Thales has rapidly deployed innovative solutions to serve the healthcare providers and other public organisations who are addressing the most critical challenges in the fight against COVID-19 all around the world.
To support frontline medical teams in their missions, T...
According to the 2020 Thales Access Management Index ¨C Europe and Middle East Edition1 ¨C nearly a third (29%) of organizations in Europe and the Middle East still see usernames and passwords as one of the most effective means to protect access to their IT infrastructu...
Thales has deployed the world¡¯s first GSMA-certified eSIM activation solution on Google Cloud. This solution will offer telecom operators secure and highly scalable support to manage increases in mobile subscriptions for eSIM-capable devices. It also lets them benefit ...
For over 30 years, we have worked closely with the Royal Australian Navy and other partners to ensure the Navy¡¯s diverse fleet of surface ships is provided dependable and reliable support, engineering integration, sustainment and lifecycle management services; ensuring...
A Public Key Infrastructure (PKI) solution by Thales - offered as a bespoke combination of products and managed services - lets you unlock the full benefits of PKI whilst avoiding the many pitfalls of a weak implementation - also Public Key Infrastructure as a Service ...
NHS Wales has responded to a surge in cyber-attacks against the healthcare sector by enlisting the services of some of the world¡¯s leading cyber security experts¡
April 2020 - if you were to drive on one of England¡¯s motorways today (and please don¡¯t, unless you are a key worker and have no choice) two things would strike you as odd¡
The world relies on Thales to protect and secure access to your most sensitive data and software wherever created, shared or stored. Building an encryption strategy, licensing software, providing¡
The Google NEXT 2025 event was a remarkable showcase of innovation, collaboration, and cutting-edge technology. Thales, a global leader in advanced cyber security technologies, played an engaging¡