Site Search

Thales

Thales

Document request

Document content
Product and service information

[For central government ministries and agencies] Measures to protect confidential data when using the cloud - Appropriate data encryption and key management with BYOK - 2.86MB/7P PDF

Document content
Document

Prevent information leakage of data flowing through the network High-speed network encryption solution Thales High Speed Encryptors (HSE)

Document content
Document

Thales CipherTrust Data Security Platform (CDSP) is an integrated data security platform that covers everything from identifying sensitive data to encryption and key management.

Document content
Flyer

HSM Implementation Support Service - To easily implement HSM in a short period of time - 1.45MB/7P PDF

Lecture report

Appropriate data security essential for cloud use! Explanation of risks that cannot be overlooked and countermeasure points5.05MB /4P PDF

You should keep it! Data utilization situation and security in the medical industry ~ What is a reliable ally of data security in the DX era? ~ 982KB/16P PDF

white paper

[For service providers] Data protection is essential for services to be chosen 2.45MB/4P PDF

The latest ransomware countermeasures achieved with three elements - What are the "next" measures for endpoint security? 2.22MB/6P PDF

What cyberattacks should be considered in preparation for the spread of quantum cryptography? ~ Next Generation Security Measures Realized by HSM ~ 1.12MB/7P PDF

[For the manufacturing industry] Essential product security for IoT products of choice2.45MB /7P PDF

[For the automotive industry] Enhancing security through "encryption key management" in the automotive industry, which is facing a revolutionary era - HSM that supports both product security and information security - 1.07MB/ 4P PDF

[For the financial industry] Further risk reduction is possible with "encryption key management" in the financial industry, which requires high security measures ~Safely manage data encrypted with HSM~ 0.82MB/ 4P PDF

[For the defense industry] Minimizing risks by strengthening encryption key management in the defense industry, which requires even greater security measures ~Thorough management of HSM-encrypted data~ 0.99MB/ 4P PDF

[For the EC industry] Reducing risks by strengthening encryption key management in the EC business where information leaks lead to customer abandonment -Strengthening the protection of confidential information including credit cards with HSM- 1.32MB/ 4P PDF

Three points of "data security" required by local governments3.39MB/4P PDF

Introduction to information leakage countermeasures required in the DX era What is proper data protection, not just encryption? 2.82MB/4P PDF

Thales Product Guide -Click here for product lineup- 1.12MB/9P PDF

Lecture materials

[Part 1] “Six” Issues of the Revised Act on the Protection of Personal Information and Vital Points for Data Utilization3.11MB /7P PDF

[Part 2] “Six” Issues of the Revised Act on the Protection of Personal Information and Vital Points for Data Utilization929KB /6P PDF

Security measures in the manufacturing industry! How to prevent leaks of design data and unauthorized use of IoT devices? 3.23MB/61P PDF

October 14, 2020 (Wednesday) "How to prevent leakage of design data and unauthorized use of products? -Facing new security issues facing the manufacturing industry in the IoT era-"

Inquiry

In charge of Macnica Thales Co., Ltd.

Weekdays: 9:00-17:00