Data Protection

Hardware Security Module

A hardware security module (HSM) is a dedicated crypto processor that is specifically designed for the protection of the crypto key lifecycle. Hardware security modules act as trust anchors that protect the cryptographic infrastructure of some of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys inside a hardened, tamper-resistant device.

Data Protection

SafeNet Network HSM (Luna SA)

SafeNet Network HSM is a network-attached HSM protecting encryption keys used by applications in on-premise, virtual, and cloud environments.

Data Protection

SafeNet PCIe HSM (Luna PCI-E)

An embedded HSM, SafeNet PCIe HSM protects cryptographic keys and accelerates sensitive cryptographic operations.

Data Protection

SafeNet ProtectServer HSM (Network)

Heavy-duty steel appliance with tamper-protected security that safeguards against physical and logical attacks

Data Protection

SafeNet ProtectServer HSM (PCIe)

PCI Express x4-compliant card available in different performance levels to meet varied system requirements

Data Protection

SafeNet USB HSM (Luna G5)

SafeNet USB HSM is an USB-attached HSM that is ideal for storing root cryptographic keys in an offline key storage device.

Data Protection

SafeNet Java HSM (Luna SP)

SafeNet Java HSM allows developers to securely deploy Web applications, Web services and other Java applications in a protected hardened security appliance.

Data Protection

SafeNet Payment HSM (Luna EFT)

SafeNet Payment HSM is a network-attached hardware security module (HSM) designed for retail payment system processing environments for credit, debit, e-purse and chip cards, as well as internet payment applications.

SafeNet KeySecure

With SafeNet KeySecure, organizations can centrally, efficiently, and securely manage cryptographic keys and policies—across the key management lifecycle and throughout the enterprise—in the cloud or on-premises.

Data Protection

SafeNet KeySecure: Centralized Cryptographic Key Management

SafeNet KeySecure from Gemalto is the industry’s leading centralized key management platform, and is available as a hardware appliance or hardened virtual security appliance. By utilizing SafeNet KeySecure, organizations benefit from its flexible options for secure and centralized key management – deployed in physical, virtualized infrastructure, and public cloud environments.

Data Protection

Virtual KeySecure: A Virtual Security Appliance for Encryption Keys

SafeNet Virtual KeySecure centralizes cryptographic processing, security policy and key management – all in a FIPS-validated hardened virtual security appliance. It’s an operation and expense-friendly alternative providing scalable key management and secure encryption at remote facilities or cloud infrastructures such as VMware or AWS Marketplace.

Data-at-Rest Encryption

Whether storing data at rest in your physical data center, a private or public cloud, or in a third-party storage application, proper encryption and key management are critical factors in ensuring sensitive data is protected and your organization maintains compliance.

Data Protection

SafeNet ProtectApp: Application Protection Solutions

SafeNet ProtectApp provides an interface for key management operations, as well as application-level encryption of sensitive data. Once deployed, data is kept secure across its entire lifecycle, no matter where it is transferred, backed up, or copied.

Data Protection

SafeNet ProtectDB: Column-Level Database Encryption and Protection

SafeNet ProtectDB provides transparent column-level encryption of structured, sensitive data residing in databases. Customers use our database encryption solution to protect credit card numbers, social security numbers, national ID numbers, passwords, account numbers and balances, email addresses, and more.

Data Protection

Secure Sensitive Data with Application-level Tokenization Solutions

SafeNet Tokenization from Gemalto protects sensitive information by replacing it with a surrogate value that preserves the length and format of the data. The solution tokenizes numeric and alphanumeric data and returns tokens in an unlimited number of formats.

Data Protection

SafeNet ProtectFile: Enterprise File Encryption

SafeNet ProtectFile provides transparent and automated file-system level encryption of sensitive data in the distributed enterprise, including Direct Attached Storage (DAS), Storage Area Network (SAN), and Network Attached Storage (NAS) servers using CIFS/NFS file sharing protocols.

⇓ MOBILE SECTION ⇓

Hardware Security Module

Data Protection

A hardware security module (HSM) is a dedicated crypto processor that is specifically designed for the protection of the crypto key lifecycle. Hardware security modules act as trust anchors that protect the cryptographic infrastructure of some of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys inside a hardened, tamper-resistant device.

SafeNet KeySecure

Data Protection

With SafeNet KeySecure, organizations can centrally, efficiently, and securely manage cryptographic keys and policies—across the key management lifecycle and throughout the enterprise—in the cloud or on-premises.

  • SafeNet KeySecure from Gemalto is the industry’s leading centralized key management platform, and is available as a hardware appliance or hardened virtual security appliance. By utilizing SafeNet KeySecure, organizations benefit from its flexible options for secure and centralized key management – deployed in physical, virtualized infrastructure, and public cloud environments.

    Learn More.

  • SafeNet Virtual KeySecure centralizes cryptographic processing, security policy and key management – all in a FIPS-validated hardened virtual security appliance. It’s an operation and expense-friendly alternative providing scalable key management and secure encryption at remote facilities or cloud infrastructures such as VMware or AWS Marketplace.

    Learn More.

Data-at-Rest Encryption

Data Protection

Whether storing data at rest in your physical data center, a private or public cloud, or in a third-party storage application, proper encryption and key management are critical factors in ensuring sensitive data is protected and your organization maintains compliance.