Thales —
a global leader
in cybersecurity

We povide reliable protection for data
and access in the digital world.



book a demo

clients
35000
partners
6700
+
experts
41000

Data is moving to the cloud — risks are increasing

The average enterprise
manages 80 SaaS services.



Explore the solution

of corporate data is already in the cloud
60
%
of companies plan to migrate
48
%
of applications are in SaaS
>
50
%

New threats →
new challenges



book a demo

of cybersecurity professionals admit that compliance in the cloud is more difficult
55
%
of data breaches are related to misconfigured APIs
61
%
of people know exactly where all their data is stored
>
24
%

Complete portfolio of “Data-Identity-Application” protection

Thales covers the entire chain: encryption, HSM, tokenization, IAM, WAF, DDoS & bot protection. One ecosystem — unified control, visibility, and compliance with data protection laws.



book a demo


Thales —
a global leader
in cybersecurity

We povide reliable protection for data
and access in the digital world.



book a demo

clients
35000
partners
6700
+
experts
41000

Data is moving to the cloud — risks are increasing

The average enterprise
manages 80 SaaS services.



Explore the solution

of corporate data is already in the cloud
60
%
of companies plan to migrate
48
%
of applications are in SaaS
>
50
%

New threats →
new challenges



book a demo

of cybersecurity professionals admit that compliance in the cloud is more difficult
55
%
of data breaches are related to misconfigured APIs
61
%
of people know exactly where all their data is stored
>
24
%

Complete portfolio of “Data-Identity-Application” protection

Thales covers the entire chain: encryption, HSM, tokenization, IAM, WAF, DDoS & bot protection. One ecosystem — unified control, visibility, and compliance with data protection laws.



book a demo

Stay informed about news, events, training and insights

Алматы

Thales File Activity Monitoring: Bringing Visibility to Blind Spots in Data Security

Did you know that over 60% of critical business data is stored in unstructured files — often beyond the reach of traditional access controls?



Read More

Онлайн

Как защитить персональные данные и соответствовать СТ РК 1073–2007?

Где хранить данные? Могут ли данные быть украдены и выложены в публичный доступ? Как исключить утечку данных?



Read More

Алматы

Бизнес-встреча “Шифрование без компромиссов” для партнеров в Алматы

Основной темой для общения стала защита персональных данных и требования законодательства Республики Казахстан.



Read More

Thales solutions for IT infrastructure cyber security

Imperva Application Security:

your application protection

Comprehensive protection for web applications and APIs on-premises and in the cloud.

Ddos Protection

Maximizing application network availability through rapid response to network and L7 DDoS attacks.

Web Application Firewall

Brandmauer for web applications (WAF) — protecting applications with minimal false positives.

Client-Side protection

Preventing data theft during client-side attacks: formjacking, digital skimming, and Magecart.

Bot Protection

Protecting websites, mobile applications, and APIs from automated attacks.

API Security

Protection of APIs and
data in any
environment.

Runtime Protection

Continuous Zero Trust
protection for
applications.

Managed DNS

Uninterrupted DNS resolution by filtering malicious traffic and responding only to legitimate requests.

Secure CDN

Maximizing network and application availability through rapid response to network and L7 DDoS attacks.

Account takeover

Preventing automatic account takeover by fraudsters.

Key benefits:

End-to-end data security — from encryption to key management

Thales solutions enable you to discover, encrypt and control access to all sensitive data in accordance with legal requirements and standards (ZPD RK, PCI DSS, ISO 27001).




Application Data Protection

File-level Encryption and Access Control

Database Protection

Tokenization

Enterprise Key Managment

Multi Cloud Key managment

Discovery and Classification

Secrets Managment

Benefits

Data Activity

Data Access Control

Data Risk Managment

Discover & Classification

Sensitive Data Managmeny

Compliance Managmeny​

Luna HSM​

Luna Cloud HSM

payShield

Application Data Protection

File-level Encryption and Access Control

Database Protection

Tokenization

Enterprise Key Managment

Multi Cloud Key managment

Discovery and Classification

Secrets Managment

Benefits

Data Activity

Data Access Control

Data Risk Managment

Discover & Classification

Sensitive Data Managmeny

Compliance Managmeny​

Luna HSM​

Luna Cloud HSM

payShield

CipherTrust Platform

Detects, classifies and protects data in the cloud, on-premises and hybrid environments. All in one console.

