Gemalto is now part of the Thales Group, find out more.
Contact Us

Cryptography as a Service

Meet Cryptography as a Service, courtesy of SafeNet Crypto Command Center

Cryptographcy as a Service Icon

It is common to deploy encryption for the protection of sensitive and personal information in order to meet compliance needs. The security level of any encryption solution often comes down to the security of the encryption keys. And storing the keys in special-purpose hardware, such as a hardware security module (HSM) is recommended by experts as a best practice

However, until now hardware encryption solutions have not provided the agility and flexibility needed in virtualized and cloud environments. Rolling out a virtual application that requires encryption, signed digital certificates, or other PKI functions can often add days or weeks to a project.

Enter Cryptography as a Service from Gemalto

Consolidate your enterprise key vaulting and PKI services by moving away from physical HSMs to virtualized HSMs, with SafeNet Crypto Command Center - the cloud's first high-assurance key vaulting solution. 

Likewise, Service Providers can add high-value key-vaulting and PKI services to their hosted and cloud offerings that allow them to administrate the HSMs but never access their customers’ keys.

How SafeNet Crypto Command Center Works

Security administrators can create a centralized pool of high assurance cryptographic resources that can be provisioned out to the people and lines of business in their organization that need them.

Administrators set up crypto service templates with predefined HSM capabilities, which users can then leverage to provision services in a standardized and compliant manner. Crypto resources can be provisioned on demand for one to thousands of HSMs simultaneously. Additionally, administrators can monitor crypto resources, generate dynamic reports, and always be up to date on the status of their HSM appliances. Having a convenient, centralized view across the device pools provides visibility into the status and health of resources, and enables administrators to be proactive in dealing with challenges before they affect service level agreements.

CA Technologies Logo

CA Technologies relies on Gemalto’s capabilities to deliver high assurance versions of Privileged Access Manager, the company’s privileged identity management platform. SafeNet Crypto Command Center has the potential to be a game-changer in the way we employ crypto resources. Privileged Access Manager protects very large hybrid-cloud enterprises and the SafeNet Crypto Command Center design is right in line with Privileged Access Manager’s architecture and our customer scalability, cost and security requirements.

- Mordecai Rosen, Senior Vice President, Operations at CA Technologies

Premium and Freemium Ordering Options

In addition to our Premium license version that offers full provisioning and monitoring capabilities, you can also test drive SafeNet Crypto Command Center with our Freemium License. Easily install and sample the software in a non-production environment to determine how you too can benefit.

With SafeNet Crypto Command Center you can benefit from:

  • Dramatic cost savings. Not only can your hardware requirements be reduced by as much as 95%, but Gemalto's automation processes saves hours of work for each cryptographic resource.

  • Simplified management and administration. Self-service and encryption templates mean that crypto expertise isn't required for crypto rollouts anymore.

  • Fewer security gaps. Centralized crypto expertise results in security and encryption policies that are enforced consistently across the enterprise.

  • Fast rollout. Now an enterprise can implement encryption in a new application in minutes, not hours.

  • Proven Solution. Built on the market leading SafeNet Luna Network HSMs which currently provide protection for over $1 trillion in daily financial transactions.

  • Improved Visibility. Through crypto resource reporting and monitoring.

  • Lower Total Cost of Ownership (TCO). Share resources and reduce costs with multi-tenancy and role separation.

Learn more about SafeNet Crypto Command Center:

Intro to Crypto Command Center  

Intro to Crypto Command Center: HSM Provisioning in the Cloud - White Paper

Businesses and organizations of all types and sizes are embracing virtualization and cloud computing concepts to make more efficient use of their own IT....

Get This Resource  
SafeNet Crypto Command Center Product Brief  

SafeNet Crypto Command Center Product Brief

Together SafeNet Crypto Command Center and SafeNet HSMs combine to form one complete, centralized solution for the management of your crypto HSM resources – a crypto hypervisor. Deliver o

Get This Resource  
SafeNet Crypto Command Center and Xceedium Solution Brief  

SafeNet Crypto Command Center and Xceedium - Solution Brief

With SafeNet and Xceedium, even organizations with the most stringent security policies and mandates can leverage cloud services.

Get This Resource  
Securing HSM Connections in Virtual Environments  

Securing HSM Connections in Virtual Environments - White Paper

The sense of safety that many enterprises had, based on their physical security measures, is being eroded since the data and services are no longer guaranteed to be physically secure. This p

Get This Resource  

Crypto Hypervisor Logo

Introducing Cloud-Delivered Encryption

A crypto hypervisor revolutionizes the delivery of encryption. IT departments can now deliver on-demand, elastic crypto services for data protection—in minutes, not days. Our crypto hypervisor is the combination of SafeNet Crypto Command Center together with the proven SafeNet Luna Network Hardware Security Modules (HSMs).

For the first time, high-assurance encryption services fit the cloud operations model. Now the full cost and innovation advantages of virtualization can be exploited without compromising security or compliance.

Admin- & User-Friendly Cryptography: IT maintains full, centralized control of the delivery of encryption services. Users have full control of their cryptographic resources knowing that other tenants and administrators cannot access their encryption keys.

Cloud Ready Crypto Hypervisor

Innovations in Cryptography

As a leader in the security market, Gemalto is focused on bringing strong, innovative security solutions to next-generation environments like the cloud. Powered by the SafeNet Crypto Command Center and SafeNet Luna Network HSMs, our crypto hypervisor represents the culmination of years of research and development:

  • Centralized Crypto Management. Administrators can manage single or groups of virtual HSMs, and publish a list of on-demand service templates for their users. These templates are easy to navigate, and users are only offered services that they have permission to initialize.

  • Virtualized Crypto Hardware. SafeNet Crypto Command Center abstracts HSMs into many dynamic crypto resources that maintain access controls and user experience as if each resource were a dedicated physical HSM. Establish an environment in which many organizations can leverage the same hardware without fear of keys being lost or stolen by other tenants, with mutli-tenancy. Even administrators will not be able to access the users’ keys.

  • Monitor crypto resources. Generate dynamic reports, improve visibility, and always be up to date on the status of your HSM appliances with a centralized, convenient view of the device pools.

  • Separation of Roles and Responsibilities in Multi-tenant Environments. Users maintain access to their key material while the central authority sets overall security policies.

Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  

By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.