Skip Navigation

True data protection extends beyond the core. Agencies need to apply the same level of protection deployed in the core to the cloud and the field. That means creating a holistic data protection ecosystem where data and cryptographic keys are secured and managed, and access is controlled. 

We offer holistic data protection solutions that deliver the same level of security whether deployed in enterprise, tactical or cloud environments. Our solutions enable agencies to meet their immediate data protection needs while investing in a solution that provides robust security, a growing ecosystem, and the scalability needed to build a trusted framework for the future. 

Explore our cyber security products.

 
  • Crypto Key Management

    Cryptographic Key Management

    Centrally, efficiently, and securely manage and store cryptographic keys and policies—across the key management lifecycle and throughout the enterprise with hardware-based or virtualized cryptographic key management solutions with a full U.S. supply chain. Our solutions integrate with over 300 leading data encryption solutions from the top third-party vendors.  

  • Data Discovery & Classification

    Sensitive Data Discovery and Classification

    Efficiently discover and classify sensitive data, get a clear understanding of data and it risks, and take actions to close the gaps, from a single pane of glass.

  • Data Encryption

    Data At Rest Encryption

    Protect structured and unstructured data residing in databases, applications, files, and storage containers with our data encryption solutions. Our solutions provide granular encryption and role-based access control and integrate with our key management solutions to ensure that master keys are protected and data remains secure.

    • CIPHERTRUST DATA SECURITY PLATFORM: Discover, protect and control your agency's sensitive data anywhere with unified data protection. 
    • CIPHERTRUST MANAGER: Enterprise key management solution to centrally manage encryption keys and configure security policies.
    • CIPHERTRUST TRANSPARENT ENCRYPTION: Delivers high-performance encryption and least-privileged access controls for files, directories, and volumes.
    • CIPHERTRUST APPLICATION DATA PROTECTION: Delivers crypto functions such as key management, signing, hashing, and encryption services through APIs. 
    • CIPHERTRUST TOKENIZATION: Quickly add tokenization and dynamic data masking to existing applications to protect data and meet regulations.
    • CIPHERTRUST DATABASE PROTECTION: Delivers encryption and granular controls to secure sensitive data across your database environments. 
    • CIPHERTRUST BATCH DATA TRANSFORMATION: Transform data fast and easily for bulk encryption, initiate database tokenization, and create desensitized databases with static data masking. 
    • CIPHERTRUST CLOUD KEY MANAGER: Enables organizations to establish strong controls over encryption keys and policies for data encrypted by multiple cloud providers.
    • CIPHERTRUST KEY MANAGEMENT: Centralize management of keys for Microsoft SQL TDE, Oracle TDE, KMIP-compliant encryption products, and more. 
    • Vormetric Data Security Platform: The Vormetric Data Security Platform makes it easy and efficient to manage data-at-rest security across the organization. 
    • Vormetric Data Security Manager: Physical and virtual appliances enable centralized, consistent management of encryption, access policies, and security intelligence.
    • Vormetric Transparent Encryption: Provides high-performance encryption and least-privileged access controls for files, directories, and volumes. 
    • Live Data Transformation Extension: Extend Vormetric Transparent Encryption to enable the capability for encryption and key rotation without downtime.
    • Vormetric Container Security: Extend Vormetric Transparent Encryption encryption, privileged user access control, security intelligence log collection to your environment.
    • Vormetric Transparent Encryption For SAP HANA: Vormetric Transparent Encryption provides a proven approach to safeguarding SAP HANA data that meets rigorous security, data governance and compliance requirements.
    • Security Intelligence Logs: Detailed data access audit logs delivered by Vormetric Transparent Encryption for compliance, identification of unauthorized access attempts, and to build baselines of authorized user access patterns.
    • Vormetric Application Encryption: Easily add encryption into existing applications with standards-based APIs and centralized management.
    • Vormetric Protection For Teradata Database: Comprehensive, granular controls required to secure the most sensitive assets across your Teradata environments.
    • Vormetric Orchestrator: A virtual appliance to simplify the automation of deployment, configuration, management and monitoring of data encryption solutions.
    • ProtectV: Full disk encryption of physical servers, virtual machines, and cloud instances.
  • Network Encryption

    Network Encryption

    Encrypt data in transit everywhere—from network traffic between data centers and the headquarters to backup and disaster recovery sites, whether on premises or in the cloud through our high speed encryption solutions. Our comprehensive solutions protect data, video, voice and even metadata from eavesdropping, surveillance, and overt and covert interception at an affordable cost, without compromising security or performance.

