• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX GLOBAL
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX GLOBAL
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Thales expands technology partner ecosystem

by CXO Staff
August 12, 2020
in News
Thales expands technology partner ecosystem

Enterprises can now reduce cyber risk and secure their digital transformation initiatives in new markets including Blockchain, Cloud, DevOps, IoT and Code Signing as Thales has announced an expansion of its data protection ecosystem to more than 300 technology partners.

Through these expanded technology integrations, which now include more than 500 IT products and services, Thales is enabling more organisations to integrate its data encryption, hardware security modules, key management and access management technologies with their existing IT infrastructure and cloud services to protect applications, data and identities. This will empower organisations to implement centralised data protection and access management controls for the whole customer journey.

“The use of the cloud and digital transformation is now the cornerstone of any modern company,” said Sebastien Cano, Senior Vice President for Cloud Protection and Licensing Activities at Thales. “Vitally though, those that are truly leading the way are doing so by integrating security by design into their processes from the start. By integrating our data protection products and services with hundreds of technology partners, we can ensure customers and their sensitive data are protected throughout their entire transformation journey and remain at the forefront of their industries.”

Protecting Blockchain

Thales is collaborating with leading companies that are driving the adoption of Blockchain technology by integrating its Luna Network Hardware Security Modules (HSM) as the root of trust to secure blockchain-based transactions. Recently, Thales integrated its Luna Network HSM with CLS Group – a dedicated crypto processor that is specifically designed for the protection of the crypto key lifecycle – and Hyperledger – a multi-project open source collaborative effort hosted by The Linux Foundation, created to advance cross-industry blockchain technologies.

Enabling Secure Cloud Transformation

Today, organisations on average use 29 cloud services for their collaboration, computing, customer relationship management and storage needs. Thales is helping companies secure the move to the cloud with cloud key management and access management solutions that integrate with the most widely used cloud platforms and services including AWS, Azure, Box, Office365 and Slack.

Thales’s SafeNet Trusted Access enables organisations to modernise their IT and Identity and Access Management (IAM) schemes, as part of their cloud transformation initiatives. For example, integrations with IGA vendors such as SailPoint enable secure identity governance and identity management workflows; Security for privileged users is achieved by securing PAM solutions such as  BeyondTrust, at the access point; and continuous authentication and access control is enabled by working with CipherCloud’s CASB solution.

Securing Hybrid IT Environments

While organisations are rapidly adopting cloud services and moving infrastructure to the cloud, the majority are maintaining hybrid IT environments. One of the key challenges they face in doing so is bridging between modern and cloud IAM schemes. To this end, SafeNet Trusted Access’s integration with F5 BIG IP enables enterprises to implement smart SSO for cloud services while securing on-premises legacy applications.

Enabling Trust for DevOps

Digital certificates play an integral role in DevOps workflows, securing authentication across users, devices and applications. The secure identities and certificates establish trust within enterprise infrastructure, pipeline, code and containers.  Thales has expanded its DevOps technology partners to include Red Hat, HashiCorp, Kubernetes, VMWare Tanzu, Docker and Google for secure DevOps to enable customers to realise the benefits of automation, scale, and  cloud-native applications and digital transformation.

Securing the Identities and Data in IoT

In order to secure, manage and authenticate the billions of identities that will be created with the Internet of Things, Thales has recently expanded integrations for its HSMs, Data Encryption and Key Management solutions with leading providers of IoT security solutions such as Cisco, Microsoft, DigiCert, Sectigo, GlobalSign, KeyFactor and Venafi to help organisations secure the billions of identities that will be created over the next few years.

Code Signing becomes an essential service for businesses

Code signing has emerged as an essential ingredient to doing business for virtually any organisation that distributes code to customers and partners. Code signing verifies who the publisher of a specific set of code is and attests that it has not been modified since it was signed. Certificates delivered along with software that has been signed are a key way for users to determine whether software originates from a legitimate source before installing. Today, many software marketplaces, including mobile app stores, require code to be compliant with specific digital signing requirements.

One of those mandates is for applicants to generate and store their private key using a FIPS 140-2 Level 2 certified hardware solution. This can be a Hardware Security Module (HSM) that protects the identity, whether it is the server, virtualization server or the user. Thales’ HSMs store the signing material in a hardware device, ensuring authenticity and integrity of a code file. Thales code signing partners include Adobe, DigiCert, Garantir GlobalSign, Keyfactor, Microsoft and Venafi.

Tags: featured2Thales
ShareTweet

Related Posts

OPSWAT appoints Hussam Sidani as Vice President MENA
Business

OPSWAT appoints Hussam Sidani as Vice President MENA

December 10, 2025

OPSWAT has announced the appointment of cybersecurity industry veteran, Hussam Sidani, as Vice President for the Middle East and North...

Cloudflare’s Q3 2025 DDoS threat report includes Aisuru, the apex of botnets
Future

Cloudflare’s Q3 2025 DDoS threat report includes Aisuru, the apex of botnets

December 9, 2025

Cloudflare has announced its 2025 Q3 DDoS report. This report includes insights and trends about the DDoS threat landscape —...

Discussion about this post

Latest Issue

OPSWAT appoints Hussam Sidani as Vice President MENA

OPSWAT appoints Hussam Sidani as Vice President MENA

December 10, 2025
Cloudflare’s Q3 2025 DDoS threat report includes Aisuru, the apex of botnets

Cloudflare’s Q3 2025 DDoS threat report includes Aisuru, the apex of botnets

December 9, 2025
Vertiv completes acquisition of PurgeRite

Vertiv completes acquisition of PurgeRite

December 9, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy
© 2025 – CXO Insight Middle East. All Rights Reserved.
Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2025 - CXO Insight Middle East. All Rights Reserved.