Encrypt Everything, Everywhere

One data security solution for securing sensitive data across servers spanning your data centers, clouds, big data and container environments

Operational Simplicity

Centralized policy and encryption key management to assure control of your data across every physical and virtual server on and off your premises.

Minimize Risk

Meet compliance and best practice requirements for protecting data from external threats or malicious insiders with proven, high-performance and scalable data encryption.

Security Agility

Quickly address new data security requirements and compliance mandates by having an encryption solution in place ready and able to encrypt everything.

THALES Data Encryption Products

Vormetric Data Security Platform

The Vormetric Data Security Platform makes it easy and efficient to manage data-at-rest security across your entire organization. 

Vormetric Data Security Manager

The Vormetric Data Security Manager (DSM) is the central management point for all Vormetric Data Security Platform products. The DSM not only creates, stores and manages the encryption keys that protect data.

Vormetric Transparent Encryption

Vormetric Transparent Encryption enterprise encryption software delivers data-at-rest encryption with centralized key management, privileged user access control and detailed data access audit logging.

Live Data Transformation Extension

A database protected with Vormetric Transparent Encryption and Live Data Transformation enables non-disruptive initial encryption and simplified, more-compliant encryption key rotations.

Vormetric Container Security

Extends Vormetric Transparent Encryption controls for data encryption, access control and data access audit logging to data within or linked to containers
 

Security Intelligence Logs

Detailed data access audit logs delivered by Vormetric Transparent Encryption are useful not only for compliance, but also for the identification of unauthorized access attempts, as well as to build baselines of authorized user access patterns. 

Vormetric Transparent Encryption for SAP HANA

Vormetric Transparent Encryption provides a proven approach to safeguarding SAP HANA data that meets rigorous security, data governance and compliance requirements.

Vormetric Application Encryption

Vormetric Application Encryption delivers key management, signing, and encryption services enabling comprehensive protection of files, database fields, big data selections, or data in platform-as-a-service (PaaS) environments.

Vormetric Protection for Teradata Database

Teradata leverages all of the data, all of the time, so you can analyze anything, deploy anywhere, and deliver analytics that matter. But the aggregation of data can also present risks.

Vormetric Orchestrator

The Vormetric Orchestrator automates Vormetric Data Security Platform product deployment, configuration, management, and monitoring.

Vormetric Application Crypto Suite

At the core of the Vormetric Application Crypto Suite from Thales is a set of products that streamline development efforts to add encryption, tokenization, masking and other cryptographic functions to applications. The job of the developer is made easy and fast by leveraging sample code and APIs that are best for their environment, while key management functions are kept separate and secure in a FIPS 140-2 hardware or virtual appliance that is operated by IT or SecOps. Securing data at the application, with separation of duties for key management, provides the highest levels of protection and compliance.

The Vormetric Application Crypto Suite also includes applications and utilities that leverage the core components to add security layers to databases and other structured data stores.

Gemalto is now part of the Thales Group

Gemalto Hardware Security Modules (HSMs)

What is a Hardware Security Module?

A hardware security module (HSM) is a dedicated crypto processor that is specifically designed for the protection of the crypto key lifecycle. Hardware security modules act as trust anchors that protect the cryptographic infrastructure of some of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys inside a hardened, tamper-resistant device

Why Use Hardware Security Modules?

Enterprises buy hardware security modules to protect transactions, identities, and applications, as HSMs excel at securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services for a wide range of applications.

 
Why Use Hardware Security Modules?

Enterprises buy hardware security modules to protect transactions, identities, and applications, as HSMs excel at securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services for a wide range of applications.

 
What Makes Gemalto the Best HSM Vendor?

SafeNet Hardware Security Modules provide the highest level of security by always storing cryptographic keys in hardware. SafeNet HSMs provide a secure crypto foundation as the keys never leave the intrusion-resistant, tamper-evident, FIPS-validated appliance. Since all cryptographic operations occur within the HSM, strong access controls prevent unauthorized users from accessing sensitive cryptographic material. Additionally, Gemalto also implements operations that make the deployment of secure HSMs as easy as possible, and our HSMs are integrated with SafeNet Crypto Command Center for quick and easy crypto resource partitioning, reporting and monitoring.

SafeNet HSMs adhere to rigorous design requirements and must pass through stringent product verification testing, followed by real-world application testing to verify the security and integrity of every device.

SafeNet HSMs are cloud agnostic, and are the HSM of choice for Microsoft, AWS and IBM, providing a “rentable” hardware security module (HSM) service that dedicates a single-tenant appliance located in the cloud for customer cryptographic storage and processing needs.