cpl.thalesgroup.com
Open in
urlscan Pro
54.244.122.2
Public Scan
Submitted URL: https://www6.thalesgroup.com/e/51442/2022-07-29/dnz8gg/1140440293?h=2pKzYbb8s8ZomKX_TAKiaWL5_uIc1-aGAQQcGwZLZXE
Effective URL: https://cpl.thalesgroup.com/
Submission: On July 29 via api from US — Scanned from DE
Effective URL: https://cpl.thalesgroup.com/
Submission: On July 29 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMGET /search
<form method="GET" action="/search" __bizdiag="-906336856" __biza="WJ__">
<input type="text" class="search-input" name="search" placeholder="Let’s find what you’re looking for...">
<button type="submit" class="btn-default">Search</button>
</form>
Text Content
This website, like almost all websites, uses cookies to help improve your online experience. By continuing to browse this site, you consent to our use of cookies. Cookie Policy Continue node/12096 * Products * Products * Products Overview * Data Protection * Data Protection * Data Protection Overview * Data Discovery & Classification * Data at Rest Encryption * Data at Rest Encryption * Data at Rest Encryption * Data Security Platform * Transparent Encryption * Application Data Protection * Tokenization * Data Protection Gateway * Database Protection * Batch Data Transformation | Static Data Masking * Intelligent Protection * Selecting the Right Encryption Approach * Key Management * Key Management * Key Management * CipherTrust Manager * Data Security Manager * CipherTrust Cloud Key Manager * Enterprise Key Management * Hardware Security Modules * Hardware Security Modules * Hardware Security Modules * General Purpose HSMs * Payment HSMs * Luna Cloud HSM Services * Data Protection on Demand * Data Protection on Demand * Data Protection on Demand * Services * How it Works * Partners * Pricing * Sign Up Now * Network Encryption * Secure File Sharing Risk Management Strategies for Digital Processes with HSMs Security architects are implementing comprehensive information risk management strategies that include integrated Hardware Security Modules (HSMs). Reduce risk and create a competitive advantage. Get the White Paper * Access Management & Authentication * Access Management & Authentication * Access Management * Access Management * Access Management * SafeNet Trusted Access * Identity-as-a-Service * SAML Authentication * Cloud SSO * Cloud SSO * Cloud SSO * SSO Application Catalog * Authentication * Authentication * Authentication * Authentication as a Service * Authenticators * Certificate-Based PKI USB Authenticators * Certificate-Based Smart Cards * FIDO Devices * OTP Authenticators * Tokenless Authentication * On-Prem Management Platforms * Security Apps * Smart Card Readers * Passwordless Authentication * Sign Up Now - STA Free Trial * STA Demo Access Management Handbook Get everything you need to know about Access Management, including the difference between authentication and access management, how to leverage cloud single sign on. Get the eBook * Software Monetization * Software Monetization * Software Monetization Overview * Sentinel Rights Management System - RMS * Sentinel Entitlement Management System - EMS * Sentinel License Development Kit - LDK * Software License & Copy Protection - Sentinel SL and CL * All Software Licensing Products How to Get Software Licensing Right The First Time Check out our practical guide to navigating the process of licensing, delivering, and protecting your software. Get the White Paper How We Can Help You can rely on Thales to help protect and secure access to your most sensitive data and software wherever it is created, shared or stored. payShield 10K The hardware security module that secures the world's payments. Learn More * Solutions * Solutions * Solutions Overview * By Use Case * By Use Case * 5G Security * Access Security * Access Security * Access Security * Secure Remote Access * Secure VPN Access * Secure Cloud Access * VDI Security Solutions * 2FA Solutions * Web and Cloud SSO * Physical & Logical Access Control * MFA for Cyber Insurance * Blockchain * Cloud Security * Cloud Security * Cloud Security * BYOE * Amazon Web Services * Google Cloud Security * Microsoft Azure * Cloud SSO * Cloud Data Encryption * Luna HSMs – Hybrid, On-Premises and Cloud HSM * Microsoft Double Key Encryption (DKE) * Data Security & Encryption * Data Security & Encryption * Data Security & Encryption * Advanced Persistent Threats (APTs) * Big Data Security * Database Security | Database Encryption * Docker Encryption * Kubernetes Security * MongoDB Encryption * MS SQL Server Encryption * NoSQL Encryption * Oracle Database Encryption * PostgreSQL Database Encryption * SAP Data Security * Securing Unstructured Files * TDE Key Management * Data Sovereignty * Digital Transformation * IoT Security * IoT Security * IoT Security * Smart Grid Security * IoT Connected Car * IoT Secure Manufacturing * IoT Healthcare * Payment & Transactions * Payment & Transactions * Payment & Transactions * Secure Payments * Point-to-Point Encryption * Document Signing * EMV & Payment Card Issuance * Host Card Emulation * Mobile Card Payments * mPOS * Payment Processing * Secure Credit Card & Pin Management * PKI Credential Management * PKI Credential Management * PKI Credential Management * PKI Middleware * PKI Authentication * PKI Security * PKI Security Solutions * PKI Security Solutions * PKI Security Solutions * TLS/SSL Key Security * Code Signing * Secure Digital Signatures * Electronic Invoicing * DNS Security * Email Encryption * Quantum * Quantum * Quantum * Post-Quantum Crypto Agility Tool * Ransomware Solutions * Remote Workforces Challenges * Software Monetization * Software Monetization * Software Monetization * Software License Management * Entitlement Management * Software Packaging & Pricing * Software Usage Tracking & Reporting * Software Protection & Licensing * Capture Revenue Opportunities * Zero Trust Security Best Practices for Secure Cloud Migration It's a Multi-Cloud World. Thales can help secure your cloud migration. GET THE WHITE PAPER * By Industry * By Industry * Automotive * Critical Infrastructure * Education * Federal Government * Financial Services * Government * Healthcare * Insurance Providers * Law Enforcement * Manufacturing and Industrial * Media and Entertainment * Retail * SaaS Providers / Service Providers * State and Local Government Best Practices for Secure Cloud Migration It's a Multi-Cloud World. Thales can help secure your cloud migration. GET THE WHITE PAPER * By Compliance * By Compliance * Global * Global * Basel Compliance Solutions * Data Breach Notification Laws * Data Sovereignty * GDPR * ISO 27799:2016 Compliance * ISO/IEC 27002:2013 Compliance * PCI DSS * PCI HSM * Swift CSC * Validations and Certifications * Americas * Americas * Brazil - LGPD * CCPA (California Consumer Privacy Act) * CJIS * FDA/DEA - EPCS * FedRamp * FISMA * FIPS 199 and FIPS 200 * FIPS 140-2 * FIPS 140-3 * GLBA * HIPAA * Mexico - Data Protection Law * NAIC Insurance Data Security Model Law Compliance * New York State Cybersecurity Requirements for Financial Services Companies Compliance * NCUA Regulatory Compliance * NIST 800-53, Revision 4 * PIPEDA Compliance * SOX * STIR/SHAKEN * EMEA * EMEA * DEFCON 658 * ECC * eIDAS * GDPR * PSD2 * Schrems II * South Africa POPI Act * APAC * APAC * Australia Privacy Amendment * Japan My Number Compliance * J-Sox * Monetary Authority of Singapore * Philippines Data Privacy Act of 2012 * South Korea's PIPA * UIDAI's Aadhaar Number Regulation Compliance Protect Your Organization from Data Breach Notification Requirements Data breach disclosure notification laws vary by jurisdiction, but almost universally include a "safe harbor" clause. LEARN MORE Solutions to Secure Your Digital Transformation Whether it's securing the cloud, meeting compliance mandates or protecting software for the Internet of Things, organizations around the world rely on Thales to accelerate their digital transformation. Implementing Strong Authentication for Office 365 Mitigate the risk of unauthorized access and data breaches. Learn More * Partners * Partners * Partners Overview * Find a Partner * Become a Partner * Channel Partners * Managed Service Providers * Technology Partners * OEM Partners * Advisory Partners * Partner Portal Login Thales Accelerate Partner Network Thales Partner Ecosystem includes several programs that recognize, rewards, supports and collaborates to help accelerate your revenue and differentiate your business. Provide more value to your customers with Thales's Industry leading solutions. Learn more to determine which one is the best fit for you. The Thales Accelerate Partner Network provides the skills and expertise needed to accelerate results and secure business with Thales technologies. Get the Brochure * Developers * Resources * Area of Interest * Encryption * Resource Type * White Papers * eBooks * Case Studies * Infographics * Webinars * Videos * Security Research * Podcasts * TalkingTrust Video Series Gartner Report: Select the Right Key Management as a Service to Mitigate Data Security and Privacy Risks in the Cloud Organizations must review their protection and key management provided by each cloud service provider. Get the Report * Access Management * Resource Type * White Papers * eBooks * Case Studies * Infographics * Webinars * Videos * Security Research * Podcasts Gartner's Market Guide for User Authentication How does user authentication relate to other identity corroboration approaches? Get the Report * Software Monetization * Resource Type * Blog * FAQ * White Papers * Case Studies * Infographics * Webinars * Business Value Calculator Navigate The Process of Licensing, Delivering, and Protecting Your Software Check out our practical guide to navigating the process of licensing, delivering, and protecting your software. Get the White Paper * Blog Explore Thales's comprehensive resources for cloud, protection and licensing best practices. A Global Leader in Data Security The largest companies and most respected brands in the world rely on Thales to protect their most sensitive data. GET THE BROCHURE * * Support * Customer Support * Software Monetization * Drivers & Downloads * Security