at Rest Encryption
|
Intern |
doFollow |
|
Transparent Encryption
|
Intern |
doFollow |
|
Application Data Protection
|
Intern |
doFollow |
|
Tokenization
|
Intern |
doFollow |
|
Data Masking Solutions
|
Intern |
doFollow |
|
Data Protection Gateway
|
Intern |
doFollow |
|
Database Protection
|
Intern |
doFollow |
|
Batch Data Transformation
|
Intern |
doFollow |
|
Ransomware Protection
|
Intern |
doFollow |
|
CipherTrust RESTful Data Protection
|
Intern |
doFollow |
|
Secrets Management
|
Intern |
doFollow |
|
Hardware Security Modules
|
Intern |
doFollow |
|
General Purpose HSMs
|
Intern |
doFollow |
|
Payment HSMs
|
Intern |
doFollow |
|
Luna Cloud HSM Services
|
Intern |
doFollow |
|
Data Protection on Demand
|
Intern |
doFollow |
|
Services
|
Intern |
doFollow |
|
How it Works
|
Intern |
doFollow |
|
Partners
|
Intern |
doFollow |
|
Pricing
|
Intern |
doFollow |
|
Sign Up Now
|
Intern |
doFollow |
|
Network Encryption
|
Intern |
doFollow |
|
Risk Analytics & Monitoring
|
Extern |
doFollow |
|
Secure File Sharing
|
Intern |
doFollow |
|
DevSecOps
|
Intern |
doFollow |
|
Get the White Paper
|
Intern |
doFollow |
|
Application Security Overview
|
Extern |
doFollow |
|
AI Application Security
|
Extern |
doFollow |
|
Web Application Firewall
|
Extern |
doFollow |
|
Advanced Bot Protection
|
Extern |
doFollow |
|
Unified API Security Platform
|
Extern |
doFollow |
|
DDoS Protection
|
Extern |
doFollow |
|
Client-Side Protection
|
Extern |
doFollow |
|
Account Takeover Protection
|
Extern |
doFollow |
|
Content Delivery Network
|
Extern |
doFollow |
|
Learn More
|
Intern |
doFollow |
|
Customer Identity
|
Intern |
doFollow |
|
B2B Identity
|
Intern |
doFollow |
|
Gig Worker Identity
|
Intern |
doFollow |
|
Adaptive Access Control
|
Intern |
doFollow |
|
BYOI & Social Login
|
Intern |
doFollow |
|
Consent & Preference Management
|
Intern |
doFollow |
|
Delegated User Management
|
Intern |
doFollow |
|
Externalized Authorization
|
Intern |
doFollow |
|
Federated Identity Management
|
Intern |
doFollow |
|
Fraud & Risk Management
|
Intern |
doFollow |
|
Identity Verification
|
Intern |
doFollow |
|
Multi-Factor Authentication
|
Intern |
doFollow |
|
Risk-based Authentication
|
Intern |
doFollow |
|
Single Sign-On (SSO)
|
Intern |
doFollow |
|
Strong Customer Authentication
|
Intern |
doFollow |
|
User Journey Orchestration
|
Intern |
doFollow |
|
Digital Banking
|
Intern |
doFollow |
|
eHerkenning
|
Intern |
doFollow |
|
FIDO Passkeys and Devices
|
Intern |
doFollow |
|
On-Prem Management Platforms
|
Intern |
doFollow |
|
OneWelcome
|
Intern |
doFollow |
|
OTP Authenticators
|
Intern |
doFollow |
|
MobilePASS+
|
Intern |
doFollow |
|
Passwordless Authentication
|
Intern |
doFollow |
|
PKI USB Tokens
|
Intern |
doFollow |
|
SafeNet Trusted Access
|
Intern |
doFollow |
|
Smart Cards
|
Intern |
doFollow |
|
Smart Card Readers
|
Intern |
doFollow |
|
Tokenless Authentication
|
Intern |
doFollow |
|
Request a Demo
|
Intern |
doFollow |
|
Get Your Copy Today
|
Intern |
doFollow |
|
License Management
|
Intern |
doFollow |
|
Entitlement Management
|
Intern |
doFollow |
|
