Thales

Thales

Document request

Document content
Flyer

HSM introduction support service - To easily introduce HSM in a short period of time - 1.45MB/7P PDF NEW

Lecture report

Appropriate data security essential for cloud use! Explanation of risks that cannot be overlooked and countermeasure points5.05MB /4P PDF

You should keep it! Data utilization situation and security in the medical industry ~ What is a reliable ally of data security in the DX era? ~ 982KB/16P PDF

white paper

[For service providers] Recommendations for data protection essential for the services of your choice 2.45MB/4P PDF NEW

The latest ransomware countermeasures achieved with three elements - What are the "next" measures for endpoint security? 2.22MB/6P PDF

What cyberattacks should be considered in preparation for the spread of quantum cryptography? ~ Next Generation Security Measures Realized by HSM ~ 1.12MB/7P PDF

[For the manufacturing industry] Essential product security for IoT products of choice2.45MB /7P PDF

[For the automotive industry] Enhancing security through "encryption key management" in the automotive industry, which is facing a revolutionary era - HSM that supports both product security and information security - 1.07MB/ 4P PDF

[For the financial industry] Further risk reduction is possible with "encryption key management" in the financial industry, which requires high security measures ~Safely manage data encrypted with HSM~ 0.82MB/ 4P PDF

[For the defense industry] Minimizing risks by strengthening encryption key management in the defense industry, which requires even greater security measures ~Thorough management of HSM-encrypted data~ 0.99MB/ 4P PDF

[For the EC industry] Reducing risks by strengthening encryption key management in the EC business where information leaks lead to customer abandonment -Strengthening the protection of confidential information including credit cards with HSM- 1.32MB/ 4P PDF

Three points of "data security" required by local governments3.39MB/4P PDF

Introduction to information leakage countermeasures required in the DX era What is proper data protection, not just encryption? 2.82MB/4P PDF

Thales Product Guide -Click here for product lineup- 1.12MB/9P PDF

Lecture materials

[Part 1] “Six” Issues of the Revised Act on the Protection of Personal Information and Vital Points for Data Utilization3.11MB /7P PDF

[Part 2] “Six” Issues of the Revised Act on the Protection of Personal Information and Vital Points for Data Utilization929KB /6P PDF

Security measures in the manufacturing industry! How to prevent leaks of design data and unauthorized use of IoT devices? 3.23MB/61P PDF

October 14, 2020 (Wednesday) "How to prevent leakage of design data and unauthorized use of products? -Facing new security issues facing the manufacturing industry in the IoT era-"

Inquiry

In charge of Macnica Thales Co., Ltd.

Mon-Fri 8:45-17:30