Protecting the Most Vital Data from the Core to the Cloud to the Field

Thales Trusted Cyber Technologies (TCT) is a U.S. based provider of government high-assurance data security solutions. Our mission is to provide innovative solutions to protect the most vital data from the core to the cloud to the field for defense, intelligence, and civilian agencies across the U.S. Federal Government. With a concentration on Federal and other U.S. government agency requirements, Thales TCT is better able to serve its government customers while also investing in the development of future technologies to secure the Federal Government’s most sensitive information.

Our Story

On January 1, 2020, SafeNet Assured Technologies, LLC. and Thales Cloud Protection & Licensing, Federal united under a new name as Thales Trusted Cyber Technologies, a division of Thales Defense and Security Inc. Our employees are dedicated to providing the most secure products in the industry. Many of our employees have over 20 years of experience in designing and manufacturing data security products for both government and commercial applications dating back to the original IRE and SafeNet, Inc. days.

Challenges We Solve

We offer best-of-breed solutions to our U.S. Federal customers. From our core solutions developed specifically for the government to Thales Cloud Protection & Licensing commercial-off-the-shelf solutions we sell and support, our offerings address the most stringent federal requirements. Our extensive data security experience allows us to provide one of the most broad data protection portfolios specifically focused on U.S. Federal agency requirements for protecting mission critical data in data centers, cloud environments, and field deployments.

Thales Trusted Cyber Technologies

Solutions We Offer

Our extensive data security experience allows us to provide one of the most broad data protection portfolios specifically focused on U.S. Federal agency requirements for protecting mission critical data in data centers, cloud environments, and field deployments. Our product portfolio includes:

  • Cryptographic Key Management Solutions
    Centrally, efficiently, and securely manage and store cryptographic keys and policies—across the key management lifecycle and throughout the enterprise with hardware-based or virtualized cryptographic key management solutions. Our Luna Hardware Security Modules protect root encryption keys used by applications and transactions. Additionally, we offer enterprise, cloud, and tactical key management solutions that centrally manage and protect keys on behalf of a variety of data-at-rest encryption platforms. Our solutions integrate with over 300 leading data encryption solutions from the top third-party vendors.
  • Data Encryption Solutions
    Whether storing data-at-rest in a physical data center, a private or public cloud, or in a third-party storage application, proper encryption and key management are critical factors in ensuring sensitive data is protected. We offer data encryption that deliver granular encryption and role-based access control for structured and unstructured data residing in databases, applications, files, and storage containers. With centralized key management and a hardened root of trust, agencies can ensure their master keys are protected and data remains secure.
  • Network Encryption Solutions
    Encrypt data in transit everywhere—from network traffic between data centers and the headquarters to backup and disaster recovery sites, whether on premises or in the cloud through our high speed encryption solutions. We offer CN Series Encryptors protect data, video, voice at speeds ranging from 100Gbps to 10MBPS from eavesdropping, surveillance, and interception at an affordable cost, without compromising security or performance.
  • Authentication and Access Management Solutions
    Control access to sensitive data and protect user identities with our authentication solutions. We offer authentication solutions that address the evolution of identities. From traditional high assurance authentication tokens to first-of-a-kind hardware security module-secured identity credentials, Thales TCT offers the most secure, certificate-based authentication platforms available to the U.S. Federal Government.

Trusted, U.S. Based Source for Cyber Security Solutions

Thales TCT develops, manufactures, sells, and supports our core trusted data security solutions in the U.S.

  • We provide U.S. Federal agencies with solutions that have a U.S. supply chain lifecycle
  • We design solutions for U.S. Federal agencies with our own maintained and compiled code
  • We maintain required federal government approvals and certifications to develop, support and sell products to U.S. Federal agencies

Thales TCT also serves as the provider of Thales Cloud Protection & Licensing Enterprise Cyber Security solutions to the Federal Government.

For more information on TCT, visit www.thalestct.com.