Rights Management System
|
Intern |
doFollow |
|
Software and IP protection
|
Intern |
doFollow |
|
Software Usage Intelligence
|
Intern |
doFollow |
|
All Software Monetization Products
|
Intern |
doFollow |
|
Get the White Paper
|
Intern |
doFollow |
|
Solutions
|
Intern |
doFollow |
|
AI Security
|
Intern |
doFollow |
|
RAG Data Security
|
Intern |
doFollow |
|
5G Security
|
Intern |
doFollow |
|
Access Security
|
Intern |
doFollow |
|
Secure Remote Access
|
Intern |
doFollow |
|
Secure VPN Access
|
Intern |
doFollow |
|
Secure Cloud Access
|
Intern |
doFollow |
|
VDI Security Solutions
|
Intern |
doFollow |
|
2FA Solutions
|
Intern |
doFollow |
|
Web and Cloud SSO
|
Intern |
doFollow |
|
Physical & Logical Access Control
|
Intern |
doFollow |
|
MFA for Cyber Insurance
|
Intern |
doFollow |
|
Blockchain
|
Intern |
doFollow |
|
Cloud Security
|
Intern |
doFollow |
|
Amazon Web Services
|
Intern |
doFollow |
|
Bring Your Own Encryption (BYOE)
|
Intern |
doFollow |
|
Cloud Data Encryption
|
Intern |
doFollow |
|
Cloud SSO
|
Intern |
doFollow |
|
Google Cloud
|
Intern |
doFollow |
|
Luna HSMs – Hybrid, On-Premises and Cloud HSM
|
Intern |
doFollow |
|
Microsoft Azure
|
Intern |
doFollow |
|
Microsoft Double Key Encryption (DKE)
|
Intern |
doFollow |
|
Multi-Cloud Security
|
Intern |
doFollow |
|
Oracle Cloud Infrastructure
|
Intern |
doFollow |
|
Your Data Their Cloud
|
Intern |
doFollow |
|
Data Security & Encryption
|
Intern |
doFollow |
|
Advanced Persistent Threats (APTs)
|
Intern |
doFollow |
|
Big Data Security
|
Intern |
doFollow |
|
Database Security and Encryption
|
Intern |
doFollow |
|
Docker Encryption
|
Intern |
doFollow |
|
Encryption for Kubernetes
|
Intern |
doFollow |
|
Encryption UserSpace
|
Intern |
doFollow |
|
MongoDB Encryption
|
Intern |
doFollow |
|
MS SQL Server Encryption
|
Intern |
doFollow |
|
NoSQL Encryption
|
Intern |
doFollow |
|
Oracle Database Encryption
|
Intern |
doFollow |
|
PostgreSQL Database Encryption
|
Intern |
doFollow |
|
SAP Data Security
|
Intern |
doFollow |
|
Securing Unstructured Files
|
Intern |
doFollow |
|
TDE Key Management
|
Intern |
doFollow |
|
Virtual Environment Security
|
Intern |
doFollow |
|
Data Sovereignty
|
Intern |
doFollow |
|
Digital Transformation
|
Intern |
doFollow |
|
IoT Security
|
Intern |
doFollow |
|
Smart Grid Security
|
Intern |
doFollow |
|
IoT Connected Car
|
Intern |
doFollow |
|
IoT Secure Manufacturing
|
Intern |
doFollow |
|
IoT Healthcare
|
Intern |
doFollow |
|
Payment & Transactions
|
Intern |
doFollow |
|
Secure Payments
|
Intern |
doFollow |
|
Point-to-Point Encryption
|
Intern |
doFollow |
|
Document Signing
|
Intern |
doFollow |
|
EMV & Payment Card Issuance
|
Intern |
doFollow |
|
Host Card Emulation
|
Intern |
doFollow |
|
Mobile Card Payments
|
Intern |
doFollow |
|
mPOS
|
Intern |
doFollow |
|
Payment Processing
|
Intern |
doFollow |
|
Secure Credit Card & Pin Management
|
Intern |
doFollow |
|
PKI Credential Management
|
Intern |
doFollow |
|
PKI Middleware
|
Intern |
doFollow |
|
PKI Security
|
Intern |
doFollow |
|
TLS/SSL Key Security
|
Intern |
doFollow |
|
