Skip Navigation

CM7 (formerly CypherManager) management software provides simple, secure remote encryption management either out-of-band – using a dedicated Ethernet management interface – or in-band, using the encrypted Ethernet port.

Local management using a command line interface is available via a serial console connector.

CM7 provides secure local and remote management of the entire CN and CS encryptor range and also acts as the Certificate Authority in a network of encryptors by signing and distributing X.509 certificates.

CM7 from Thales CPL is available for sale to the U.S. Federal Government exclusively through Thales TCT.

CM7 offers the following benefits:

  • Purpose built graphical management tool
  • Secure in-band and out-of-band remote management using SNMPv3
  • Automatically detects and manages every CN/CS encryptor
  • Real-time display
  • Integrated certificate authority
  • Benefits

    Interoperability
    Encryptors that support the same protocol are fully interoperable. For example, locations that have minimal needs may use CS encryptors, which can interoperate with a CN unit at a larger central site under the same CM7 platform.

    Local or Centralized Management
    Configuration can be performed locally or remotely through the intuitive CM7 management software that also acts as the Certificate Authority in a network of encryptors by signing and distributing X.509 certificates.

    Wide-Ranging Encryptor Support
    CM7 supports the entire SafeNet High Speed Encryption product family. Download our product family brochures to learn more about these products:

  • Features

    Tokenization Choices
    Vormetric Tokenization combines the scalability and availability benefits of a vaultless solution with business-centric options for protecting data: both format-preserving and random tokenization. Format-preserving tokenization enables data protection without changing database schemas and offers irreversible tokens. Random tokenization offers high performance, convenient data protection. Date-specific tokenization supporting the full range of international date formats helps ensure PII and transaction security.

    Dynamic Data Masking
    Administrators can establish policies to return an entire field tokenized or dynamically mask parts of a field. For example, a security team could establish policies so that a user with customer service representative credentials would only receive a credit card number with the last four digits visible, while a customer service supervisor could access the full credit card number in the clear. Looking for static data masking? Vormetric Tokenization offers static data masking, but, for the broad range of static data masking use cases, consider Vormetric Batch Data Transformation.

    Multi-tenancy Support
    The Tokenization Server supports multi-tenancy with Tokenization groups. Tokenization groups ensure that data tokenized by one group cannot be detokenized by another, and are centrally managed.

    Centralized Tokenization Templates
    At the core of the programming simplicity of Vormetric Tokenization is the tokenization template.

    The centralization of tokenization configuration enables a tokenization request to contain, simply, the tokenization group name, template name and the data to tokenize (along with username and password and the URL of the Tokenization Server). From there, all tokenization work is performed centrally on behalf of the software engineer.

    Simple, Non-Disruptive Implementation
    Tokenization mechanisms, methods and dynamic data masking rules are defined in a centralized, friendly graphical user interface (GUI). This dramatically reduces programming required for data protection. In addition, a range of format-preserving tokenization mechanisms are available to reduce requirements for changing the database schema. The Tokenization Server’s virtual appliance form factor enables fast scaling.

    Tokenization Server Dashboard
    Once deployed, the Vormetric Tokenization Server becomes a mission-critical part of the data security infrastructure. In support of that, the server presents an information-rich dashboard upon login, showing users and use of the server with exportable data.

  • Specifications

    CM7 Remote Encryption Management Specifications:

    • Multiple device management
    • Dedicated management interface (out-of-band) or via the encrypted interface (in-band)
    • SNMPv3 remote management
    • SNMPv2c traps
    • SNMPv1 read only monitoring
    • IPv4 & IPv6 capable
    • Supports Syslog, NTP
    • Alarm, event & audit logs
    • Command line serial interface
 

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept