• slide
  • slide


SafeNet Assured Technologies, LLC. and Thales Cloud Protection & Licensing, Federal are now united under a new name as Thales Trusted Cyber Technologies (TCT), a division of Thales Defense and Security Inc. Thales TCT is a U.S. based provider of government high-assurance data security solutions. Our mission is to provide innovative solutions to protect the most vital data from the core to the cloud to the field for defense, intelligence, and civilian agencies across the U.S. Federal Government. With a concentration on Federal and other U.S. government agency requirements, we are better able to serve our government customers while also investing in the development of future technologies to secure the Federal Government’s most sensitive information.

We offer best-of-breed solutions to our U.S. Federal customers. From our core solutions developed specifically for the government to Thales Cloud Protection & Licensing commercial-off-the-shelf solutions we sell and support, our offerings address the most stringent federal requirements. Our extensive data security experience allows us to provide one of the most broad data protection portfolios specifically focused on U.S. Federal agency requirements for protecting mission critical data in data centers, cloud environments, and field deployments. Our product portfolio includes:

  • Cryptographic Key Management solutions that protect and manage cryptographic keys throughout their lifecycle
  • Data Encryption solutions that encrypt data-at-rest and in-motion from the core to the edge
  • Authentication solutions that secure access to sensitive data and networks


GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Florida - Palm Beach County

Through April 30, 2019

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)


Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021



Latest News

Vormetric, a Thales company, and a leader in enterprise data protection for physical, virtual, big data, and cloud environments, today announced that it has joined the FireEye Cyber Security Coalition ...



As security breaches continue to happen with alarming regularity and data protection compliance mandates get more stringent, your organization needs to extend data protection across more environments, systems, applications, processes and users. With the Vormetric Data Security Platform from Tha...

Luna Network Hardware Security Module (HSM) from Thales Trusted Cyber Technologies (TCT) is the choice for government agencies when generating, storing, protecting and managing cryptographic keys used to secure sensitive data and critical applications. Download this datasheet to learn more!

Product Brief

Delivering Data-in-Motion Security without Compromise. Download this solution brief to learn more!


When used with an Operational Intelligence platform such as Splunk, the Vormetric Data Security Platform not only encrypts and controls access to your files and databases, but also provides information that is utilized by Splunk. Whether the deployment is physical or virtual, the Vorm...


Many infrastructure-, platform-, and software-as-a-service providers offer data-at-rest encryption capabilities with encryption keys managed by the service provider. Meanwhile, many industry or internal data protection mandates, as well as industry best practices as defined by the Cloud Security...

For IT and security teams today, adaptation is a key part of the job. Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms, virtualized systems, and more. The policies and regulatory mandates continue to grow more stringent. At ...

Protecting a world powered by the cloud, data and software.

The truth is that for most enterprises today, data is the life of their business, and their most important and valuable asset. Data breaches can have devastating consequences. From loss of customer confidence and damaged reputation, to significant remediation and liability costs, compromised dat...

As demands on enterprise data centers continue to increase with more digital initiatives being pursued by businesses, hyper-converged infrastructure (HCI) has emerged as a simple, cost-effective solution. However, as these amass large volumes of data across distributed resources, security compl...

With advanced persistent threats (APTs), now common—hackers are actively seeking to steal credit card data, personally identifiable information (PII), critical intellectual property (IP), and other legally protected information to sell to the highest bidder. Some of the most effective tools fo...