Code Signing
|
Intern |
doFollow |
|
Electronic Invoicing
|
Intern |
doFollow |
|
DNS Security
|
Intern |
doFollow |
|
Email Encryption
|
Intern |
doFollow |
|
Quantum
|
Intern |
doFollow |
|
TEST YOUR QUANTUM READINESS
|
Intern |
doFollow |
|
Ransomware Solutions
|
Intern |
doFollow |
|
Remote Workforces Challenges
|
Intern |
doFollow |
|
Software Monetization
|
Intern |
doFollow |
|
Software Packaging & Pricing
|
Intern |
doFollow |
|
Software Usage Tracking & Reporting
|
Intern |
doFollow |
|
Software Protection & Licensing
|
Intern |
doFollow |
|
Capture Revenue Opportunities
|
Intern |
doFollow |
|
Zero Trust Security
|
Intern |
doFollow |
|
GET THE WHITE PAPER
|
Intern |
doFollow |
|
Automotive
|
Intern |
doFollow |
|
Critical Infrastructure
|
Intern |
doFollow |
|
Education
|
Intern |
doFollow |
|
Government
|
Intern |
doFollow |
|
Federal Government
|
Intern |
doFollow |
|
State and Local Government
|
Intern |
doFollow |
|
Law Enforcement
|
Intern |
doFollow |
|
Financial Services
|
Intern |
doFollow |
|
Healthcare
|
Intern |
doFollow |
|
Insurance Providers
|
Intern |
doFollow |
|
Manufacturing and Industrial
|
Intern |
doFollow |
|
Media and Entertainment
|
Intern |
doFollow |
|
Retail
|
Intern |
doFollow |
|
SaaS Providers and Consumers
|
Intern |
doFollow |
|
Telecommunications
|
Intern |
doFollow |
|
GET THE REPORT
|
Intern |
doFollow |
|
Basel Compliance Solutions
|
Intern |
doFollow |
|
Data Breach Notification Laws
|
Intern |
doFollow |
|
GDPR
|
Intern |
doFollow |
|
ISO 27799:2016 Compliance
|
Intern |
doFollow |
|
ISO/IEC 27001:2022 Compliance
|
Intern |
doFollow |
|
ISO/IEC 27002:2013 Compliance
|
Intern |
doFollow |
|
PCI DSS
|
Intern |
doFollow |
|
PCI HSM
|
Intern |
doFollow |
|
Swift CSC
|
Intern |
doFollow |
|
Validations and Certifications
|
Intern |
doFollow |
|
Brazil - LGPD
|
Intern |
doFollow |
|
CCPA (California Consumer Privacy Act)
|
Intern |
doFollow |
|
CISA Zero Trust Maturity Model
|
Intern |
doFollow |
|
CJIS
|
Intern |
doFollow |
|
Cybersecurity Maturity Model - CMMC
|
Intern |
doFollow |
|
FDA/DEA - EPCS
|
Intern |
doFollow |
|
FedRamp
|
Intern |
doFollow |
|
FISMA
|
Intern |
doFollow |
|
FIPS 199 and FIPS 200
|
Intern |
doFollow |
|
FIPS 140-2
|
Intern |
doFollow |
|
FIPS 140-3
|
Intern |
doFollow |
|
GLBA
|
Intern |
doFollow |
|
HIPAA
|
Intern |
doFollow |
|
Mexico - Data Protection Law
|
Intern |
doFollow |
|
NAIC Insurance Data Security Model Law Compliance
|
Intern |
doFollow |
|
New York State Cybersecurity Requirements for Financial Services Companies Compliance
|
Intern |
doFollow |
|
NCUA Regulatory Compliance
|
Intern |
doFollow |
|
NIST 800-53, Revision 4
|
Intern |
doFollow |
|
NIST CSF 2.0
|
Intern |
doFollow |
|
PIPEDA Compliance
|
Intern |
doFollow |
|
SOC 2
|
Intern |
doFollow |
|
SOX
|
Intern |
doFollow |
|
STIR/SHAKEN
|
Intern |
doFollow |
|
DEFCON 658
|
Intern |
doFollow |
|
DORA
|
Intern |
doFollow |
|
ECC
|
Intern |
doFollow |
|
eIDAS
|
Intern |
doFollow |
|
NIS2
|
Intern |
doFollow |
|
PSD2
|
Intern |
doFollow |
|
Schrems II
|
Intern |
doFollow |
|
South Africa POPI Act
|
Intern |
doFollow |
|
