https://cpl.thalesgroup.com/ | | IMG-ALT Thales logo | Building a Future We Can All Trust |
/products | | Products |
/products | | Products Overview |
/data-protection | | Data Security |
/encryption/data-discovery-and... | | Data Discovery & Classification |
/encryption | | Data at Rest Encryption |
/encryption | Text duplicate | Data at Rest Encryption |
/encryption/data-security-plat... | | Data Security Platform |
/encryption/transparent-encryp... | | Transparent Encryption |
/encryption/ciphertrust-transp... | | Encryption for Kubernetes |
/encryption/ciphertrust-transp... | | Encryption UserSpace |
/encryption/application-data-p... | | Application Data Protection |
/encryption/tokenization | | Tokenization |
/encryption/ciphertrust-data-p... | | Data Protection Gateway |
/encryption/database-protection | | Database Protection |
/encryption/batch-data-transfo... | | Batch Data Transformation | Static Data Masking |
/encryption/intelligent-data-p... | | Intelligent Protection |
/encryption/selecting-right-en... | | Selecting the Right Encryption Approach |
/encryption/ciphertrust-ransom... | | Ransomware Protection |
/encryption/key-management | | Key Management |
/encryption/key-management | Text duplicate | Key Management |
/encryption/ciphertrust-manager | | CipherTrust Manager |
/encryption/vormetric-data-sec... | | Data Security Manager |
/encryption/key-management/cip... | | CipherTrust Cloud Key Manager |
/encryption/enterprise-key-man... | | Enterprise Key Management |
/encryption/ciphertrust-platfo... | | CipherTrust Platform for DevOps |
/encryption/data-security-plat... | | CipherTrust Cloud Key Management Service |
/encryption/ciphertrust-secret... | | Secrets Management |
/encryption/hardware-security-... | | Hardware Security Modules |
/encryption/hardware-security-... | Text duplicate | Hardware Security Modules |
/encryption/hardware-security-... | | General Purpose HSMs |
/encryption/hardware-security-... | | Payment HSMs |
/encryption/data-protection-on... | | Luna Cloud HSM Services |
/encryption/data-protection-on... | | Data Protection on Demand |
/encryption/data-protection-on... | Text duplicate | Data Protection on Demand |
/encryption/data-protection-on... | | Services |
/encryption/data-protection-on... | | How it Works |
/encryption/data-protection-on... | | Partners |
/encryption/data-protection-on... | | Pricing |
/encryption/data-protection-on... | | Sign Up Now |
/encryption/data-in-motion | | Network Encryption |
https://www.imperva.com/produc... | New window External Subdomain | Risk Analytics & Monitoring |
/encryption/data-at-rest/sure-... | | Secure File Sharing |
/resources/encryption/hsm-anch... | | Get the White Paper |
https://www.imperva.com/produc... | New window External Subdomain | Application Security |
https://www.imperva.com/produc... | New window External Subdomain | Explore Application Security |
/about-us/thales-imperva | | Learn More |
/access-management | | Identity & Access Management |
/access-management/adaptive-ac... | | Adaptive Access Control |
/access-management/byoi-social... | | BYOI & Social Login |
/access-management/consent-pre... | | Consent & Preference Management |
/access-management/delegated-u... | | Delegated User Management |
/access-management/externalize... | | Externalized Authorization |
/access-management/fraud-risk-... | | Fraud & Risk Management |
/access-management/identity-ve... | | Identity Verification |
/access-management/multi-facto... | | Multi-Factor Authentication |
/access-management/risk-based-... | | Risk-based Authentication |
/access-management/single-sign-on | | Single Sign-On (SSO) |
/access-management/strong-cust... | | Strong Customer Authentication |
/access-management/user-journe... | | User Journey Orchestration |
/access-management/customer-id... | | Customer Identity |
/access-management/workforce-i... | | Workforce Identity |
/access-management/b2b-identity | | B2B Identity |
/access-management/gig-worker-... | | Gig Worker Identity |
/access-management/authenticat... | | FIDO Passkeys and Devices |
/access-management/on-prem-aut... | | On-Prem Management Platforms |
/access-management/onewelcome-... | | OneWelcome |
/access-management/authenticat... | | OTP Authenticators |
/access-management/authenticat... | | MobilePASS+ |
/access-management/authenticat... | | Passwordless Authentication |
/access-management/authenticat... | | PKI USB Tokens |
/access-management/safenet-tru... | | SafeNet Trusted Access |
/access-management/authenticat... | | Smart Cards |
/access-management/smart-card-... | | Smart Card Readers |
/access-management/authenticat... | | Tokenless Authentication |
/access-management/demo-request | | Request a Demo |
/access-management/idaas-cloud... | | Free Trial: SafeNet Trusted Access |
/resources/access-management/a... | | Get the eBook |
/software-monetization | | Software Monetization |
/software-monetization | | Software Monetization Overview |
/software-monetization/softwar... | | License Management |
/software-monetization/entitle... | | Entitlement Management |
/software-monetization/rights-... | | Rights Management System |
/software-monetization/all-pro... | | Software License & Copy Protection |
/software-monetization/all-pro... | | All Software Monetization Products |
/resources/software-monetizati... | Text duplicate | Get the eBook |
/data-threat-report | | Get Your Copy Today |
/solutions | | Solutions |
/solutions | | Solutions Overview |
/solutions | | By Use Case |
/encryption/5g-security | | 5G Security |
/access-management/network-acc... | | Access Security |
/access-management/network-acc... | Text duplicate | Access Security |
/access-management/secure-remo... | | Secure Remote Access |
/access-management/vpn-securit... | | Secure VPN Access |
/access-management/saas-securi... | | Secure Cloud Access |
/access-management/secure-acce... | | VDI Security Solutions |
/access-management/two-factor-... | | 2FA Solutions |
/access-management/web-based-a... | | Web and Cloud SSO |
/access-management/physical-lo... | | Physical & Logical Access Control |
/access-management/cyber-insur... | | MFA for Cyber Insurance |
/encryption/blockchain | | Blockchain |
/cloud-security | | Cloud Security |
/cloud-security | Text duplicate | Cloud Security |
/encryption/amazon-web-service... | | Amazon Web Services |
/encryption/bring-your-own-enc... | | Bring Your Own Encryption (BYOE) |
/encryption/cloud-data-encryption | | Cloud Data Encryption |
/access-management/cloud-sso | | Cloud SSO |
/cloud-security/google-cloud-p... | | Google Cloud |
/encryption/hardware-security-... | | Luna HSMs – Hybrid, On-Premises and Cloud HSM |
/encryption/microsoft-azure | | Microsoft Azure |
/cloud-security/encryption/dou... | | Microsoft Double Key Encryption (DKE) |
/cloud-security/enterprise-users | | Multi-Cloud Security |
/cloud-security/oracle-oci-key... | | Oracle Cloud Infrastructure |
/cloud-security/your-data-thei... | | Your Data Their Cloud |
/encryption/data-security-and-... | | Data Security & Encryption |
/encryption/data-security-and-... | Text duplicate | Data Security & Encryption |
/encryption/advanced-persisten... | | Advanced Persistent Threats (APTs) |
/encryption/big-data-security-... | | Big Data Security |
/encryption/database-security | | Database Security and Encryption |
/encryption/docker-security | | Docker Encryption |
/encryption/ciphertrust-transp... | Text duplicate | Encryption for Kubernetes |
/encryption/ciphertrust-transp... | Text duplicate | Encryption UserSpace |
/encryption/database-security/... | | MongoDB Encryption |
/encryption/database-security/... | | MS SQL Server Encryption |
/encryption/database-security/... | | NoSQL Encryption |
/encryption/database-security/... | | Oracle Database Encryption |
/encryption/database-security/... | | PostgreSQL Database Encryption |
/encryption/sap-data-security | | SAP Data Security |
/encryption/database-security/... | | Securing Unstructured Files |
/encryption/database-security/... | | TDE Key Management |
/encryption/virtual-environmen... | | Virtual Environment Security |
/compliance/data-sovereignty | | Data Sovereignty |
/data-protection/digital-trans... | | Digital Transformation |
/industry/iot-security | | IoT Security |
/industry/iot-security | Text duplicate | IoT Security |
/encryption/iot/smart-grid-sec... | | Smart Grid Security |
/iot/connected-cars | | IoT Connected Car |
