Thales e-Security + Vormetric have combined to form the leading global data protection and digital trust management company. Together, we enable companies to compete confidently and quickly by securing data at-rest, in-motion, and in-use to effectively deliver secure and compliant solutions with the highest levels of management, speed and trust across physical, virtual, and cloud environments. By deploying our leading solutions and services, targeted attacks are thwarted and sensitive data risk exposure is reduced with the least business disruption and at the lowest life cycle cost. Thales e-Security and Vormetric are part of Thales Group.


GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- June 17, 2017

SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: June 17, 2017


Contract # CMAS 3-12-70-2247E Term: through September 30, 2017

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Florida - Palm Beach County

Through April 30, 2019

Ohio State Contract- 534354

Contract # 534354 Term: June 17, 2017

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)


Contract Number: UVA1482501 Contract Term: May 2, 2014– June 17, 2017



Latest News

Vormetric, a Thales company, and a leader in enterprise data protection for physical, virtual, big data, and cloud environments, today announced that it has joined the FireEye Cyber Security Coalition ...


The past few years have subjected the U.S. economy to a seemingly endless chain of well-publicized data breaches that have left few Americans confident that U.S. organizations are doing enough to ensure the safety of their digitally stored personal information.

When used with an Operational Intelligence platform such as Splunk, the Vormetric Data Security Platform not only encrypts and controls access to your files and databases, but also provides information that is utilized by Splunk. Whether the deployment is physical or virtual, the Vorm...

The amount of data generated by enterprises is expected to increase by a factor of 50 over the next decade according to IDC1, and as a result enterprises face the growing challenge of protecting and controlling access to larger volumes of sensitive data. Securing the growing amount of sensitive da...

The tactics of cyber attackers continue to evolve, and so too must the defenses of government agencies. The Department of Homeland Security (DHS) created the Continuous Diagnostics and Mitigation (CDM) program to help government agencies establish dynamic safeguards against evolving threats. This ...

Enterprises have gradually deployed point encryption solutions to meet various compliance mandates and internal data governance requirements. The resulting conglomeration of disparate vendor platforms deployed across the enterprise poses a management and operational headache with each encryption...

As technology has evolved into today’s enterprise, the array of devices, applications and infrastructure have exploded, each providing a specialized type of data, protection or service. Distributed systems handle transactions; security/monitoring infrastructure monitors for breaches...

Since the introduction of multi-user computer systems over 40 years ago, there has been a fundamental flaw in their security architecture. The flaw? - The concept of a Root User, Domain Administrator, System Administrator or other high level computer operator – and their data access rights. The...

Vormetric Data Security Manager (DSM) appliances offer exceptional performance, allowing organizations to consolidate policy and key management while avoiding performance constraints. Vormetric DSM appliances can manage distributed deployments to thousands of servers with ease.

Data security threats and related incidents, such as breaches, can be harmful to any organization. Private and confidential information is sought after for profit, business advantage, malicious use, and both industrial and government espionage. Data breaches can negatively impact organizations in ...

On Monday July 8th, 2012 US National Security Agency (NSA) Chief Keith Alexander described the state of cyber security in the US while speaking to the American Enterprise Institute event in Washington, D.C. Referencing public and classified sources, Mr. Alexander stated that “…for every com...