Meet Cryptography as a Service, courtesy of SafeNet Crypto Command Center
It is common to deploy encryption for the protection and compliance of sensitive and personal information. The security level of any encryption solution often comes down to the security of the encryption keys. And storing the keys in special-purpose hardware, such as a
hardware security module (HSM), is recommended by experts as a best practice.
However, until now hardware encryption solutions have not provided the agility and flexibility needed in virtualized and cloud environments. Rolling out a virtual application that requires encryption, signed digital certificates, or other PKI functions can often add days or weeks to a project.
Enter Cryptography as a Service from Gemalto
With our SafeNet Crypto Command Center, the cloud's first high-assurance key vaulting solution, enterprises can consolidate all their key vaulting and PKI services by moving away from physical HSMs to virtualized HSMs.
Likewise, Service Providers can add high-value key-vaulting and PKI services to their hosted and cloud offerings that allow them to administrate the HSMs but never access their customers’ keys.
How SafeNet Crypto Command Center Works
With SafeNet Crypto Command Center, security administrators can create a centralized pool of high assurance cryptographic resources that can be provisioned out to the people and lines of business in their organization that need them.
Administrators set up crypto service templates with predefined HSM capabilities, which users can then leverage to provision services in a standardized and compliant manner. Crypto resources can be provisioned on demand for one to thousands of HSMs simultaneously.
Xceedium relies on Gemalto’s capabilities to deliver high assurance versions of Xsuite, the company’s privileged identity management platform. SafeNet Crypto Command Center has the potential to be a game-changer in the way we employ crypto resources. Xsuite protects very large hybrid-cloud enterprises and the SafeNet Crypto Command Center design is right in line with Xsuite’s architecture and our customer scalability, cost and security requirements.
Premium and Freemium Ordering Options
In addition to our Premium license version that offers full provisioning capabilities, you can also test drive SafeNet Crypto Command Center with our
Freemium License. Easily install and sample the software in a non-production environment to determine how you too can benefit.
With SafeNet Crypto Command Center you can benefit from:
Dramatic cost savings. Not only can your hardware requirements be reduced by as much as 95%, but Gemalto's automation processes saves hours of work for each cryptographic resource.
Simplified management and administration. Self-service and encryption templates mean that crypto expertise isn't required for crypto rollouts anymore.
Fewer security gaps. Centralized crypto expertise results in security and encryption policies that are enforced consistently across the enterprise.
Fast rollout. Now an enterprise can implement encryption in a new application in minutes, not hours.
Proven: Built on the market leading
SafeNet HSMs which currently provide protection for over $1 trillion in daily financial transactions.
Learn more about SafeNet Crypto Command Center:
Intro to Crypto Command Center: HSM Provisioning in the Cloud - White Paper
Businesses and organizations of all types and sizes are embracing virtualization and cloud computing concepts to make more efficient use of their own IT....
Get This Resource
SafeNet Crypto Command Center Product Brief
Together SafeNet Crypto Command Center and SafeNet HSMs combine to form one complete, centralized solution for the management of your crypto HSM resources – a crypto hypervisor. Deliver o
Get This Resource
SafeNet Crypto Command Center and Xceedium - Solution Brief
With SafeNet and Xceedium, even organizations with the most stringent security policies and mandates can leverage cloud services.
Get This Resource
Securing HSM Connections in Virtual Environments - White Paper
The sense of safety that many enterprises had, based on their physical security measures, is being eroded since the data and services are no longer guaranteed to be physically secure. This p
Get This Resource
Introducing Cloud-Delivered Encryption
A crypto hypervisor revolutionizes the delivery of encryption. IT departments can now deliver on-demand, elastic crypto services for data protection—in minutes, not days. Our crypto hypervisor is the combination of SafeNet Crypto Command Center together with the proven SafeNet Hardware Security Module (HSM).
For the first time, high-assurance encryption services fit the cloud operations model. Now the full cost and innovation advantages of virtualization can be exploited without compromising security or compliance.
Admin- & User-Friendly Cryptography: IT maintains full, centralized control of the delivery of encryption services. Users have full control of their cryptographic resources knowing that other tenants and administrators cannot access their encryption keys.
Innovations in Cryptography
As a leader in the security market, Gemalto is focused on bringing strong, innovative security solutions to next-generation environments like the cloud. Powered by the SafeNet Crypto Command Center and SafeNet Hardware Security Modules (HSMs), our crypto hypervisor represents the culmination of years of research and development:
SafeNet Crypto Command Center. With this management interface admins can manage hundreds of virtual HSMs and administrators can publish a list of on-demand service templates for their users. These templates are on a web page that is easy to navigate. The users are only offered services that they have permission to create.
Virtualized crypto hardware. SafeNet Crypto Command Center abstracts HSMs into many dynamic crypto resources that maintain access controls and user experience as if each resource were a dedicated physical HSM. Multi-tenancy is supported, establishing an environment in which many organizations can leverage the same hardware without fear of keys being lost or stolen by other tenants. Even administrators can’t access the users’ keys.
Separation of roles and responsibilities in multi-tenant environments. Users maintain access to their key material while the central authority sets overall security policies.