Skip to main content
Home
  • Products
    • Overview

    Data Encryption

      • Overview
    • Vormetric Data Security Platform
    • Vormetric Data Security Manager
      • Vormetric Transparent Encryption
          • Overview
        • Live Data Transformation
        • Container Security
        • SAP HANA
        • Security Intelligence Logs
    • Vormetric Application Encryption
    • Vormetric Protection for Teradata Database
    • Vormetric Orchestrator
    • Selecting the Right Encryption Approach
    product
    certifications
    FIPS 140-2
    Common Criteria

    Data Tokenization, Masking and Transformation

      • Overview
    • Tokenization & Data Masking
    • Vormetric Batch Data Transformation
    • Static Data Masking

    Payment HSMs

      • Overview
    • payShield 9000

    HSM Management and
    Monitoring

      • Overview
    • CipherTrust Monitor
    • payShield Manager
    • Key Management Device

    Key Management

      • Overview
    • CipherTrust Cloud Key Manager
    • Enterprise Key Management

    Data in Motion Encryption
    Hardware

      • Overview
    • Datacryptor 5000 Series

    Product Certifications

      • Overview
    • FIPS 140-2 Certification
    • Common Criteria Certification
  • Solutions
      • Overview
    • By Use Case
      • Overview

      Cloud Security

        • Overview
      • Bring Your Own Encryption
      • Enterprise Users
      • Key Management
      • SaaS Security

      Digital Transformation

      Payments

        • Overview
      • EMV & Payment Card Issuance
      • Host Card Emulation
      • Mobile Card Payments
      • mPOS
      • Payment Processing
      • Point-to-Point Encryption

      Data Security & Encryption

        • Overview
      • Database Security
      • Oracle Database Encryption
      • MSSQL Encryption
      • NoSQL Encryption
      • MongoDB Encryption
      • TDE Key Management
      • Securing Unstructured Files
      • Container Security
      • SAP Data Security
      • Big Data Encryption
      • RSA DPM Replacement
      • Layer 2 Encryption
      • Tokenization
      • APTs
      • Virtual Environment Security
    • By Industry
        • Overview
      • Business Services
      • SaaS Providers
      • Education
      • Financial Services
      • Government
      • Federal Government
      • State and Local Government
      • Healthcare
      • Insurance Providers
      • Internet of Things (IoT) Security
      • Managed Services
      • Media and Entertainment
      • Outsourcing
      • Retail
      • Pharmacies
    • By Compliance
      • Overview

      Global

        • Overview
      • Data Breach Notification Laws
      • Data Residency
      • GDPR
      • ISO 27799:2016 Compliance
      • ISO/IEC 27002:2013 Compliance
      • PCI DSS
      • PCI HSM
      • SWIFT CSC

      Americas

        • Overview
      • FDA/DEA - EPCS
      • GLBA
      • HIPAA
      • Mexico - Data Protection Law
      • NYDFS Cybersecurity Regulation
      • NIST 800-53 / FedRAMP
      • FISMA
      • FedRAMP
      • NIST 800-53, Revision 4
      • FIPS 199 and FIPS 200
      • FIPS 140-2
      • NCUA Regulatory Compliance
      • SOX
      • NAIC Insurance Data Security Model Law Compliance

      EMEA

        • Overview
      • DEFCON 658
      • PSD2
      • South Africa POPI Act

      APAC

        • Overview
      • Australia Privacy Amendment
      • Japan My Number Compliance
      • Monetary Authority of Singapore
      • Philippines Data Privacy Act of 2012
      • South Korea’s PIPA
      • UIDAI’s Aadhaar Number Regulation Compliance
  • Services
    • Overview

    Support

      • Overview
    • Contact Support
    • Thales Technical Support Centre

    Training

      • Overview
    • payShield Certified System Engineer Course (pCSE)
    • Vormetric Transparent Encryption Training
  • Partners
    • Overview

    Find a Partner

    Become a Partner

    Channel

    Technology

    Service Providers

    OEM

    Channel Partner Portal

  • About
    • Overview

    Leadership

    Newsroom

    Events

    Blog

    Customers

    Careers

    Legal

    Industry Associations & Standards Organizations

    Contact us

  • Request a Demo
Search
EN
  • Careers
  • Contact
  • Blog
  • Resources
  • Help
  • Login
      • Overview
    • Partner Login
    • Thales eSecurity Support Login
    • Vormetric Software Download Portal
    • Access to CipherTrust Cloud Key Manager
  • English US
  • English UK
  • English AU
  • Español
  • Português, Portugal
  • Deutsch
  • 日本語
  • 한국어 (Korean)
  • Italiano
  • Русский
  • Français
  • Chinese, Simplified(简体中文)

Data Sheet

Contact A Specialist Chat With Us

Breadcrumb

  • Home
  • Resources
  • Data Sheets

Related Resources

Research and Whitepapers

2018 Thales Data Threat Report Finance Edition

Download Now
Video

CipherTrust Cloud Key Manager Introduction

View Now

Subscribe to our newsletter

Subscribe
Thales eSecurity
+44 1844 201800
Products
  • Data Encryption
  • Tokenisation & Data Masking
  • Payment HSMs
  • Key Management
  • Data In Motion Encryption Hardware
Solutions
  • By Use Case
  • By Industry
  • By Compliance
FAQ
Careers
News
Events

Thales eSecurity, All Rights Reserved

  • Privacy Policy
  • Cookie Policy
  • Legal