  • Authentication

    Authentication

    Control access to sensitive data and protect user identities with our  authentication solutions. Available in USB, smart card form factors and HSM-based services, Our certificate-based authentication solutions support numerous algorithms and X.509 digital certificates enabling strong two-factor authentication and proof-positive user identification in all PKI environments.

    Certificate-Based Smart Cards

    • Smart Card 650: High Assurance Certificate-Based Smart Card
    • SafeNet IDPrime 3940: Dual-interface smart card, allowing communication either via a contact interface or via a contactless ISO14443 interface; also compatible with some NFC readers.
    • SafeNet IDPrime 940: Plug and Play contact interface smart card and is compliant with eIDAS regulations.
    • IDPrime MD 3810: Dual-interface smart card, allowing communication either via a contact interface or via a contactless ISO14443 interface; also compatible with some NFC readers. 
    • IDPrime MD 830:Plug and Play contact interface smart card and is available in two versions with different security certifications.
    • SafeNet IDPrime PIV card:  FIPS 201 standards-based card for U.S. government agencies, state and local government organizations to issue user credentials that the Federal Government can trust. 

    Certificate-Based USB Tokens

    • sKey 3250: High Assurance Certificate-Based USB Authenticator
    • SafeNet eToken 5110:  PKI based two-factor authentication for secure remote and network access, as well as support for advanced security applications, including digital signature and pre-boot authentication.
    • SafeNet eToken 5300: compact, tamper-evident USB, which creates a third factor of authentication. This next generation eToken features presence detection functionality, is FIPS 140-2 certified and is available in Micro and Mini form factors. 

    Hardware OTP Tokens

    • SafeNet OTP Display Card: OATH-compliant 2FA token designed in a convenient credit card form factor.
    • SafeNet OTP 110: OATH-compliant OTP hardware token that features waterproof casing, and enables two-factor authentication in time-sync and event-based modes.
    • SafeNet eToken PASS: OATH compliant OTP hardware token that offers secure two factor authentication, in time- sync and event-based modes.
    • SafeNet GOLD: Activated with a PIN, which prompts the authenticator to provide an OTP. In challenge response mode, users activate GOLD with their PIN, and then must validate a numeric challenge on their GOLD authenticator.

    Smartphone and Software Tokens

    • SMS Out of Band Authentication: Delivered by SMS text messages, out-of-band authentication reduces the administrative overhead of a strong authentication solution by removing the need to install software or distribute hardware. Delivery is also available via email.
    • SafeNet MobilePASS+ Out of Band Push Authentication: Frictionless strong authentication to hundreds of applications, including SaaS and VPNs, push authentication on mobile devices lets users authenticate with a single tap of a finger print or face ID on their mobile device.

    Tokenless Authentication Solutions

    • Pattern-based Authentication:  GrIDsure Authentication is a convenient pattern-based authentication solution that overcomes the weakness of passwords without the need for software to be installed or hardware to be provisioned.
    • Context-based or contextual authentication: central to creating compliance based access policies and preventing security fatigue.

    Card Readers

    • IDBridge CT30: USB contact reader, with a compact and transparent casing, and an optional stand accessory.
    • IDBridge CT31: PIV and TAA-certified USB contact reader, with a compact and transparent casing, and an optional stand accessory.
    • IDBridge CT40: USB contact reader, with a compact and slim-line casing.
    • IDBridge CT700: Desktop pinpad for secure pin entry.

    Access Management

    • SafeNet Authentication Service delivers fully-automated, highly secure authentication-as-a-service with flexible token options tailored to the unique needs of your organization, while substantially reducing the total cost of operation.
    • SafeNet Trusted Access is a cloud-based access management service that combines the convenience of cloud and web single sign-on (SSO) with granular access security.

    HSM -Secured Identity Credentials

    • Luna Credential System:  New approach to multi-factor authentication by maintaining user credentials in a centralized hardware device that is securely accessible by endpoints in a distributed network.
  • Secure File Gateway

    Votiro Secure File Gateway

    Secure file gateway is the only solution that guarantees complete protection from weaponized files. Unlike detection-based file security solutions that scan for suspicious elements and block some malicious files, Votiro’s revolutionary Positive Selection technology™ singles out only the safe elements of each file, ensuring every file that enters your organization is 100% safe. Votiro’s new approach to file security works invisibly in the background, completely eliminating threats while ensuring zero interruption to business.

  • Secure File Sharing

    Thales SureDrop® is developed for organizations with strong security policies around file sharing, synchronization and storage, but still need the productivity benefits of a fully-featured file sharing solution. Thales SureDrop allows people to store, share and sync all their files in the Cloud or on premises with an enterprise-class solution and end-to-end encryption security.

 

 

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept