Thales e-Security + Vormetric have combined to form the leading global data protection and digital trust management company. Together, we enable companies to compete confidently and quickly by securing data at-rest, in-motion, and in-use to effectively deliver secure and compliant solutions with the highest levels of management, speed and trust across physical, virtual, and cloud environments. By deploying our leading solutions and services, targeted attacks are thwarted and sensitive data risk exposure is reduced with the least business disruption and at the lowest life cycle cost. Thales e-Security and Vormetric are part of Thales Group.


GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Florida - Palm Beach County

Through April 30, 2019

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)


Contract Number: UVA1482501 Contract Term: May 2, 2014– December 19, 2021


Archived Events


Latest News

Vormetric, a Thales company, and a leader in enterprise data protection for physical, virtual, big data, and cloud environments, today announced that it has joined the FireEye Cyber Security Coalition ...


When used with an Operational Intelligence platform such as Splunk, the Vormetric Data Security Platform not only encrypts and controls access to your files and databases, but also provides information that is utilized by Splunk. Whether the deployment is physical or virtual, the Vorm...

The amount of data generated by enterprises is expected to increase by a factor of 50 over the next decade according to IDC1, and as a result enterprises face the growing challenge of protecting and controlling access to larger volumes of sensitive data. Securing the growing amount of sensitive da...

This twelfth installment of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Thales e-Security, reveals both deployment plans and pains associated with increasingly aggressive cloud and data protection strategies.

Vormetric Application Encryption is typically employed when compliance or regulatory mandates require encryption of specific data or database fields at the application, before data is stored. Vormetric Application Encryption reduces the complexity and costs associated with meeting this requirement, ...

The tactics of cyber attackers continue to evolve, and so too must the defenses of government agencies. The Department of Homeland Security (DHS) created the Continuous Diagnostics and Mitigation (CDM) program to help government agencies establish dynamic safeguards against evolving threats. This ...

Enterprises have gradually deployed point encryption solutions to meet various compliance mandates and internal data governance requirements. The resulting conglomeration of disparate vendor platforms deployed across the enterprise poses a management and operational headache with each encryption...

Federal governments around the world are racing to boost data security against odds not generally faced in the private sector today. Download to learn more about trends in Encryption and Data Security.

As technology has evolved into today’s enterprise, the array of devices, applications and infrastructure have exploded, each providing a specialized type of data, protection or service. Distributed systems handle transactions; security/monitoring infrastructure monitors for breaches...

Since the introduction of multi-user computer systems over 40 years ago, there has been a fundamental flaw in their security architecture. The flaw? - The concept of a Root User, Domain Administrator, System Administrator or other high level computer operator – and their data access rights. The...

Vormetric Data Security Manager (DSM) appliances offer exceptional performance, allowing organizations to consolidate policy and key management while avoiding performance constraints. Vormetric DSM appliances can manage distributed deployments to thousands of servers with ease.