Skip Navigation

Thales Trusted Cyber Technologies’ (TCT) Luna HSMs are the choice for
government agencies when storing, protecting and managing cryptographic
keys used to secure sensitive data and critical applications. Meeting government
mandates for U.S. Supply Chain, the high-assurance, tamper-resistant Thales
TCT’s Luna HSMs are designed, developed, manufactured, sold, and supported
in the United States.

Download Now

The term Root of Trust (RoT) is commonly used in information security circles, but what does it mean? Why do we care? How does it apply to cryptographic controls? Modern computer systems are incredibly powerful and flexible. They can be molded to accomplish things that were unimaginable a mere decade ago. This same property makes them almost impossible to control and all too easy for malicious actors to find ways to disrupt them. To counter these threats, security experts have resorted to a wide range of cryptographic tools, and for these tools to function they need a trust worthy beginning.

Download Now

The Luna SA for Government uses a comprehensive three-layer authentication and access control model to achieve extremely strong security between the host application processes and the Luna SA for Government’s HSM partitions.This three-layer authentication and access control model was designed to allow the Luna SA for Government to offer network connectivity to clients without sacrificing the security requirements of HSM operations.

Download Now

Attendees of this webcast learned how you can employ a hardware-based digital signature solution to ensure the validity of critical documents with an easy-to-deploy, high-assurance solution using Adobe® LiveCycle® and SafeNet's Luna SA Hardware Security Module, including how to:

  • Guarantee signer authenticity and data integrity
  • Streamline business processes
  • Reduce costs associated with traditional paper-based processes
  • Ensure legal compliance

Download Now

Attendees of this learned how to easily deploy a cost-effective DNSSEC solution that does not increase the burden on DNS administrators and:

  • Boosts security
  • Reduces costs
  • Controls access
  • Maintains application integrity
  • Scales to accommodate high volume processing

Download Now

Attendees of this webcast learned how to protect cryptographic keys by easily integrating hardware security modules to applications in order to secure:

  • PKI/Certificate Services
  • Database and File Encryption
  • Web Services
  • Cloud Services

Download Now

Attendees of this F5 | SafeNet webcast learned how to secure and optimize the delivery of enterprise applications, including how F5's BIG-IP System integrated with SafeNet's Luna SA HSM can:

  • Deliver high performance processing
  • Provide robust security
  • Meet compliance standards
  • Secure the transport layer while improving data center performance

Download Now

USB-attached HSM that is ideal for storing root cryptographic keys in an offline key storage device.

Download Now

Embedded HSM that protects cryptographic keys and accelerates sensitive cryptographic operations.

Download Now

Network-attached HSM that protects encryption keys used by applications in on-premise, virtual, and cloud environments.

Download Now

Cipher Summit 2019 Replay

Check out the on demand videos and presentations from the event. Download Now

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept