Secure, Efficient Key Lifecycle Management

Unify on-premises key management and take efficient control of your data in the cloud

Key Management

Thales eSecurity on-premises key management solutions unify and centralize encryption key management and provide secure key storage for data storage solutions. Cloud Key Management products include the CipherTrust Cloud Key Manager for centralized multi-cloud key life cycle visibility and management with FIPS-140-2 secure key storage, and Cloud Bring Your Own Key based on secure nShield Hardware Security Modules.

Unified Key Management

The Vormetric Data Security Manager unifies key management for Vormetric Data Security Platform products, KMIP Clients, and Oracle and Microsoft SQL databases using TDE. Learn more.

CipherTrust Cloud Key Manager

Enjoy key life cycle management for a growing list of IaaS/PaaS and SaaS providers either as a service or on premises. CipherTrust Cloud Key Manager delivers key generation, separation of duties, reporting, and key lifecycle management that help fulfill internal and industry data protection mandates. Visit the product page.

Cloud Bring Your Own Key

Use a high assurance HSM to bring your own key to the cloud for security and compliance with one of Thales' cloud key management solutions. Read more.

Azure, AWS and GCP BYOK

Take control of public cloud BYOK encryption services with on-premises, high assurance HSM key management software.

TDE Key Management

Manage and securely store encryption keys for Transparent Data Encryption (TDE) from Oracle and Microsoft.

Native Encryption Key Management

Administer keys from Key Management Interoperability Protocol (KMIP) compliant encryption solutions from Cisco, Nutanix, MongoDB, and others

IaaS, PaaS and SaaS Cloud Key Management

Take control and manage encryption keys with interoperability with Microsoft Azure Key Vault, Microsoft Office 365, Salesforce Shield Platform Encryption, and Amazon Web Services Key Management Services.

Solution Brief : Key Management

Thales eSecurity key management solutions help organizations streamline and increase the security of key management operations by centrally managing keys in FIPS-certified security applications and hardware and maintaining them separate from the data they protect. Our solution brief provides an overview of our solutions and the various use cases they serve.


Solution Brief : CipherTrust Cloud Key Manager

CipherTrust Cloud Key Manager reduces key management complexity and operational costs by giving customers lifecycle control of encryption keys with centralized management and visibility. Read the solution brief for an overview of its features, capabilities and benefits.


Solution Brief : TDE Key Management

Microsoft SQL Server and Oracle Database solutions provide native transparent database encryption (TDE) that protects the data stored in their customers’ databases. Managing the TDE keys presents challenges such as isolating them from the assets they protect and storing them securely. Thales key management solutions centralize key management for Microsoft SQL Server and Oracle Database, providing greater command over the keys while increasing data security.


White Paper : Maximizing the Advantages of the KMIP Standard in Your Organization

Today, the encryption of sensitive data is a fundamental requirement in virtually every business. At the same time, organizations continue to struggle with managing a proliferation of encryption keys. The Key Management Interoperability Protocol (KMIP) was developed to enable unified, efficient management of keys from multiple encryption technologies and vendors. This paper offers a look at the KMIP standard and how Thales eSecurity solutions help you maximize the advantages of this standard.


White Paper : Hardware Key Management in the Azure Cloud

This document presents the features and general theory of Thales nShield HSMs and how they are used to secure customers’ keys as part of Microsoft Azure Key Vault. The paper further presents the methods that Microsoft chose in using Thales HSMs, and make connections between product features, the Azure Key Vault application, and the security model that results. Our goal is to inform the reader on the technology and methods deployed by Microsoft to protect Azure users’ data in the cloud.

Watch our interactive demo Explore
Schedule a live demo Schedule
Get in contact with a specialist Contact us