/iot/secure-manufacturing | | IoT Secure Manufacturing |
/data-protection/healthcare-da... | | IoT Healthcare |
/encryption/transaction-paymen... | | Payment & Transactions |
/encryption/transaction-paymen... | Text duplicate | Payment & Transactions |
/encryption/secure-payments | | Secure Payments |
/encryption/point-to-point-enc... | | Point-to-Point Encryption |
/data-protection/secure-digita... | | Document Signing |
/encryption/emv-and-payment-ca... | | EMV & Payment Card Issuance |
/encryption/host-card-emulation | | Host Card Emulation |
/encryption/mobile-card-payments | | Mobile Card Payments |
/encryption/mpos | | mPOS |
/encryption/payment-processing | | Payment Processing |
/encryption/credit-card-pin-ma... | | Secure Credit Card & Pin Management |
/data-protection/pki-credentia... | | PKI Credential Management |
/data-protection/pki-credentia... | Text duplicate | PKI Credential Management |
/access-management/security-ap... | | PKI Middleware |
/access-management/authenticat... | | PKI Authentication |
/data-protection/pki-security-... | | PKI Security |
/data-protection/pki-security-... | | PKI Security Solutions |
/data-protection/pki-security-... | Text duplicate | PKI Security Solutions |
/encryption/tls-ssl-security-c... | | TLS/SSL Key Security |
/data-protection/secure-digita... | | Code Signing |
/data-protection/secure-digita... | | Secure Digital Signatures |
/data-protection/secure-digita... | | Electronic Invoicing |
/data-protection/secure-digita... | | DNS Security |
/access-management/email-encry... | | Email Encryption |
/encryption/post-quantum-crypt... | | Quantum |
/encryption/post-quantum-crypt... | Text duplicate | Quantum |
/encryption/post-quantum-crypt... | | TEST YOUR QUANTUM READINESS |
/encryption/ransomware-solutions | | Ransomware Solutions |
/cloud-security/remote-workfor... | | Remote Workforces Challenges |
/software-monetization | Text duplicate | Software Monetization |
/software-monetization | Text duplicate | Software Monetization |
/software-monetization/softwar... | | Software License Management |
/software-monetization/entitle... | Text duplicate | Entitlement Management |
/software-monetization/softwar... | | Software Packaging & Pricing |
/software-monetization/softwar... | | Software Usage Tracking & Reporting |
/software-monetization/softwar... | | Software Protection & Licensing |
/software-monetization/capture... | | Capture Revenue Opportunities |
/cloud-security/zero-trust | | Zero Trust Security |
/resources/cloud-security/best... | | GET THE WHITE PAPER |
/solutions | | By Industry |
/industry/connected-car-protec... | | Automotive |
/industry/critical-infrastruct... | | Critical Infrastructure |
/industry/education-solutions | | Education |
/industry/government-data-secu... | | Government |
/industry/government-data-secu... | Text duplicate | Government |
/industry/government/federal-g... | | Federal Government |
/industry/government/state-loc... | | State and Local Government |
/industry/government/law-enfor... | | Law Enforcement |
/industry/financial-data-security | | Financial Services |
/industry/healthcare-data-secu... | | Healthcare |
/industry/insurance-provider-d... | | Insurance Providers |
/industry/manufacturing-data-s... | | Manufacturing and Industrial |
/industry/media-and-entertainm... | | Media and Entertainment |
/industry/retail-data-security | | Retail |
/industry/cloud-saas-provider-... | | SaaS Providers and Consumers |
/industry/telecom-data-securit... | | Telecommunications |
/digital-trust-index | | GET THE REPORT |
/solutions | | By Compliance |
/solutions | | Global |
/compliance/basel-compliance-s... | | Basel Compliance Solutions |
/compliance/data-breach-notifi... | | Data Breach Notification Laws |
/compliance/data-sovereignty | Text duplicate | Data Sovereignty |
/compliance/gdpr-compliance | | GDPR |
/compliance/iso-277992016-comp... | | ISO 27799:2016 Compliance |
/compliance/solutions-for-iso-... | | ISO/IEC 27001:2022 Compliance |
/compliance/isoiec-270022013-c... | | ISO/IEC 27002:2013 Compliance |
/compliance/pci-dss-compliance | | PCI DSS |
/compliance/pci-hsm | | PCI HSM |
/compliance/swift-csc-compliance | | Swift CSC |
