CipherTrust Data Security Platform

The award-winning CipherTrust Data Security Platform is an integrated set of data-centric solutions that remove complexity from data security, accelerate time to compliance, and secure cloud migrations. Thales is proud to have been recognized as an Overall Leader in the KuppingerCole Leadership Compass on Data Security Platforms as well as a Strong Performer in the Forrester Wave and to be featured in Gartner’s Market Guide to Data Security Platforms.

The CipherTrust Platform unifies data discovery, classification, data protection, and centralized management for keys and secrets into a single platform. This results in fewer resources dedicated to security operations, ubiquitous compliance controls, and significantly reduced risk across your business.

Thales Named Overall Leader in Data Security Platforms

CipherTrust Data Security Platform

Discover

Get complete visibility into sensitive data exposure risk across your organization

Protect

Use appropriate data protection mechanisms and guard sensitive data to minimize risk and achieve compliance

Control

Centrally manage encryption keys and configure security policies to retain control of sensitive data on-premises and in the cloud

Address data security challenges with CipherTrust Data Security Platform

CipherTrust Data Security Platform aims to reduce the complexity and risk of managing sensitive data with a broad range of capabilities unifying data discovery, classification, data protection, and centralized management for keys and secrets into a single platform.

Managing compliance and Risk

  • Data Risk Intelligence: As part of the Data Security Fabric, DRI provides visibility into where your data sources that contain sensitive data are. It identifies the encryption status of each data source and offers recommendations on how to meet encryption goals using the CipherTrust Data Security Platform.
  • Addressing policy requirements: CipherTrust Data Security Platformcan help organizations comply with data protection regulations such as Zero Trust.
  • Reducing risk: By protecting sensitive data, CipherTrustData Security Platform can help organizations reduce the risk of data breaches and other security incidents.
  • File Activity Monitoring: Deliver real-time visibility into file usage, encryption status, and sensitive data access, enabling proactive threat detection and data protection across your organization.

Robust key management, encryption and tokenization

  • Protecting data at rest:  CipherTrust offers encryption solutions to protect data while it is stored on-premises, in the cloud, or in backups.
  • Transparent encryption: The platform supports transparent encryption, which means that data can be encrypted without requiring changes to applications or workflows.
  • Key management: CipherTrust provides centralized key management to ensure that encryption keys are securely generated, stored, and managed.
  • Replacing sensitive data with tokens: Tokenization replaces sensitive data with non-sensitive tokens, making it difficult for unauthorized individuals to access or misuse the data
  • Dynamic data masking: CipherTrust supports dynamic data masking, which allows sensitive data to be masked or redacted in real time, preventing unauthorized access even when data is in use.

Solutions

Encryption Key & Management

Streamline encryption key management with CipherTrust Manager for consistent security policies across platforms.

Application Data Protection

Integrate high-level data security into applications seamlessly and protect sensitive data at creation or receipt with CipherTrust Application Data Protection, providing robust.

Transparent Encryption

Shield unstructured data from privilege escalation and zero-day ransomware attacks. with CipherTrust Transparent Encryption.

Database Protection

Secure sensitive data in databases with CipherTrust Database Protection to ensure compliance and protect against unauthorized access.

Discovering and classifying your sensitive data and secrets

  • Identifying sensitive data: CipherTrust can help organizations discover and classify sensitive data across their entire infrastructure, including files, databases, and big data.
  • Understanding data exposure: CipherTrust provides visibility into where sensitive data resides and how it is being accessed, helping organizations assess their risk and prioritize protection efforts.
  • Secrets Discovery: CipherTrust automatically scans and detects code containing sensitive information (API keys, tokens, passwords, etc.) mistakenly included by developers.

Solutions

Data Discovery & Classification

Gain visibility into your sensitive data locations to strategize effective migration with CipherTrust Data Discovery and Classification.

Take control of your sensitive data across clouds

  • Securing data in the cloud: CipherTrust provides solutions for protecting data in public, private, and hybrid cloud environments.
  • Integration with cloud platforms: The platform integrates with popular cloud platforms such as AWS, Azure, and GCP.
  • Centralize multi cloud key management for BYOK, HYOK and cloud native encryption keys across any combination of clouds and on-premises with a single UI.

Solutions

CipherTrust Manager

Retain exclusive control over encryption keys stored in preferred geographic regions with CipherTrust Manager.

CipherTrust Cloud Key Management

Manage the encryption key lifecycle with integrations for BYOK, HYOK, and native cloud keys across multiple platforms.

Manage and automate access to secrets

  • Secrets Management: CipherTrust Secrets Management offers a range of capabilities to securely store, manage, and distribute secrets across different developer environments, ensuring that they are protected from unauthorized access and misuse.
  • Improve Developer Efficiency: Centralize management for all secret types with a scalable SaaS (Software as a Service).

Solutions

CipherTrust Secrets Management

Enterprise secrets management solution, powered by Akeyless, protects and automates access to secrets across DevOps tools and cloud workloads.

Data Discovery and Classification

Visualize your sensitive data with efficient data discovery, classification, and risk analysis across data stores.

Integrate Security into Development improving DevSecOps efficiency

  • Integrating security into the development process: CipherTrust can be integrated into DevOps workflows to ensure that security is built into applications from the beginning.
  • Protecting sensitive data in development environments: The platform provides solutions for protecting sensitive data during development, testing, and deployment.
  • Improve Efficiency with Full Separation of DevSecOps Duties: Rapidly secure, deploy and run cloud-native workloads across cloud service providers and speed-up continuous integration and continuous delivery processes.

Solutions

DevSecOps Solutions

DevSecOps helps reduce security risks and bring trust to protect your data within your apps using developer friendly data protection solutions.

Frequently Asked Questions

How easy is it to deploy and manage CipherTrust?

CipherTrust Platform is managed through a centralized management console. The management console provides a user-friendly interface for administrators to:

  • Configure Policies: Define data protection policies, including classification criteria, access controls, encryption settings, and DLP rules.
  • Monitor Activity: Track the platform’s performance, monitor data access and usage patterns, and identify potential security threats.
  • Manage Keys: Generate, store, and manage cryptographic keys used for encryption and decryption.
  • Generate Reports: Create customized reports to track compliance, identify trends, and assess the effectiveness of data protection measures.
  • Integrate with Other Systems: Connect CipherTrust with other security systems, such as identity and access management (IAM) solutions, to provide a comprehensive approach to data protection.

What are the key features and benefits of a Data Security Platform?

Key Features:

  • Data Discovery and Classification: Automatically identifies and classifies sensitive data across your organization, helping you understand where your most valuable information resides and assess its risk.
  • Transparent Encryption: Encrypts data at rest and in motion, protecting it from unauthorized access and breaches. The platform supports various encryption methods and standards.
  • Database Encryption: Secures databases by encrypting sensitive data at the column or row level, preventing unauthorized access and data exposure.
  • Tokenization: Replaces sensitive data with meaningless tokens, protecting it from unauthorized use and disclosure.
  • Key Management: Centralizes and manages cryptographic keys, ensuring their security and preventing unauthorized access.
  • Access Controls: Enforces granular access controls to restrict access to sensitive data based on user roles, permissions, and location.
  • Compliance: Helps organizations meet regulatory requirements like GDPR, HIPAA, and PCI DSS by providing tools for data discovery, classification, and protection.
  • Cloud Security: Provides solutions for securing data in cloud environments, including cloud-native encryption and key management.

Benefits:

  • Enhanced Data Security: Protects sensitive data from unauthorized access, breaches, and data loss.
  • Improved Compliance: Helps organizations meet regulatory requirements and avoid fines.
  • Reduced Risk: Mitigates the risk of data breaches and their associated costs.
  • Increased Efficiency: Streamlines data security operations and reduces the burden on IT teams.
  • Centralized Management: Provides a unified platform for managing data security across various environments.
  • Scalability: Easily scales to accommodate growing data volumes and complexity.

Where does CipherTrust store data? What are its privacy policies?

CipherTrust Platform data is stored in a secure, encrypted repository. This repository can be located on-premises, in the cloud, or in a hybrid environment, depending on your organization’s specific needs and deployment model. The exact location of the data repository will depend on the components and features you are using.

What is the CipherTrust Platform Installation like?

CipherTrust Platform installation can vary in complexity depending on specific components, deployment scenarios, and your organization’s existing infrastructure. Thales provides detailed installation guides and support.

