Rightsizing Cryptographic Key Management for the Edge

The CipherTrust Manager k160 Mk II is a compact cryptographic key management platform that protects and manages cryptographic keys and associated policies used to encrypt the most sensitive data-at-rest. Improving on the original k160, the Mk II is the ideal hardware platform to extend CipherTrust Data Security Platform’s enterprise-grade capabilities the from the core and cloud to the edge. CipherTrust k160’s small form factor allows it to be easily deployed in any environment – from satellite offices to forward operating bases to mobile flyaway kits – while still providing the best-in-class security features customers are accustomed to finding in the CipherTrust product family.

CipherTrust k160 Mk II extends the same pane of glass interface from the core and the cloud to the edge, reducing operational complexity and eliminating training overhead across teams. On its own or integrated into an enterprise-spanning CipherTrust key management solution, CipherTrust k160 seamlessly brings cryptographic key management where you need it.

Regardless of the specific use case, all CipherTrust k160 deployments benefit from the following characteristics of the CipherTrust k160 platform:

  • Measuring only 7”x4.3”x1.65”, the CipherTrust k160 Mk II is sized for space-constrained environments in which the customer has low size, weight, and power (SWaP) needs.
  • CipherTrust k160 is easy to operate by someone with basic computer skills.
  • Removable token HSM to quickly disable key delivery.

Mission Focused Security, Powered by a Removable Token HSM

CipherTrust k160 includes detachable token hardware security module (HSM) that serves as a secure root of trust for key generation, storage, and encryption processes. Removal of the token HSM enables users to quickly disable key delivery functioning effectively as a “kill switch” for shielding mission critical data during high risk operations.

Enterprise Grade Key Management, Anywhere

Removable Token HSM

Provides secure key generation, storage, and encryption/decryption; removing the token quickly blocks key delivery

Full Key Lifecycle Management and Automated Operations

Simplifies key management including key generation, backup/ restore, clustering, deactivation, and deletion, and automates policy-driven operations with event alarms

Centralized Administration and Access Control

Unifies key management with role‑based access, audit logging, and authentication via AD/LDAP

Multi‑tenancy

Supports multiple domains with separation of duties for large organizations or MSP environments.

Developer Friendly REST APIs

Allows remote key management and offloading cryptographic operations to the appliance

Flexible HA Clustering and Intelligent Key Sharing

Clusters physical or virtual appliances for high availability and higher throughput.

Common Deployments

CipherTrust k160 can be used in conjunction with the CipherTrust k470, k570, k170v, and k470v models as part of an enterprise-wide key management strategy. With common security features, user interfaces, and reporting mechanisms across the entire CipherTrust product family, agencies can leverage their investment in training, security evaluations, and compliance procedures to deploy core-level cryptographic key management capabilities to the edge using the CipherTrust k160.

CipherTrust k160 is commonly deployed in the following environments:

  • Small data storage deployments
  • Branch and remote offices
  • Tactical deployments including forward deployed environments, forward operating bases, mobile command centers, forward mission operations
  • Disaster recovery centers
  • Remote, lights-out, non-managed facilities
  • Lab or proof of concept deployment
edge-use-cases

Technical Specifications

  • CipherTrust k160 Mk II Dimensions: 7” x 4.3” x 1.65”
  • Weight: 1.84 lbs
  • Direct mount or 1U 19in. rack mount
  • Thermal Storage: -40°C ~ 85°C
  • Thermal Operation: -20°C ~ 65°C
  • Storage Humidity: 0% ~ 90% relative humidity, non-condensing
  • Operating Humidity: 0% ~ 90% relative humidity, non-condensing
  • Vibration Testing: Random, 3 Grms, 5~500Hz
  • Power: included 12V external power supply; locking DC power connector
  • Web UI Management
  • Serial and SSH command line
  • KMIP and XML Key Management Protocols
  • Two gigabit Ethernet interfaces
  • Integrated Token HSM connection

Resources

ImageTitleLink
Product Brief: CipherTrust Manager k160 Mk II