Default banner

Centralized, Secure Key Management

Streamline and strengthen encryption key management on-premises or in the cloud.

Key Management

Thales eSecurity Key Management Solutions Solution Brief

Thales eSecurity key management software streamlines and strengthens key management in cloud and enterprise environments, over a diverse set of applications. Based on FIPS 140-2-certified virtual or hardware appliances, Thales key management solutions deliver high security to sensitive environments. Thales solutions also centrally organize keys to simplify operations while empowering you with strong control over your keys.

Download Solution Brief

 

Thales key management solutions include the following:

  • CipherTrust Cloud Key Manager

    CipherTrust Cloud Key Manager centralizes key lifecycle management in multi-cloud, hybrid and enterprise environments.

  • Enterprise Key Management

    As a part of the Vormetric Data Security Platform, Vormetric Key Management solutions manage and protect keys on behalf of a variety of applications including database TDE, KMIP clients as well as all Vormetric Data Security Platform solutions. The Vormetric Data Security Manager (DSM) is the central management point for Vormetric Key Management solutions as well as all other Vormetric Data Security Platform products.

 

View Our Key Management Solutions

CIPHERTRUST CLOUD KEY MANAGER

Minimizing complexity and risk of key management for your cloud services' encryption

Learn More

 

Enterprise Key Management

Centralizes management of keys for Vormetric Data Security Platform products, Microsoft SQL and Oracle TDE, and KMIP-compliant encryption solutions, and more

Learn More

 

 

Logo-img

Thales eSecurity is our standard. Whenever an encryption solution is needed, the answer is always, ‘let’s start with Thales eSecurity.

Damian McDonald

Vice President of Global Information Security, Becton, Dickinson and Company
 

 

Delta logo

My concern with encryption was the overhead on user and application performance. With Thales eSecurity, people have no idea it’s even running.

Karl Mudra

Delta Dental of Missouri

  • Benefits
  • Use Cases
  • Related Resources

High Security for Sensitive Data

Thales enterprise key management software products are based on FIPS 140-2-certified virtual or hardware appliances to deliver high security to sensitive environments. The Vormetric Data Security Manager (DSM), which is the foundation for CipherTrust Cloud Key Manager and Vormetric Key Management, is offered as a virtual appliance with FIPS 140-2 Level 1 certification, and as hardware appliance models certified to Levels 2 and 3.

Simplify and Reduce Costs

Thales key management software solutions centralize key management for a wide variety of encryption environments, providing a single pane of glass for simplicity and cost savings—including avoiding multiple vendor sourcing. This unification gives you greater command over your keys while increasing your data security through stronger organization of your keys.

Increase Control over Keys

Whether through strict enforcement of your key policies or fine-grained access control or generating keys using your own key source and exporting them to your cloud and enterprise applications, Thales enterprise key management products put you in command of your encryption keys.

IaaS, PaaS and SaaS Cloud Key Management

Take control and manage encryption keys with interoperability among Microsoft Azure Key Vault, Microsoft Office 365, Salesforce Shield Platform Encryption, and Amazon Web Services Key Management Services.

TDE Key Management

Manage and securely store encryption keys for Transparent Data Encryption (TDE) from Oracle, Microsoft and IBM.

Key Management for KMIP clients

Administer keys from Key Management Interoperability Protocol (KMIP) compliant encryption solutions from Cisco, Nutanix, MongoDB and others.

enterprise key management

Solution Brief : Key Management

Thales eSecurity key management solutions help organizations streamline and increase the security of key management operations by centrally managing keys in FIPS-certified security applications and hardware and maintaining them separate from the data they protect. Our solution brief provides an overview of our solutions and the various use cases they serve.

Download

 

key management

White Paper : Enterprise Key Management

Vormetric Key Management from Thales provides a robust, standards-based platform for managing encryption keys from disparate sources across the enterprise. Read our white paper to gain a deeper view of how Vormetric Key Management helps enterprises to improve operational efficiency, reduce management burdens with centralized key management and cut costs by using a unified solution.

Download

 

CipherTrust Cloud Key Manager

Product Brief : CipherTrust Cloud Key Manager

CipherTrust Cloud Key Manager reduces key management complexity and operational costs by giving customers lifecycle control of encryption keys with centralized management and visibility. Read the solution brief for an overview of its features, capabilities and benefits.

Download

 

 

CipherTrust Cloud Key Manager

Solution Brief : TDE Key Management

Microsoft SQL Server and Oracle Database solutions provide native transparent database encryption (TDE) that protects the data stored in their customers’ databases. Managing the TDE keys presents challenges such as isolating them from the assets they protect and storing them securely. Thales key management solutions centralize key management for Microsoft SQL Server and Oracle Database, providing greater command over the keys while increasing data security.

Download

 

whitepaper

White Paper : Maximizing the Advantages of the KMIP Standard in Your Organization

Today, the encryption of sensitive data is a fundamental requirement in virtually every business. At the same time, organizations continue to struggle with managing a proliferation of encryption keys. The Key Management Interoperability Protocol (KMIP) was developed to enable unified, efficient management of keys from multiple encryption technologies and vendors. This paper offers a look at the KMIP standard and how Thales eSecurity solutions help you maximize the advantages of this standard.

Download