• Japanese
  • Company
  • Contact
  • Blog
spacer
  • Solutions
    • By Business Issue
      Thales enables organizations to address their most challenging data protection requirements associated with a wide range of business issues.
      • Cloud Computing Security
      • Data Breach Disclosure Regulation
      • PCI DSS Auditing and Compliance
      • Privacy Compliance
      • Controlling Fraud and Protecting Intellectual Property
      • Data Protection Strategy
      • Protecting Applications from Malware and APTs
      • Trust and Identity Management
    • By Technology Focus
      Thales provides core cryptography and key management technology that enables organizations to implement high assurance technology solutions.
      • Credentialing and PKI Applications
      • Code Signing
      • Credential Management
      • Digital Signatures
      • DNSSEC
      • PKI and Digital Certificates
      • Strong Authentication
      • Time Stamping
      • Encryption
      • Application-Level Encryption
      • Database Encryption
      • Encryption Strategy
      • Network Encryption
      • Point-to-Point Encryption
      • SSL/TLS Encryption
      • Storage-Level Encryption
      • Tokenization
      • Cryptographic Security and Management
      • Cryptographic Acceleration
      • Key Management
      • Programmable Cryptography
      • Secure Code Execution
      • Tamper-Resistant Security
      • Payments
      • EMV and Payment Card Issuance
      • Mobile Payments
      • Payment Processing
  • Products & Services
    • Hardware Security Modules
      Hardware Security Modules (HSMs) provide a hardened, tamper-resistant environment for performing secure cryptographic processing, key protection, and key management.
      • General Purpose
      • nShield Connect
      • nShield Edge
      • nShield Solo
      • Payment
      • payShield 9000
      • Key Management Device (KMD)
      • Remote HSM Manager
    • Identity Management
      Identity management products support strong user authentication and consistent management of user identities for both internal and external applications.
      • Authentication
      • SafeSign Authentication Server
      • payShield Cardholder
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.