Thales e-Security + Vormetric have combined to form the leading global data protection and digital trust management company. Together, we enable companies to compete confidently and quickly by securing data at-rest, in-motion, and in-use to effectively deliver secure and compliant solutions with the highest levels of management, speed and trust across physical, virtual, and cloud environments. By deploying our leading solutions and services, targeted attacks are thwarted and sensitive data risk exposure is reduced with the least business disruption and at the lowest life cycle cost. Thales e-Security and Vormetric are part of Thales Group.


GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Florida - Palm Beach County

Through April 30, 2019

Orange County National IPA Co-Op

Through May 31, 2019 (with 2 option years)


Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021



Latest News

Vormetric, a Thales company, and a leader in enterprise data protection for physical, virtual, big data, and cloud environments, today announced that it has joined the FireEye Cyber Security Coalition ...


SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC


Encrypting sensitive data in databases, for applications, file repositories and other enterprise systems is a sound and often required business practice for regulatory compliance, data breach disclosure protection, intellectual property protection and insider threat management. However, when emb...

Vormetric Data Security Manager (DSM) appliances offer exceptional performance, allowing organizations to consolidate policy and key management while avoiding performance constraints. Vormetric DSM appliances can manage distributed deployments to thousands of servers with ease.

Enterprises have gradually deployed point encryption solutions to meet various compliance mandates and internal data governance requirements. The resulting conglomeration of disparate vendor platforms deployed across the enterprise poses a management and operational headache with each encryption...

Identifying complex security and compliance threats that puts your data at risk


This twelfth installment of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Thales e-Security, reveals both deployment plans and pains associated with increasingly aggressive cloud and data protection strategies.

Federal governments around the world are racing to boost data security against odds not generally faced in the private sector today. Download to learn more about trends in Encryption and Data Security.

When used with an Operational Intelligence platform such as Splunk, the Vormetric Data Security Platform not only encrypts and controls access to your files and databases, but also provides information that is utilized by Splunk. Whether the deployment is physical or virtual, the Vorm...

On Monday July 8th, 2012 US National Security Agency (NSA) Chief Keith Alexander described the state of cyber security in the US while speaking to the American Enterprise Institute event in Washington, D.C. Referencing public and classified sources, Mr. Alexander stated that “…for every com...

Since the introduction of multi-user computer systems over 40 years ago, there has been a fundamental flaw in their security architecture. The flaw? - The concept of a Root User, Domain Administrator, System Administrator or other high level computer operator – and their data access rights. The...

Solutions Brief

Increasing use of web applications and cloud-based services is driving growth in numbers of secure sockets layer (SSL) connections. Web traffic, including user lDs, login passwords and sensitive account numbers is commonly encrypted and transported using SSL.