Australia ASIC Market Integrity Rules
|
Intern |
doFollow |
|
Australia APRA CPS234
|
Intern |
doFollow |
|
Australia Cryptography Guidelines
|
Intern |
doFollow |
|
Australia Privacy Amendment
|
Intern |
doFollow |
|
Australia SOCI Act
|
Intern |
doFollow |
|
Bangladesh ICT Security Guideline
|
Intern |
doFollow |
|
China Personal Information Security Specification
|
Intern |
doFollow |
|
Hong Kong Digital Assets Guidelines
|
Intern |
doFollow |
|
Hong Kong Practice Guide for Cloud Computing Security
|
Intern |
doFollow |
|
Hong Kong Secure Tertiary Data Backup (STDB) Guideline
|
Intern |
doFollow |
|
Hong Kong Virtual Asset Trading Platforms Operators Guideline
|
Intern |
doFollow |
|
India CSCRF by SEBI
|
Intern |
doFollow |
|
India Digital Personal Data Protection Act
|
Intern |
doFollow |
|
India Framework for Adoption of Cloud Services by SEBI
|
Intern |
doFollow |
|
India IRDAI ICS Guidelines
|
Intern |
doFollow |
|
India RBI Outsourcing of IT Services Directions
|
Intern |
doFollow |
|
Indonesia Personal Data Protection Law
|
Intern |
doFollow |
|
Japan Act on Protection of Personal Information
|
Intern |
doFollow |
|
Japan FISC
|
Intern |
doFollow |
|
Japan My Number Compliance
|
Intern |
doFollow |
|
J-Sox
|
Intern |
doFollow |
|
Korea Personal Information and Information Security Management System (ISMS-P)
|
Intern |
doFollow |
|
Monetary Authority of Singapore
|
Intern |
doFollow |
|
Philippines Data Privacy Act of 2012
|
Intern |
doFollow |
|
Philippines NPC Circular 2023-06
|
Intern |
doFollow |
|
Risk Management in Technology (RMiT) Policy
|
Intern |
doFollow |
|
Singapore MAS Advisory On Quantum
|
Intern |
doFollow |
|
Singapore Public Sector Data Security
|
Intern |
doFollow |
|
Singapore CCoP2.0
|
Intern |
doFollow |
|
South Korea's PIPA
|
Intern |
doFollow |
|
Thailand BOT - IT Risk Guidelines
|
Intern |
doFollow |
|
Thailand OIC - IT Risk Guidelines
|
Intern |
doFollow |
|
Thailand SEC - IT Systems Guidelines
|
Intern |
doFollow |
|
UIDAI's Aadhaar Number Regulation Compliance
|
Intern |
doFollow |
|
Vietnam Personal Data Protection Decree
|
Intern |
doFollow |
|
Learn More
|
Intern |
doFollow |
|
Partners
|
Intern |
doFollow |
|
Get the Brochure
|
Intern |
doFollow |
|
Resources
|
Intern |
doFollow |
|
Get the Report
|
Intern |
doFollow |
|
Magazine
|
Intern |
doFollow |
|
Blog
|
Intern |
doFollow |
|
FAQ
|
Intern |
doFollow |
|
Learning Hub
|
Intern |
doFollow |
|
Get the eBook
|
Intern |
doFollow |
|
GET THE BROCHURE
|
Intern |
doFollow |
|
Support
|
Intern |
doFollow |
|
Drivers & Downloads
|
Intern |
doFollow |
|
Product Announcements / Training
|
Extern |
doFollow |
|
Activate a Product / Support Portal
|
Extern |
doFollow |
|
Product Announcements
|
Extern |
doFollow |
|
Training Services
|
Intern |
doFollow |
|
Security Updates
|
Extern |
doFollow |
|
About
|
Intern |
doFollow |
|
Leadership
|
Intern |
doFollow |
|
Newsroom
|
Intern |
doFollow |
|
News Coverage
|
Intern |
doFollow |
|
Events
|
Intern |
doFollow |
|
Customers
|
Intern |
doFollow |
|
Industry Associations & Standards Organizations
|
Intern |
doFollow |
|
Careers
|
Intern |
doFollow |