Updates * Product Announcements / Training * Customers * Activate a Product / Support Portal * Data Protection * Security Updates * Product Announcements * Training Services * Technical Training Calendar * Professional Services * About * About Us * Leadership * Newsroom * News Coverage * Events * Customers * Industry Associations & Standards Organizations * Information Security Research * Contact Sales * Contact Encryption * Contact Access Management * Contact Software Monetization * EN * English (GB) * Français * Deutsch * Italiano * Español * Português * 日本語 * 한국어 * Microsites * Polskie * Nederlands * 中文(繁體) THALES CLOUD SECURITY YOUR DATA, THEIR CLOUD. Take control of your security in the cloud. Learn More THALES ACQUIRES ONEWELCOME, A EUROPEAN LEADER IN THE FAST GROWING MARKET OF CUSTOMER IDENTITY AND ACCESS MANAGEMENT Read More 2022 THALES DATA THREAT REPORT Critical Infrastructure Edition Get the Report 2022 THALES CLOUD SECURITY STUDY The Challenges of Data Protection in a Multicloud World Get the Report 2022 THALES CLOUD SECURITY STUDY The Changing Face of Data Security Get the Report REDUCE THE DRAG OF ADDING DATA SECURITY – IN MINUTES INSTEAD OF WEEKS With a FREE-FOREVER CipherTrust Platform Community Edition Get Started Today CipherTrust Data Security Platform ARE YOU PREPARED FOR SOFTWARE INDUSTRY CHANGES? Leverage the 2022 Trends Report Get the Report DATA SECURITY FOR A ZERO TRUST WORLD Explore Our Solutions THALES CLOUD SECURITY YOUR DATA, THEIR CLOUD. Take control of your security in the cloud. Learn More THALES ACQUIRES ONEWELCOME, A EUROPEAN LEADER IN THE FAST GROWING MARKET OF CUSTOMER IDENTITY AND ACCESS MANAGEMENT Read More * 1 * 2 * 3 * 4 * 5 * 6 * 7 * 8 WE PROVIDE SECURITY FOR A WORLD POWERED BY THE CLOUD, DATA AND SOFTWARE CLOUD SECURITY Whether it’s using cloud services or storing data across multiple clouds, you can rely on Thales to secure access to your entire cloud app ecosystem and protect sensitive data in any cloud. Learn More DATA PROTECTION Wherever your data is stored, accessed or in use, you can rely on Thales to deliver effective encryption strategies to protect enterprise from data breaches and achieve compliance. Learn More ACCESS MANAGEMENT As your organization runs more apps in the cloud, you can rely on Thales to deliver secure, trusted access to all of your cloud services and existing enterprise apps for your employees. Learn More SOFTWARE MONETIZATION As your company shifts to a software-based business, you can rely on Thales to help you generate new revenue streams and gain more valuable insights from your software. Learn More AMERISOURCEBERGEN ENSURES CUSTOMER TRUST IN THE HEALTHCARE INDUSTRY WITH THALES AmerisourceBergen deploys Ciphertrust Data Security Platform to protect privacy and comply with regulations. Read the Case Study See More Customer Stories Resources and Useful Insights GARTNER’S MARKET GUIDE FOR USER AUTHENTICATION Discover Gartner's analysis on how user authentication relates to other identity corroboration approaches in this complete market analysis. Get the Report GARTNER REPORT: 2022 STRATEGIC ROADMAP FOR DATA SECURITY PLATFORM CONVERGENCE Analysis on migrating from siloed data security offerings to platforms that enable simpler, consistent end-to-end data security. Get the Report HOW TO GET SOFTWARE LICENSING RIGHT THE FIRST TIME Check out our practical guide to navigating the process of licensing, delivering, and protecting your software. Get the White Paper View All Resources Contact a specialist about Cloud Protection & Licensing Contact Us SEE THE ADVANTAGE OF THE THALES ACCELERATE PARTNER NETWORK 2000 Partners Worldwide 350+ Technology Partners 500+ Technology Integrations Become a Partner * * * * * Find a Partner Upcoming Events View More August 4, 2022 IS THE DEMISE OF OTP AUTHENTICATION IMMINENT? Virtual July 19, 2022 THALES DELIVERS SOLUTION TO HELP SAP CUSTOMERS CONTROL THEIR DATA IN THE CLOUD Joint solution supports SAP’s commitment to keeping customer data secure when utilising a public cloud Organisations… July 12, 2022 THALES ACQUIRES ONEWELCOME, A LEADER IN CUSTOMER IDENTITY AND ACCESS MANAGEMENT Headquartered in the Netherlands, OneWelcome is a European leader in Customer Identity and Access Management (CIAM), an… News View All Get in contact with a specialist Contact Us cpl.thalesgroup.com Visit our parent site at www.thalesgroup.com * Products * Data Protection * Access Management & Authentication * Software Monetization * Solutions * By Use Case * By Industry * By Compliance * Partners * Find a Partner * Become a Partner * Partner Portal Login * Resources * Resources Library * Blog * Podcasts * Support * Customer Support * Training Services * About * Contact Us * India E-Waste Program * Newsroom SUBSCRIBEGet the latest data protection and access management resources and insights delivered right to your inbox. Copyright © 2022 Thales. All Rights Reserved * * Privacy Policy * Disclaimer * EU Commitments * Sitemap * Cookie Policy * Terms & Conditions * Do Not Sell My Personal Information Search Partners Resources Blogs Sentinel Drivers