Skip Navigation

Once an organization encrypts data on third party servers, storage infrastructure and devices, it depends on centralized enterprise key management to generate, distribute, store, rotate, and revoke/destroy cryptographic keys associated with that encrypted data, wherever it resides.

Enterprise Key Management solutions from Thales, enable organizations to centrally manage and store cryptographic keys and policies for third-party devices including Microsoft SQL TDE, Oracle TDE, and KMIP-compliant encryption products. CipherTrust Enterprise Key Management delivers a robust, standards-based platform for managing encryption keys from disparate sources across the enterprise. It simplifies the administrative challenges around encryption key management to ensure that keys are secure and always provisioned to authorized encryption services.

CipherTrust Enterprize Key Management Soltutions  from Thales CPL is available for sale to the U.S. Federal Government exclusively through Thales TCT.

  • Benefits

    Unify Key and Certificate Management

    Leverage CipherTrust Manager for managing keys for Thales data protection connectors and third-party applications including Microsoft SQL TDE, Oracle TDE, and KMIP-compliant encryption products.

    Improve Operational Efficiency

    Enterprise Key Management simplifies the process of managing cryptographic keys, enabling security teams to gradually consolidate the management of encryption across the enterprise that can reduce cost of ownership and minimize overall risks.

    Prevent Unplanned Downtime

    Minimize key availability and redundancy, leveraging secure replication of keys across multiple appliances with automated backups. Automated alerts help prevent unexpected key expiration.

  • Features

    CipherTrust KMIP server supports a broad range of KMIP compatible devices and environments and is implemented wherever enterprises need to comply with compliance standards, regulations or best practices with strong, secure, centralized encryption key management. Devices and environments include storage arrays, hyper-converged infrastructure stacks, VMware environments, MySQL databases, tape drives and many others.

    CipherTrust TDE Key Management provide lifecycle management for Oracle TDE Master Encryption Keys and Microsoft SQL Server database encryption keys to meet compliance and best practice requirements.

    CipherTrust Manager is the foundation for Thales Enterprise Key Management solutions. It is available as a virtual and physical FIPS-compliant appliance with high-availability clustering, that protects, tracks and reports on third-party digital certificates and encryption keys.

  • Specifications

    Manage Security Objects

    • X.509 certificates
    • Symmetric and asymmetric encryption keys


    • Secure-web, CLI, REST API
    • Bulk import of digital certificates and encryption keys
      • Validates on import
    • Command line scripts

    Key and Certificate Formats for Search, Alerts, and Reports

    • Symmetric encryption key algorithms: 3DES, AES128, AES256, ARIA128, ARIA256
    • Asymmetric encryption key algorithms: RSA1024, RSA2048, RSA3072, RSA4096
    • Digital certificates (X.509): DER, PEM, PKCS#7, PKCS#8, PKCS#12

    Third-Party Encryption

    • Microsoft SQL TDE, Oracle TDE, IBM Security Guardium Data Encryption, KMIP-clients
    • Example partners: Nutanix, Linoma, NetApp, Cisco, MongoDB, DataStax, Huawei

    API Support

    • RESTful, Microsoft Extensible Key Management (EKM), OASIS KMIP

    Key Availability and Redundancy

    • Secure replication of keys across multiple appliances with automated backups
  • Resources

    Enterprise Key Management Solutions - Solution Brief

    Discover how organizations can centrally manage keys for third-party devices including Microsoft SQL TDE, Oracle TDE, and KMIP-compliant encryption products.

    Download Now

    TDE Key Management - Solution Brief

    Microsoft SQL Server and Oracle Database solutions provide native transparent database encryption (TDE) that protects the data stored in their customers’ enterprise and cloud-hosted databases.

    Download Now

    Thales Key Management - White Paper

    Today, every IT organization is striving to protect valuable digital assets of any enterprise from accidental exposure or intentional misuse by cyber criminals. 

    Download Now


This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.