|
Thales + Imperva
|
Intern |
doFollow |
|
Contact Us
|
Extern |
doFollow |
|
Contact Data Security
|
Intern |
doFollow |
|
Contact Access Management
|
Intern |
doFollow |
|
Contact Software Monetization
|
Intern |
doFollow |
|
English (GB)
|
Intern |
doFollow |
|
Français
|
Intern |
doFollow |
|
Deutsch
|
Intern |
doFollow |
|
Italiano
|
Intern |
doFollow |
|
Español
|
Intern |
doFollow |
|
Português
|
Intern |
doFollow |
|
日本語
|
Intern |
doFollow |
|
한국어
|
Intern |
doFollow |
|
Polskie
|
Intern |
doFollow |
|
Nederlands
|
Intern |
doFollow |
|
中文(繁體)
|
Intern |
doFollow |
|
Request a Free Trial
|
Intern |
doFollow |
|
View More Stories
|
Intern |
doFollow |
|
Get the White Paper
|
Extern |
doFollow |
|
Learn More
|
Intern |
doFollow |
|
1) Strategize
|
Intern |
doFollow |
|
2) Implement
|
Intern |
doFollow |
|
3) Deploy
|
Intern |
doFollow |
|
4) Boost
|
Intern |
doFollow |
|
The Definitive Guide To Entitlements And Entitlement Management
|
Intern |
doFollow |
|
Sentinel EMS
|
Intern |
doFollow |
|
Entitlements for Support and Training
|
Intern |
doFollow |
|
Increase Customer Satisfaction
|
Intern |
doFollow |
|
Gain Business Insights
|
Intern |
doFollow |
|
Usage Reporting
|
Intern |
doFollow |
|
Products
|
Intern |
doFollow |
|
Sentinel EMS
|
Intern |
doFollow |
|
Sentinel LDK
|
Intern |
doFollow |
|
Sentinel Envelope
|
Intern |
doFollow |
|
Sentinel Pulse
|
Intern |
doFollow |
|
Sentinel SL and CL
|
Intern |
doFollow |
|
Resources
|
Intern |
doFollow |
|
Software License Models
|
Intern |
doFollow |
|
SaaS Pricing Models
|
Intern |
doFollow |
|
Software Licensing Management
|
Intern |
doFollow |
|
Dongle Security
|
Intern |
doFollow |
|
Software Intellectual Property
|
Intern |
doFollow |
|
Software Piracy
|
Intern |
doFollow |
|
EU’s Cyber Resilience Act
|
Intern |
doFollow |
|
About Cloud Licensing
|
Intern |
doFollow |
|
Product Tours
|
Intern |
doFollow |
|
White Papers
|
Intern |
doFollow |
|
Case Studies
|
Intern |
doFollow |
|
Infographics
|
Intern |
doFollow |
|
Webinars
|
Extern |
doFollow |
|
Software Update Cost Analysis
|
Intern |
doFollow |
|
Trust
|
Extern |
doFollow |
|
Support
|
Extern |
doFollow |
|
Security Updates
|
Intern |
doFollow |
|
Customer Support
|
Extern |
doFollow |
|
Free Trials
|
Intern |
doFollow |
|
Sentinel LDK
|
Extern |
doFollow |
|
Sentinel EMS
|
Extern |
doFollow |
|
www.thalesgroup.com
|
Extern |
doFollow |
|
Data Security
|
Intern |
doFollow |
|
Application Security
|
Extern |
doFollow |
|
Identity & Access Management
|
Intern |
doFollow |
|
By Use Case
|
Intern |
doFollow |
|
By Industry
|
Intern |
doFollow |
|
By Compliance
|
Intern |
doFollow |
|
Find a Partner
|
Intern |
doFollow |
|
Partner Portal Login
|
Intern |
doFollow |
|
Blog
|
Intern |
doFollow |
|
Podcasts
|
Intern |
doFollow |
|
India E-Waste Program
|
Intern |
doFollow |
|
SUBSCRIBE
|
Intern |
doFollow |
|
Privacy Policy
|
Extern |
doFollow |
|
Disclaimer
|
Extern |
doFollow |
|
Sitemap
|
Intern |
doFollow |
|
Cookie Policy
|
Extern |
doFollow |
|
Terms & Conditions
|
Intern |
doFollow |
|
Do Not Sell My Personal Information
|
Intern |
doFollow |