Подробнее…

Data Security Fabric​

Integrate security into everything: cloud applications, databases, file storage and SaaS. Single point of control.

Подробнее…

Luna HSM – Hardware Security Modules

Ensures reliable generation, storage and use of cryptographic keys. Certified in Kazakhstan and according to FIPS 140-3.

Подробнее…

Identity and access management: security for your business

Single sign-on to corporate systems, multi-factor authentication, and complete elimination of password chaos.

Benefits

CLICO Team

The official distributor of Thales solutions.

We are happy to answer all your questions


Almas Abish

CEO,

Clico Central Asia



almas.abish@clico.kz


Andrey Panchenko

Business Development Director

Clico Central Asia



andrey.panchenko@clico.kz


Ivan Zavertayev

Pre-Sales Engineer,

Clico Central Asia



ivan.zavertyaev@clico.kz

Book a consultation and test

We will analyse your tasks and offer the best solutions for your business.



Request a consultation



Sign up for a trial

Thales solutions comply with the Republic of Kazakhstan Law on Personal Data and are already certified

Thales platforms — CipherTrust and Luna HSM — are included in the Register of Cryptographic Protection Tools of the Republic of Kazakhstan and are recognised as complying with personal data protection requirements. These are not just technologies — they are officially approved solutions that will help you pass audits, avoid fines, and ensure legal compliance when working with personal data.



Sign up for a trial

Certification by the State Cryptographic Protection Agency of the Republic of Kazakhstan and FIPS 140-3.

Ready-made reports for PCI DSS, GDPR, and ZPD RK standards​

Encryption, tokenisation, and data protection without code changes

Centralised key management (including BYOK/HYOK)

Already used in government institutions, banks, and telecom companies in Kazakhstan

Frequently asked questions

Here you will find answers to the most common questions about our solutions and services.


Contact Us

What do Thales solutions protect?


Data, applications, and access in both cloud and on-premises environments — with encryption, MFA, and API protection. Data encryption at rest and in motion. 

Yes, Thales CipherTrust and Luna HSM are certified and included in the National Register of Cryptographic Tools of Kazakhstan, ensuring full compliance with the Personal Data Protection Law. 

Yes, we support integration with cloud, on-premises, and hybrid architectures without the need to rebuild the infrastructure. 

End-to–end protection combined with expertise in regulatory compliance and 24/7 support. 

Yes, from audit and configuration to training and technical assistance at every stage. 

Banking and finance, government institutions, telecom, manufacturing, energy, retail, and critical infrastructure. 

Data, applications, and access in both cloud and on-premises environments — with encryption, MFA, and API protection. Data encryption at rest and in motion. 

Yes, Thales CipherTrust and Luna HSM are certified and included in the National Register of Cryptographic Tools of Kazakhstan, ensuring full compliance with the Personal Data Protection Law. 

Yes, we support integration with cloud, on-premises, and hybrid architectures without the need to rebuild the infrastructure. 

End-to-end protection combined with expertise in regulatory compliance and 24/7 support. 

Yes, from audit and configuration to training and technical assistance at every stage. 

Banking and finance, government institutions, telecom, manufacturing, energy, retail, and critical infrastructure. 


Contact us

Укажите контактные
данные

Мы свяжемся с вами и проконсультируем
по всем вопросам

Укажите контактные
данные

Мы свяжемся с вами и проконсультируем
по всем вопросам

Укажите контактные
данные

Мы свяжемся с вами и подберем удобное время на демонстрацию нашей системы