/compliance/fips-common-criter... | | Validations and Certifications |
/solutions | | Americas |
/compliance/americas/brazil-ge... | | Brazil - LGPD |
/compliance/americas/californi... | | CCPA (California Consumer Privacy Act) |
/compliance/cjis-compliance | | CJIS |
/compliance/epcs-dea-fda-compl... | | FDA/DEA - EPCS |
/compliance/americas/nist-800-... | | FedRamp |
/compliance/americas/nist-800-... | | FISMA |
/compliance/americas/nist-800-... | | FIPS 199 and FIPS 200 |
/compliance/americas/fips-140-2 | | FIPS 140-2 |
/compliance/fips-140-3 | | FIPS 140-3 |
/compliance/glba-compliance | | GLBA |
/compliance/hipaa-hitech-compl... | | HIPAA |
/compliance/americas/mexico-da... | | Mexico - Data Protection Law |
/compliance/americas/naic-insu... | | NAIC Insurance Data Security Model Law Compliance |
/compliance/new-york-cybersecu... | | New York State Cybersecurity Requirements for Financial Services Companies Compliance |
/compliance/credit-union-compl... | | NCUA Regulatory Compliance |
/compliance/americas/nist-800-... | | NIST 800-53, Revision 4 |
/compliance/americas/pipeda-co... | | PIPEDA Compliance |
/compliance/sox-compliance-sar... | | SOX |
/compliance/americas/secure-te... | | STIR/SHAKEN |
/solutions | | EMEA |
/compliance/emea/defcon-658 | | DEFCON 658 |
/compliance/emea/data-security... | | DORA |
/compliance/emea/saudi-arabia-... | | ECC |
/compliance/eidas | | eIDAS |
/compliance/gdpr-compliance | Text duplicate | GDPR |
/compliance/emea/nis2-directiv... | | NIS2 |
/compliance/emea/psd2 | | PSD2 |
/compliance/emea/schrems-ii | | Schrems II |
/compliance/emea/south-africa-... | | South Africa POPI Act |
/solutions | | APAC |
/compliance/apac/data-security... | | Australia ASIC Market Integrity Rules |
/compliance/apac/australia-cps... | | Australia APRA CPS234 |
/compliance/privacy-act-australia | | Australia Privacy Amendment |
/compliance/apac/bangladesh-da... | | Bangladesh ICT Security Guideline |
/compliance/apac/personal-info... | | China Personal Information Security Specification |
/compliance/apac/complying-wit... | | Hong Kong Digital Assets Guidelines |
/compliance/apac/hk-cloud-comp... | | Hong Kong Practice Guide for Cloud Computing Security |
/compliance/apac/secure-tertia... | | Hong Kong Secure Tertiary Data Backup (STDB) Guideline |
/compliance/apac/virtual-asset... | | Hong Kong Virtual Asset Trading Platforms Operators Guideline |
/compliance/apac/india-digital... | | India Digital Personal Data Protection Act |
/compliance/apac/framework-seb... | | India Framework for Adoption of Cloud Services by SEBI |
/compliance/apac/data-security... | | India IRDAI ICS Guidelines |
/compliance/apac/data-security... | | India RBI Outsourcing of IT Services Directions |
/compliance/apac/indonesia-per... | | Indonesia Personal Data Protection Law |
/compliance/apac/data-security... | | Japan Act on Protection of Personal Information |
/compliance/apac/japan-my-number | | Japan My Number Compliance |
/compliance/j-sox-compliance | | J-Sox |
/compliance/apac/korea-persona... | | Korea Personal Information and Information Security Management System (ISMS-P) |
/compliance/apac/monetary-auth... | | Monetary Authority of Singapore |
/compliance/data-privacy-act-p... | | Philippines Data Privacy Act of 2012 |
/compliance/apac/malaysia-bnm-... | | Risk Management in Technology (RMiT) Policy |
/compliance/apac/singapore-mas... | | Singapore MAS Advisory On Quantum |
/compliance/apac/recommendatio... | | Singapore Public Sector Data Security |
/compliance/apac/singapore-cco... | | Singapore CCoP2.0 |
/compliance/apac/south-koreas-... | | South Korea's PIPA |
/compliance/apac/uidais-aadhaa... | | UIDAI's Aadhaar Number Regulation Compliance |
/compliance/apac/data-security... | | Vietnam Personal Data Protection Decree |
/compliance/data-breach-notifi... | | LEARN MORE |
/resources/access-management/o... | Text duplicate | Learn More |
/partners/overview | Text duplicate | Partners |
/partners/overview | | Partners Overview |
/partners/partner-search | | Find a Partner |
/partners/become-partner | | Become a Partner |
/partners/reseller-partners | | Channel Partners |
/partners/managed-service-prov... | | Managed Service Providers |
