Skip Navigation

Whether storing data-at-rest in a physical data center, a private or public cloud, or in a third-party storage application, proper encryption and key management are critical factors in ensuring sensitive data is protected.

Thales TCT offers federal agencies Thales Cloud Protect & Licensing's data encryption solutions that deliver granular encryption and role-based access control for structured and unstructured data residing in databases, applications, files, and storage containers. With centralized key management and a hardened root of trust, agencies can ensure their master keys are protected and data remains secure.

  • Benefits

    Centralized policy and encryption key management to assure control of your data across every physical and virtual server on and off your premises.

    Minimize Risk

    Meet compliance and best practice requirements for protecting data from external threats or malicious insiders with proven, high-performance and scalable data encryption.

    Security Agility

    Quickly address new data security requirements and compliance mandates by having an encryption solution in place ready and able to encrypt everything.

  • Use Cases
    Database Security

    Encrypt data, control privileged user access, and collect security intelligence logs across your heterogeneous collection of database and big data environments with TCT data encryption security solutions.


    Data encryption, user and process access controls, logs, FIPS 140-2 and Common Criteria compliant key management, strong administration policies all contribute to effectively satisfying compliance mandates and regulation requirements.

    Cloud Security

    Confidently move workloads to the cloud and hosted environments knowing that your data remains in your control through data encryption and key management.


Data Encryption Solutions

CipherTrust Data Security Platform

Discover, protect and control your agency's sensitive data anywhere with unified data protection. 

Learn More


Enterprise key management solution to centrally manage encryption keys and configure security policies.

 Learn More

CipherTrust Transparent Encryption

Delivers high-performance encryption and least-privileged access controls for files, directories, and volumes.

Learn More

Ciphertrust application data protection

Delivers crypto functions such as key management, signing, hashing, and encryption services through APIs. 

 Learn More

CipherTrust tokenization

Quickly add tokenization and dynamic data masking to existing applications to protect data and meet regulations.

 Learn More

ciphertrust database protection

Delivers encryption and granular controls to secure sensitive data across your database environments. 

Learn More

ciphertrust batch data transformation

Transform data fast and easily for bulk encryption, initiate database tokenization, and create desensitized databases with static data masking. 

 Learn More

CipherTrust Cloud key manager

Enables organizations to establish strong controls over encryption keys and policies for data encrypted by multiple cloud providers.

Learn More

ciphertrust Key Management

Centralize management of keys for Microsoft SQL TDE, Oracle TDE, KMIP-compliant encryption products, and more. 

Learn More


This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.