Secure, Efficient Key Lifecycle Management

Unify on-premises key management and take efficient control of your data in the cloud

Key Management

Thales eSecurity on-premises key management solutions unify and centralize key management and provide secure key storage for data storage solutions. Cloud Key Management products include the CipherTrust Cloud Key Manager for centralized multi-cloud key life cycle visibility and management with FIPS-140-2 secure key storage, and Cloud Bring Your Own key based on secure nShield Hardware Security Modules.

Unified Key Management

The Vormetric Data Security Manager unifies key management for Vormetric Data Security Platform products, KMIP Clients, and Oracle and Microsoft SQL databases using TDE. Learn more.

CipherTrust Cloud Key Manager

Enjoy key life cycle management for a growing list of IaaS/PaaS and SaaS providers either as a service or on premises. CipherTrust Cloud Key Manager delivers key generation, separation of duties, reporting, and key lifecycle management that help fulfill internal and industry data protection mandates. Visit the product page.

Cloud Bring Your Own Key

Use a high assurance HSM to bring your own key to the cloud for security and compliance. Read more.

Azure, AWS and GCP BYOK

Take control of public cloud BYOK encryption services with on-premises, high assurance HSM key management.

TDE Key Management

Manage and securely store encryption keys for Transparent Data Encryption (TDE) from Oracle and Microsoft.

Native Encryption Key Management

Administer keys from Key Management Interoperability Protocol (KMIP) compliant encryption solutions from Cisco, Nutanix, MongoDB, and others

IaaS, PaaS and SaaS Cloud Key Management

Take control and manage encryption keys with interoperability with Microsoft Azure Key Vault, Microsoft Office 365, Salesforce Shield Platform Encryption, and Amazon Web Services Key Management Services.

Solution Brief : CipherTrust Cloud Key Manager

CipherTrust Cloud Key Manager reduces key management complexity and operational costs by giving customers lifecycle control of encryption keys with centralized management and visibility. Read the solution brief for an overview of its features, capabilities and benefits.

Download

White Paper : Vormetric Key Management

The Vormetric Key Management white paper provides an overview of the challenges enterprises face in managing encryption keys and explains how Vormetric Key Management resolves those challenges.

Download

White Paper : Cracking the Confusion: Encryption and Tokenization for Data Centers, Servers and Applications by Securosis

By Securosis analysts and industry experts, Rich Mogull, CEO and Adrian Lane, CTO. This paper cuts through the confusion to help you pick the best encryption and tokenization options for your projects. The focus is on encrypting in the data center: applications, servers, databases, and storage. It also covers cloud computing (IaaS: Infrastructure as a Service).

Download

White Paper : Hardware Key Management in the Azure Cloud

This document presents the features and general theory of Thales nShield HSMs and how they are used to secure customers’ keys as part of Microsoft Azure Key Vault. The paper further presents the methods that Microsoft chose in using Thales HSMs, and make connections between product features, the Azure Key Vault application, and the security model that results. Our goal is to inform the reader on the technology and methods deployed by Microsoft to protect Azure users’ data in the cloud.

Download

Solution Brief : Key Management

Vormetric Key Management from Thales e-Security provides a robust, standards-based platform for managing encryption keys from disparate sources across the enterprise. Read the solution brief!

Download

Research and Whitepapers : Vormetric NIST800-53 Mapping

The security controls specified in NIST800-53 Appendix F are critical to meeting FIPS 200 certification. This paper provides background on the ways in which the Vormetric Data Security Platform and the Vormetric Transparent Encryption product that is delivered through that platform help customers meet these requirements.

Download

Watch our interactive demo Explore
Schedule a live demo Schedule
Get in contact with a specialist Contact us