/partners/technology-partners | | Technology Partners |
/partners/oem-partners | | OEM Partners |
/partners/advisory-partners | | Advisory Partners |
/partners/cloud-partners | | Cloud Partners |
/partners/partner-login | | Partner Portal Login |
/resources/partners/accelerate... | | Get the Brochure |
/resources | | Resources |
/resources?aoi=encryption | Text duplicate | Data Security |
/resources?content=research_re... | | White Papers |
/resources?content=ebooks&aoi=... | | eBooks |
/resources?content=case_studie... | | Case Studies |
/resources?content=infographic... | | Infographics |
/resources/webinars | | Webinars |
/resources?content=videos&aoi=... | | Videos |
/enterprise-data-security-rese... | | Security Research |
/podcasts/data-security-sessions | | Podcasts |
/video-series/talking-trust | | TalkingTrust Video Series |
/resources/encryption/gartner-... | | Get the Report |
/resources?aoi=access_management | | Access Management |
/resources?content=research_re... | Text duplicate | White Papers |
/resources?content=ebooks&aoi=... | Text duplicate | eBooks |
/resources?content=case_studie... | Text duplicate | Case Studies |
/resources?content=infographic... | Text duplicate | Infographics |
/resources/webinars | Text duplicate | Webinars |
/resources?content=videos&aoi=... | Text duplicate | Videos |
/enterprise-data-security-rese... | Text duplicate | Security Research |
/podcasts/data-security-sessions | Text duplicate | Podcasts |
/resources/access-management/2... | Text duplicate | Get the Report |
/resources?aoi=software_moneti... | Text duplicate | Software Monetization |
/blog?category=software_moneti... | | Blog |
/software-monetization/softwar... | | FAQ |
/resources?content=research_re... | Text duplicate | White Papers |
/resources?content=case_studie... | Text duplicate | Case Studies |
/resources?content=infographic... | Text duplicate | Infographics |
/resources/software-monetizati... | Text duplicate | Webinars |
/software-monetization/learnin... | | Learning Hub |
/resources/software-monetizati... | Text duplicate | Get the eBook |
https://cpl.thalesgroup.com/blog | Text duplicate | Blog |
/resources/identity-data-secur... | | GET THE BROCHURE |
/customer-support | | Support |
/customer-support | | Customer Support |
/software-monetization/sentine... | | Drivers & Downloads |
https://supportportal.thalesgr... | New window External Subdomain | Product Announcements / Training |
https://supportportal.thalesgr... | New window External Subdomain | Activate a Product / Support Portal |
https://data-protection-update... | New window External Subdomain | Product Announcements |
/services/training-services | | Training Services |
/technical-training-calendar | | Technical Training Calendar |
/support/professional-services | | Professional Services |
https://supportportal.thalesgr... | External Subdomain | Security Updates |
/about-us | | About |
/about-us | | About Us |
/leadership | | Leadership |
/about-us/newsroom | | Newsroom |
/about-us/in-the-news | | News Coverage |
/events | | Events |
/customers | | Customers |
/industry-associations-and-sta... | | Industry Associations & Standards Organizations |
/careers | | Careers |
/about-us/thales-imperva | | Thales + Imperva |
/encryption/contact-us | | Contact Encryption |
/access-management/contact-us | | Contact Access Management |
/software-monetization/contact-us | | Contact Software Monetization |
https://cpl.thalesgroup.com/en-gb | | English (GB) |
https://cpl.thalesgroup.com/fr | | Français |
https://cpl.thalesgroup.com/de | | Deutsch |
https://cpl.thalesgroup.com/it | | Italiano |
https://cpl.thalesgroup.com/es | | Español |
https://cpl.thalesgroup.com/pt-pt | | Português |
https://cpl.thalesgroup.com/ja | | 日本語 |
https://cpl.thalesgroup.com/ko | | 한국어 |
https://cpl.thalesgroup.com/pl | | Polskie |
https://cpl.thalesgroup.com/nl | | Nederlands |
https://cpl.thalesgroup.com/zh-tw | | 中文(繁體) |
/resources/access-management/p... | | Get the Guide |
/encryption/ciphertrust-restfu... | | Learn about CRDP |
/cloud-security-research | Text duplicate | Get the Report |
/about-us/thales-imperva | | Find Out More |
https://www.imperva.com/produc... | External Subdomain Text duplicate | Learn More |