Factors that can influence the installation complexity include:

  • Deployment Model: Installing CipherTrust in a complex, hybrid environment may require more technical expertise than a simple on-premises deployment.
  • Integration with Existing Systems: Integrating CipherTrust with your existing infrastructure, such as databases, applications, and network devices, can add complexity to the installation process.
  • Customization: Customizing the platform to meet your organization’s specific needs may require additional configuration and testing.

CipherTrust Platform Community Edition

A free-forever version of the CipherTrust Data Security Platform that makes it easy for DevSecOps to deploy data protection controls into hybrid and multi-cloud applications – in minutes instead of weeks. It supports the following DevSecOps use-cases.

  • Centralized key management with CipherTrust Manager Community Edition
  • Transparently protects sensitive data in RESTful calls with Data Protection Gateway
  • Transparently protects data accessible from containers with CipherTrust Transparent Encryption for Kubernetes

Resources

ImageTitleSummaryLink
White Paper: Securing the Blind Spot: Unstructured Data Risk and Thales File Activity Monitoring

Unstructured data—everything from Office documents to chat logs, Gen AI outputs, and medical images—now accounts …

Product Brief: CipherTrust Secrets Management

CipherTrust Secrets Management (CSM) is a state-ofthe- art Secrets Management solution, powered by the Akeyless …

Solution Brief: Thales TCT Post-Quantum Cryptography Implementation

Download this solution brief to learn about Thales TCT’s Post-Quantum Cryptography …

White Paper: Protect LLMs with CipherTrust Transparent Encryption

The exponential growth of data in digital environments has brought about an urgent need for …

Solution Brief: Thales and Intel Collaborate to Enhance Trust in Confidential Computing By Enabling End-to-End Data Protection

Learn more about Thales and Intel Collaborate to Enhance Trust in Confidential Computing By Enabling …

Solution Brief: Securely Share CUI, SBU, and Secret Data with Coalition Partners with Thales TCT CipherTrust Data Security Platform

Military operations often require unique, situational data to be shared between the U.S. and its …

Solution Brief: Top 10 Reasons to Migrate to the CipherTrust Data Security Platform For Vormetric Customers

You relied on the Vormetric DSM platform over many years to provide centralized key management …

Solution Brief: Top 10 Reasons to Migrate to the CipherTrust Data Security Platform For KeySecure Customers

You relied on the KeySecure platform over many years to provide centralized key management and …

White Paper: Understanding Data Security for SAP

SAP provides the operational lifeblood of many enterprises with SAP modules providing essential functions that …

White Paper: Protecting sensitive data in and around SAP HANA

On the surface, encrypting the database instance using SAP native encryption would appear to be …

CipherTrust Data Security Platform Product Brief

Learn more about CipherTrust Data Security …

CTO Sessions Webcast On Demand: Top 10 Reasons to Protect Your Agency with CipherTrust Data Security Platform

In this installment of Thales TCT’s CTO Sessions Webcast Series, our Deputy CTO shared the …

CTO Sessions On Demand: Protecting Your Data in Their Cloud

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud …

CipherTrust Cloud Key Management Solutions for Amazon Web Services Solution Brief

Learn More About CipherTrust Cloud Key Management Solutions for Amazon Web …

Multi-Factor Authentication for CipherTrust Transparent Encryption

Learn more about Multi-Factor Authentication for CipherTrust Transparent …

CipherTrust Transparent Encryption for Teradata Vantage Solution Brief

Learn More About CipherTrust Transparent Encryption for Teradata …

CipherTrust Data Security Platform Self Guided Tour

On Demand Webinar: The Key Pillars for Protecting Sensitive Data

During this webinar, attendees learned how to develop a three-point strategy for protecting sensitive data …

On Demand Webinar: Fireside Chat: Data Protection for Multi-Domain Operations

The U.S. Military generates data at unprecedented rates, all the time, and in various locations …

On Demand Webinar: Complementing Splunk: Balancing Big Data Benefits & Big Risks

Federal agencies require a simple way to correlate all security-relevant data so they can manage …

CTO Sessions On Demand: Securing the Convergence of HPC and AI in the Enterprise

High-performance computing (HPC) has long expanded from research labs to commercial use. Computational modeling and …

Top 10 Reasons for Protecting Your Organization with CipherTrust Data Security Platform

Top 10 Reasons for Protecting Your Organization with CipherTrust Data Security …

Top 10 Reasons CipherTrust Intelligent Protection will Protect Your Data & Reduce Your Risk

Top 10 Reasons CipherTrust Intelligent Protection will Protect Your Data & Reduce Your …

White Paper: The Importance of KMIP Standard for Centralized Key Management

Today, protecting sensitive data is a fundamental requirement in virtually every business. What’s also nearly …

White Paper: The Case for Centralized Multicloud Encryption Key Management

Cloud consumers face a choice: using the cloud service provider’s (CSP) encryption or bringing their …

White Paper: The Key Pillars for Protecting Sensitive Data in Any Organization

This white paper outlines the challenges of data security in this age of data proliferation. …

White Paper: Key Management

This white paper looks back at the evolution of encryption and key management systems, and …

Protecting Data with Thales Key Management and Dell VxRail HCI System

Learn how to protect Data with Thales Key Management and Dell  VxRail HCI …

Protecting Data with Thales CipherTrust Manager and Dell PowerEdge Server

Learn how to protect data with Thales CipherTrust Manager and Dell PowerEdge …

CipherTrust Teradata Protection Solution Brief

Learn more about CipherTrust Teradata …

White Paper: Own and Manage Your Encryption Keys

For agency leaders and IT administrators responsible for data security—from the most basic statistics to …

White Paper: NIST 800-53 Mapping to CipherTrust Data Security Platform

Thales TCT is a key partner in helping organizations to meet the standard. Focusing on …

Enterprise Key Management Solutions for KMIP Clients, TDE and LUKS Solution Brief

Learn More About Enterprise Key Management Solutions for KMIP Clients, TDE and …

Data Discovery & Classification Solution Brief

Learn more about Data Discovery & …

Data Discovery & Classification Product Brief

Learn more about Data Discovery & …

CipherTrust Transparent Encryption for Kubernetes Product Brief

Learn more about CipherTrust Transparent Encryption for …

Virtual CipherTrust Manager Product Brief

Learn more about Virtual CipherTrust …

White Paper: CipherTrust Transparent Encryption

CipherTrust Transparent Encryption enables quick, effective and transparent protection of data at the system level …

CipherTrust Transparent Encryption Product Brief

Learn more about CipherTrust Transparent …

CipherTrust Security Intelligence Product Brief

Learn more about CipherTrust Security …

CipherTrust Manager Product Brief

Learn more about CipherTrust …

CipherTrust Manager k570 Product Brief

Learn more about CipherTrust Manager …

CipherTrust Manager k160 Product Brief

Learn more about CipherTrust Manager …

CipherTrust Live Data Transformation Product Brief

Learn more about CipherTrust Live Data …

VMware and Thales TCT Integration Brief

VMware and Thales Deliver Secure Virtual Machine Encryption …

Integrated Data Discovery and Classification with Enhanced Protection Product Brief

Learn more about Integrated Data Discovery and Classification with Enhanced …

CipherTrust Encryption key management solutions for Microsoft® SQL Server® and Oracle® Database Solution Brief

Learn more about Thales TCT’s integration Encryption key management solutions for Microsoft SQL Server and …

CipherTrust Data Security Platform Data Sheet

Learn more about CipherTrust Data Security …

CipherTrust Data Protection Gateway Product Brief

Learn more about CipherTrust Data Protection …

Infographic: CipherTrust Data Security Platform Infographic

Learn more about CipherTrust Data Security …

White Paper: CipherTrust Data Security Platform Architecture

The CipherTrust Data Security Platform from Thales integrates data discovery, classification, and industry-leading data protection …

CipherTrust Cloud Key Management Product Brief

Learn more about CipherTrust Cloud Key …

White Paper: Best Practices for Secure Cloud Migration

This white paper is intended to aid readers in forming a cloud security strategy and …

White Paper: Best Practices for Cloud Data Protection and Key Management

This paper describes security best practices for protecting sensitive data in the public cloud and …

Advanced data protection for AWS S3 with CipherTrust Transparent Encryption Solution Brief

To fully secure data in an untrusted and multi-tenant cloud environment, organizations must secure sensitive …

Avoiding Amazon S3 Data Leaks with Scalable Encryption and Access Controls Solution Brief

To fully secure data in an untrusted and multi-tenant cloud environment, organizations must maintain complete …