Skip to main content
Products
Overview
Data Encryption
Overview
Vormetric Data Security Platform
Vormetric Data Security Manager
Vormetric Transparent Encryption
Overview
Live Data Transformation
Container Security
SAP HANA
Security Intelligence Logs
Vormetric Application Encryption
Vormetric Protection for Teradata Database
Vormetric Orchestrator
Selecting the Right Encryption Approach
product
certifications
Data Tokenization, Masking and Transformation
Overview
Tokenization & Data Masking
Vormetric Batch Data Transformation
Static Data Masking
Payment HSMs
Overview
payShield 9000
HSM Management and
Monitoring
Overview
CipherTrust Monitor
payShield Manager
Key Management Device
Key Management
Overview
CipherTrust Cloud Key Manager
Enterprise Key Management
Data in Motion Encryption
Hardware
Overview
Datacryptor 5000 Series
Product Certifications
Overview
FIPS 140-2 Certification
Common Criteria Certification
Solutions
Overview
by use case
Overview
Cloud Security
Overview
Bring Your Own Encryption
Enterprise Users
Key Management
SaaS Security
Digital Transformation
Payments
Overview
EMV & Payment Card Issuance
Host Card Emulation
Mobile Card Payments
mPOS
Payment Processing
Point-to-Point Encryption
Data Security & Encryption
Overview
Database Security
Oracle Database Encryption
MSSQL Encryption
NoSQL Encryption
MongoDB Encryption
TDE Key Management
Securing Unstructured Files
Container Security
SAP Data Security
Big Data Encryption
RSA DPM Replacement
Layer 2 Encryption
Tokenization
APTs
Virtual Environment Security
by industry
Overview
Business Services
SaaS Providers
Education
Financial Services
Government
Federal Government
State and Local Government
Healthcare
Insurance Providers
Internet of Things (IoT) Security
Managed Services
Media and Entertainment
Outsourcing
Retail
Pharmacies
by compliance
Overview
Global
Overview
Data Breach Notification Laws
Data Residency
GDPR
ISO 27799:2016 Compliance
ISO/IEC 27002:2013 Compliance
PCI DSS
PCI HSM
SWIFT CSC
Americas
Overview
FDA/DEA - EPCS
GLBA
HIPAA
Mexico - Data Protection Law
NYDFS Cybersecurity Regulation
NIST 800-53 / FedRAMP
FISMA
FedRAMP
NIST 800-53, Revision 4
FIPS 199 and FIPS 200
FIPS 140-2
NCUA Regulatory Compliance
SOX
NAIC Insurance Data Security Model Law Compliance
EMEA
Overview
DEFCON 658
PSD2
South Africa POPI Act
APAC
Overview
Australia Privacy Amendment
Japan My Number Compliance
Monetary Authority of Singapore
Philippines Data Privacy Act of 2012
South Korea’s PIPA
UIDAI’s Aadhaar Number Regulation Compliance
Services
Overview
Support
Overview
Contact Support
Thales Technical Support Centre
Training
Overview
payShield Certified System Engineer Course (pCSE)
Vormetric Transparent Encryption Training
Partners
Overview
Find a Partner
Become a Partner
Channel
Technology
Service Providers
OEM
Channel Partner Portal
About
Overview
Leadership
Newsroom
Events
Blog
Customers
Careers
Legal
Industry Associations & Standards Organizations
Information Security Research
Contact us
Request a Demo
Search
EN
Careers
Contact
Blog
Resources
Help
Login
Overview
Partner Login
Thales eSecurity Support Login
Vormetric Software Download Portal
Access to CipherTrust Cloud Key Manager
English US
English UK
English AU
Español
Português, Portugal
Deutsch
日本語
한국어 (Korean)
Italiano
Русский
Français
Chinese, Simplified(简体中文)
Thales eSecurity Newsroom
Contact A Specialist
Chat With Us
Breadcrumb
Thales eSecurity
About Us
Thales eSecurity Newsroom
Search News Release
Dec 07, 2017
Thales secures mobile point-of-sale solution for Kashing, UK-based payments provider
Oct 26, 2017
Thales: Vormetric Transparent Encryption Enhances Security for Red Hat OpenShift Container Platform Deployments
Oct 17, 2017
Thales: Data Breaches at U.S. Financial Services Businesses on the Rise
Oct 17, 2017
Thales: Data breaches in Financial Services on the rise globally
Sep 29, 2017
Thales leads the way in digital technology with new excellence centre in Cambridge
Sep 21, 2017
Thales Joins the Microsoft Enterprise Cloud Alliance
Pagination
First page
« First
Previous page
‹ Previous
…
Page
2
Page
3
Current page
4
Page
5
Page
6
…
Next page
Next ›
Last page
Last »
Search News Coverage
Feb 14, 2019
Convenience in Retail Equals Data Security Risk
Jan 30, 2019
Rush to Digital Transformation Puts Security of Data at Risk
Jan 30, 2019
Enterprises Are Struggling with Cloud Complexity and Security
Jan 29, 2019
Mobile Crime and Digital Account Hacks Are Making Data Pros Sweat
Jan 29, 2019
Enterprise Digital Transformation Leaves Data Security Behind
Jan 17, 2019
The Secret CSO
Pagination
Current page
1
Page
2
Page
3
Page
4
Page
5
…
Next page
Next ›
Last page
Last »
2019 Data Threat Report
Read More
Digital Transformation and Data Privacy
Read More
Enterprise Key Management
Whitepaper
View All Resources
More
Search