/data-protection | Text duplicate | Learn More |
/access-management | Text duplicate | Learn More |
/software-monetization | Text duplicate | Learn More |
/cloud-security-research | Text duplicate | Get the Report |
/data-threat-report | Text duplicate | Get the Report |
https://www.imperva.com/resour... | New window External Subdomain Text duplicate | Get the Report |
/resources/encryption/simplify... | | Read the Case Study |
/resources?content=case_studies | | See More Customer Stories |
/resources/access-management/g... | | GARTNER MAGIC QUADRANT FOR ACCESS MANAGEMENT Thales positioned as a Visionary in the Magic Quadrant and offers some of the most mature B2C capabilities evalu... |
/resources/encryption/gartner-... | | GARTNER® REPORT: 2024 MARKET GUIDE FOR DATA SECURITY PLATFORMS This Market Guide informs security and risk management leaders of the definition, rationale an... |
/resources/software-monetizati... | | How to get SaaS Software Licensing Right the First Time Check out our practical guide to navigating the process of licensing, delivering, and protecting your... |
/resources | | View All Resources |
/contact-us | | Contact Us |
/partners/become-partner | Text duplicate | Become a Partner |
/encryption/amazon-web-service... | | IMG-ALT AWS Logo |
/cloud-security/google-cloud-p... | | IMG-ALT Google Cloud Logo |
/partners/oracle | | IMG-ALT Oracle Logo |
/encryption/microsoft-azure | | IMG-ALT Microsoft Logo |
/partners/partner-search | Text duplicate | Find a Partner |
/events | | No Text |
/events/2024/thales-zoom-and-a... | Subdomain | No Text |
/events/2024/simplifying-digit... | Subdomain | No Text |
/events/2024/fido-deployment-c... | Subdomain | No Text |
/about-us/newsroom/thales-ltts... | | No Text |
/about-us/newsroom/cloud-resou... | | No Text |
/about-us/newsroom | | No Text |
/contact-us | Text duplicate | Contact Us |
https://cpl.thalesgroup.com/ | | IMG-ALT Thales logo - white |
https://www.linkedin.com/compa... | New window External Subdomain | A-TITLE LinkedIn |
https://www.twitter.com/Thales... | New window External Subdomain | A-TITLE Twitter |
https://www.facebook.com/Thale... | New window External Subdomain | A-TITLE Facebook |
https://www.youtube.com/Thales... | New window External Subdomain | A-TITLE YouTube |
https://cpl.thalesgroup.com/blog | | A-TITLE Thales Blog |
/podcasts/data-security-sessions | Text duplicate | A-TITLE Podcasts |
https://www.thalesgroup.com/ | New window External Subdomain | www.thalesgroup.com |
/data-protection | | Data Protection |
https://www.imperva.com/produc... | New window External Subdomain Text duplicate | Application Security |
/access-management | | Access Management & Authentication |
/software-monetization | Text duplicate | Software Monetization |
/solutions | Text duplicate | By Use Case |
/solutions | Text duplicate | By Industry |
/solutions | Text duplicate | By Compliance |
/partners/partner-search | Text duplicate | Find a Partner |
/partners/become-partner | Text duplicate | Become a Partner |
/partners/partner-login | Text duplicate | Partner Portal Login |
/resources | | Resources Library |
https://cpl.thalesgroup.com/blog | Text duplicate | Blog |
/podcasts/data-security-sessions | Text duplicate | Podcasts |
/customer-support | Text duplicate | Customer Support |
/services/training-services | Text duplicate | Training Services |
/contact-us | Text duplicate | Contact Us |
/india-ewaste-program | | India E-Waste Program |
/about-us/newsroom | Text duplicate | Newsroom |
/careers | Text duplicate | Careers |
/newsletter | | SUBSCRIBE |
https://www.thalesgroup.com/en... | New window External Subdomain | Privacy Policy |
https://www.thalesgroup.com/en... | New window External Subdomain | Disclaimer |
/sitemap | | Sitemap |
https://www.thalesgroup.com/en... | New window External Subdomain | Cookie Policy |
https://cpl.thalesgroup.com/legal | | Terms & Conditions |
/about-us/california-consumer-... | | Do Not Sell My Personal Information |
/partners/partner-search | Text duplicate | Partners |
/resources | Text duplicate | Resources |
https://cpl.thalesgroup.com/blog | | Blogs |
/software-monetization/sentine... | | Sentinel Drivers |
(Nice to have)