Logo
CYBER DEFENCE FOR THE COMMAND POST
As part of our campaign on “The Command Post in High Intensity Conflict”, five (5) pillars have been identified as critical for the command post of the future.
Discover how our cybersecurity solutions can protect military networks, data and communications with a suite of highly secure, multi-sovereign solutions. We also provide deep threat detection for all equipment and systems deployed by operational teams and command posts, a clear vision of the cyber threat, quick remediation measures that take infrastructure needs and decision-making continuity into account, and improved response times in the event of a cyberattack
Learn more about our solutions and products by downloading the brochure below.
Data Protection
In any case, you have the right to access your personal data and to request that your personal data be rectified or deleted. 
You are also entitled to object to the processing of your personal data or to request restriction thereof. 
In addition, you have the right to ask for receiving your personal data that you provided to THALES and which THALES processes by automated means, in a structured and standard format.
In case of any such request or complaint, or should you want to reach our Data Protection Officer please use our Data Privacy contact form.
 
                        
 
thalesgroup.com

           


 
 

PRIVACY NOTICE  |  DATA PRIVACY